Analysis

  • max time kernel
    159s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    06-03-2022 06:50

General

  • Target

    4e0d1edb76747fd945b87dd18299298f0df719edbea946119d91db59a9b6527a.exe

  • Size

    3.3MB

  • MD5

    d18bf81dbc8acce488abd633d8058cf5

  • SHA1

    1d6dcade355b4867e9435961655a9b9caa373528

  • SHA256

    4e0d1edb76747fd945b87dd18299298f0df719edbea946119d91db59a9b6527a

  • SHA512

    10a6b3994b1b0d37c9f3833e700baded6b89b0162078442b4de5a9747c23027d8943016c5941ba2e530ee5263b87c31a7714aa7bcb5051e5d63cf0a3cd88756f

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: [email protected] Reserved email: [email protected] Your personal ID: 8DE-654-A44 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 4 IoCs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 4 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e0d1edb76747fd945b87dd18299298f0df719edbea946119d91db59a9b6527a.exe
    "C:\Users\Admin\AppData\Local\Temp\4e0d1edb76747fd945b87dd18299298f0df719edbea946119d91db59a9b6527a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ssd\onset\goodram.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\ssd\onset\81ldp.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\ssd\onset\15sp.exe
          "15sp.exe" e -psion0811 01s.rar
          4⤵
          • Executes dropped EXE
          PID:1156
        • C:\Windows\SysWOW64\timeout.exe
          timeout 5
          4⤵
          • Delays execution with timeout.exe
          PID:1044
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\ssd\onset\Ztestram.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:984
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\ssd\onset\sata1.bat" "
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1984
            • C:\Windows\SysWOW64\attrib.exe
              attrib +s +h "C:\ssd\"
              6⤵
              • Views/modifies file attributes
              PID:808
            • C:\Windows\SysWOW64\timeout.exe
              timeout 2
              6⤵
              • Delays execution with timeout.exe
              PID:1148
            • C:\ssd\onset\mesager43.exe
              mesager43.exe /start
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:524
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -start
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • Modifies system certificate store
                PID:752
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
                  8⤵
                    PID:1664
                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                      wmic shadowcopy delete
                      9⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:828
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
                    8⤵
                      PID:876
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                      8⤵
                        PID:904
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
                        8⤵
                          PID:1720
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
                          8⤵
                            PID:520
                            • C:\Windows\SysWOW64\vssadmin.exe
                              vssadmin delete shadows /all /quiet
                              9⤵
                              • Interacts with shadow copies
                              PID:836
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
                            8⤵
                              PID:932
                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                wmic shadowcopy delete
                                9⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:964
                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
                              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -agent 0
                              8⤵
                              • Executes dropped EXE
                              • Drops file in Program Files directory
                              PID:2044
                          • C:\Windows\SysWOW64\notepad.exe
                            notepad.exe
                            7⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1256
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 196
                              8⤵
                              • Program crash
                              PID:1756
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im 15sp.exe
                          6⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1444
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im 15sp.exe
                          6⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1668
                        • C:\Windows\SysWOW64\attrib.exe
                          attrib -s -h "C:\ssd\onset\mesager43.exe"
                          6⤵
                          • Views/modifies file attributes
                          PID:1692
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout 4
                          6⤵
                          • Delays execution with timeout.exe
                          PID:956
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 4
                      4⤵
                      • Delays execution with timeout.exe
                      PID:1184
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                  PID:532

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                Hidden Files and Directories

                2
                T1158

                Registry Run Keys / Startup Folder

                1
                T1060

                Defense Evasion

                File Deletion

                2
                T1107

                Hidden Files and Directories

                2
                T1158

                Modify Registry

                2
                T1112

                Install Root Certificate

                1
                T1130

                Discovery

                Query Registry

                1
                T1012

                Peripheral Device Discovery

                1
                T1120

                System Information Discovery

                2
                T1082

                Command and Control

                Web Service

                1
                T1102

                Impact

                Inhibit System Recovery

                2
                T1490

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
                  MD5

                  1c7207d15a7f303c73d5d89d6aae43be

                  SHA1

                  19fe550a31cf89ab706e3ebcd6fcc78ca57bdeac

                  SHA256

                  52a8f1b16a9d4bcec89850a5f6d30488cd8390d0e6bc19eaea5a138d5dc64dc9

                  SHA512

                  d6216aa45ffcd9345139792c94a55d53fe40f775d42a6d6127fc2cb066c653bdc005d133ed85d73aa34f1bcf634c221c7624a7e840c2424cf1f29a2bcd088342

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
                  MD5

                  5bfa51f3a417b98e7443eca90fc94703

                  SHA1

                  8c015d80b8a23f780bdd215dc842b0f5551f63bd

                  SHA256

                  bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                  SHA512

                  4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                  MD5

                  637481df32351129e60560d5a5c100b5

                  SHA1

                  a46aee6e5a4a4893fba5806bcc14fc7fb3ce80ae

                  SHA256

                  1f1029d94ca4656a577d554cedd79d447658f475af08620084897a5523587052

                  SHA512

                  604bfd0a78a57dfddd45872803501ad89491e37e89e0778b0f13644fa9164ff509955a57469dfdd65a05bbedaf0acb669f68430e84800d17efe7d360a70569e3

