Analysis

  • max time kernel
    136s
  • max time network
    163s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    15-09-2021 07:36

General

  • Target

    9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe

  • Size

    768KB

  • MD5

    77c36556afc794900e8e90ff4a61d97e

  • SHA1

    f0bda9fe7021e6021873a1ed2acfe8d0aec0426d

  • SHA256

    9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18

  • SHA512

    e1446857e1cfce71b830c78d8eb928d2a91b3965e68db67647cda4e74e7d3a4fd7454b53805cb8831e715099d5df30af4a18dccf54b93998b5fa2c3f61f5656c

Malware Config

Extracted

Family

vidar

Version

40.6

Botnet

517

C2

https://dimonbk83.tumblr.com/

Attributes
  • profile_id

    517

Signatures

  • Detected Djvu ransomware 6 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe
    "C:\Users\Admin\AppData\Local\Temp\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe
      "C:\Users\Admin\AppData\Local\Temp\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\e3ed069c-5213-40e2-b712-06a627a504e8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1488
      • C:\Users\Admin\AppData\Local\Temp\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe
        "C:\Users\Admin\AppData\Local\Temp\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:480
        • C:\Users\Admin\AppData\Local\Temp\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe
          "C:\Users\Admin\AppData\Local\Temp\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1924
          • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe
            "C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1696
            • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe
              "C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:576
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe" & del C:\ProgramData\*.dll & exit
                7⤵
                  PID:912
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /im build2.exe /f
                    8⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1276
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 6
                    8⤵
                    • Delays execution with timeout.exe
                    PID:1020
            • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe
              "C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:764
              • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe
                "C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1996
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                  7⤵
                  • Creates scheduled task(s)
                  PID:628
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {7B12E142-B289-41CB-B66D-1C804B215439} S-1-5-21-1669990088-476967504-438132596-1000:KJUCCLUP\Admin:Interactive:[1]
      1⤵
        PID:520
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:2024
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:1092
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              4⤵
              • Creates scheduled task(s)
              PID:980
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:1064
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:308

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      File Permissions Modification

      1
      T1222

      Modify Registry

      2
      T1112

      Install Root Certificate

      1
      T1130

      Credential Access

      Credentials in Files

      3
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      3
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\freebl3.dll
        MD5

        ef2834ac4ee7d6724f255beaf527e635

        SHA1

        5be8c1e73a21b49f353c2ecfa4108e43a883cb7b

        SHA256

        a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba

        SHA512

        c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2

      • C:\ProgramData\mozglue.dll
        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • C:\ProgramData\msvcp140.dll
        MD5

        109f0f02fd37c84bfc7508d4227d7ed5

        SHA1

        ef7420141bb15ac334d3964082361a460bfdb975

        SHA256

        334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

        SHA512

        46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

      • C:\ProgramData\nss3.dll
        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • C:\ProgramData\softokn3.dll
        MD5

        a2ee53de9167bf0d6c019303b7ca84e5

        SHA1

        2a3c737fa1157e8483815e98b666408a18c0db42

        SHA256

        43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

        SHA512

        45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

      • C:\ProgramData\vcruntime140.dll
        MD5

        7587bf9cb4147022cd5681b015183046

        SHA1

        f2106306a8f6f0da5afb7fc765cfa0757ad5a628

        SHA256

        c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

        SHA512

        0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
        MD5

        62757782a1d135f2ecfc2c3ff463e986

        SHA1

        df6b239cbb9f3205c0326a2326050390736100e0

        SHA256

        507ea93e81dc5285eb78b6f8667d2644d215aa89c91a288d70b49568c0f8eaa3

        SHA512

        9ca71164c53