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B1230D967FD647CD5194F3FFA6C7E7E4
                  MD5

                  0f96cf32580efc867ff48db74bc92e4b

                  SHA1

                  2d16ce1151807b1cc5445db9bd511d0a2c90cf01

                  SHA256

                  7176b87dd59195a7e0fb8624010b143d1ca991161748e2cd38a88a4eec91a8da

                  SHA512

                  9d9e74180ef53053ebcfe25dd50659b002a4422c9253b82c78804b97329b57ea1ee19edf9eadec09d45f1b034270a15a7da5e5943406415dc259ca58fa459dbe

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                  MD5

                  c167da7b8b4c7fcda6675c7e0088f400

                  SHA1

                  994596505635ae1ea5d515c3812bde4da71453da

                  SHA256

                  393c90d40294d1f9e4875acc639b3c1b0207a68c7ca49aaf715f97746c128062

                  SHA512

                  8fbb72b5d58e34709eb545ab324112d4392f3af389b68b1e184d885ea210f529dede92167578687f47c1b40e49341cbbd62eaf8d71dc09397b5d44a4c9b767f0

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
                  MD5

                  3caf3dd3503b9f6591d281490d2497d4

                  SHA1

                  c818c6a3c119d5f01becc659ef9bab37274c0619

                  SHA256

                  f760ac6ece634538ac15df1164b7d4816c415c29e876cbdc374fc37f07e64394

                  SHA512

                  a0d7a2e342df1094b0870bbd35e23d6942ae42a87940ba020bdb55d0e7d1f032e0b711ac43311b1591410c02c852c9b8b9e451f5f20aff0a7eedb6e5637e1dd8

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
                  MD5

                  d019bef44d618ce018e02fe72c0ce758

                  SHA1

                  2df363d24a3dbf3205a022fba0eaed41386ff373

                  SHA256

                  c579075ce731a67dcd94382f109b90cfd5ddc3ea37f3a56698191e2f1e521225

                  SHA512

                  6430c2f24c40ed139309e97258e35efd8591c48238c98f863f927288846a0b9bdc92c316c4af185b52d36c4424b094df8b2f0527ebfe649b81613d78e17a0b96

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                  MD5

                  6765d5c6d151290f71dc6c4ad37047b7

                  SHA1

                  b80832205b5a31954694c6266bb2eefd96a2f84d

                  SHA256

                  fa7c03e72f7ec2da4a3f2f5cf89906d86ffda98a619a910658658033466327b4

                  SHA512

                  b78ef50a3b60b46d089e39a38072198be365d368b3b79bfd8e7199d2ad6965729b06d24bce8b36c0d45eeff121642cc830301003b9791e4482e8c97e46adf5d3

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B1230D967FD647CD5194F3FFA6C7E7E4
                  MD5

                  3c42117747e36479063d033702144d65

                  SHA1

                  f3cfa34902e73b44e17cb5bd3d031ec8eea582ea

                  SHA256

                  3fc449fe766de1badbd0cb04b249949efdff33db4d46cb29c32eb0dc950eae55

                  SHA512

                  9cda54cf3d6d33527b2a455ce6577dad2118b7217c0b5b7299d6048f40a4123f619f008f2fe7702eb8dc93d6ed9f5c2f8164a374e8b19e3a104d1f54357b22a6

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                  MD5

                  53336a03697c87ac5a3263981f855dc0

                  SHA1

                  498553f7832b2cd85e3751fd6c2f72f4dfa5b490

                  SHA256

                  96b82f9fdeb94c60aa290f63565b4f94f66b58692875f3559271c66e7fa5c55c

                  SHA512

                  937c504016e0e006369ae4adebafbf18972e0d63d192aba55d8f6d1dfdb494064a664f4fed38f59a4554c202603be55a31b5cfd631a5b5af24d8ecd6ba60bd72

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T7QQD7BH\IH7EY2IX.htm
                  MD5

                  b1cd7c031debba3a5c77b39b6791c1a7

                  SHA1

                  e5d91e14e9c685b06f00e550d9e189deb2075f76

                  SHA256

                  57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

                  SHA512

                  d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

                • C:\Users\Admin\AppData\Local\Temp\~temp001.bat
                  MD5

                  ef572e2c7b1bbd57654b36e8dcfdc37a

                  SHA1

                  b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

                  SHA256

                  e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

                  SHA512

                  b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • C:\ssd\onset\15sp.exe
                  MD5

                  061f64173293969577916832be29b90d

                  SHA1

                  b05b80385de20463a80b6c9c39bd1d53123aab9b

                  SHA256

                  34dfe4869b0a524c63cc4696fafe30c83a22dc5fe4b994b9fe777f2c986733ce

                  SHA512

                  66e284f7c7e40af988ab09ff48cc786d287ac906368042d98d313be764058f01ecb5c3a7ab8d4336ee6494ea4a1347e73f0f2b4f3baec25ca6bcec1d888bd3da

                • C:\ssd\onset\15sp.exe
                  MD5

                  061f64173293969577916832be29b90d

                  SHA1

                  b05b80385de20463a80b6c9c39bd1d53123aab9b

                  SHA256

                  34dfe4869b0a524c63cc4696fafe30c83a22dc5fe4b994b9fe777f2c986733ce

                  SHA512

                  66e284f7c7e40af988ab09ff48cc786d287ac906368042d98d313be764058f01ecb5c3a7ab8d4336ee6494ea4a1347e73f0f2b4f3baec25ca6bcec1d888bd3da

                • C:\ssd\onset\58nfs.ini
                  MD5

                  42f9b29cb18cec22cf1f68375685ddc2

                  SHA1

                  54de5fd042aa740be90f85d7887d41ebc0e00b4b

                  SHA256

                  7aac762ca37c72400df369c6a25d81e758071e570f8dd68f136290923165d007

                  SHA512

                  f4065bc2b1b5ef8577c22ee6fe3ee4e5ee9af413d7a693940e317d2ab23de4ac64079761469369b282665c5d19fd3beb9a9ecd0af64a40531df946c65f36ab5c

                • C:\ssd\onset\81ldp.bat
                  MD5

                  a5464805722aa29200eb97cb26605135

                  SHA1

                  80b2c57e6475325a89eaaba24db02685830018ea

                  SHA256

                  03130577ed6032ec6fce61f3f4a52fbfd2e7eb69ca1901823682b392f89c0e8a

                  SHA512

                  d99760c1a82e2bd46d4d400c60c2c7a1fdfa057b84c6de2e992e19c662f62aed357e67c6f326e989124ccf7b67b57e1157b124e9bee4765e4f6730fb57660aae

                • C:\ssd\onset\Ztestram.vbs
                  MD5

                  b835e273fb843348db5f05d2ed0958e8

                  SHA1

                  8a5feab98df1ef7a898863e941e8bb07d007b9c1

                  SHA256

                  066327629f90b617ff1980f80a69ff3f5d76b4b005bfe9ee1a52319bc5517c94

                  SHA512

                  5438cd64586b1bfb6b555b9183e50cfae143306b163d7b4810383198cb8afcee3b5631a4f7cfb65561c2bb9babfaf70e8403937ae8d80cae93e9cd57e5c8331e

                • C:\ssd\onset\goodram.vbs
                  MD5

                  1ed7cb327b190a41ed8aee89c9be87d1

                  SHA1

                  6bd8634e530a6911501f1ab1c23fa4282d3a9e4f

                  SHA256

                  c31b950a44c81e1aaa37c495da1cf671ef730a5d1efbf5e68a875bf998c94663

                  SHA512

                  a9b85159614d71f91f05d9f1a4f65085105591ef7ca6d4094e171121e4259ebeca65fe490c28846b8d5791ef15cd7c01d56c7114aab517bab64c2f262c3dfb7c

                • C:\ssd\onset\mesager43.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • C:\ssd\onset\mesager43.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • C:\ssd\onset\sata1.bat
                  MD5

                  03560667f8a4144f8d45f917fd522a95

                  SHA1

                  df8ec645f2cbecb9388c87a63674b508a791433e

                  SHA256

                  41e9529c2acd43b7a206ec80655016bb65ba6721acfd930d351399730e809ad1

                  SHA512

                  215824afaaf96acef5977a7e6f48b2133cd969b1d809db333bf1b700176dfaa745141aade50fb4bec1151087a3deb2d64ae542b2405a17ec53d17fbc69052ad4

                • \Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • \Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • \ssd\onset\15sp.exe
                  MD5

                  061f64173293969577916832be29b90d

                  SHA1

                  b05b80385de20463a80b6c9c39bd1d53123aab9b

                  SHA256

                  34dfe4869b0a524c63cc4696fafe30c83a22dc5fe4b994b9fe777f2c986733ce

                  SHA512

                  66e284f7c7e40af988ab09ff48cc786d287ac906368042d98d313be764058f01ecb5c3a7ab8d4336ee6494ea4a1347e73f0f2b4f3baec25ca6bcec1d888bd3da

                • \ssd\onset\mesager43.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • \ssd\onset\mesager43.exe
                  MD5

                  3163bba8a4861d47aafa1667d3082fee

                  SHA1

                  32824014c8740b8fef306e742c891bec0ef068d3

                  SHA256

                  39016358b939b83cf9997c447458ae2d13186c3f66e66784c9e8ff4031b60c7e

                  SHA512

                  e25f77dd78df4a80ec02f01c8c6ed85fa0f9028ea87b899ffa0a5a87d211cb8c861d4e7912bb8d3cc3ee0a7240eb130f0abd6ffa0d3698b3d416c70de52eb450

                • memory/1256-93-0x0000000000080000-0x0000000000081000-memory.dmp
                  Filesize

                  4KB

                • memory/1588-55-0x0000000075801000-0x0000000075803000-memory.dmp
                  Filesize

                  8KB

                • memory/1588-56-0x00000000003C0000-0x00000000003C1000-memory.dmp
                  Filesize

                  4KB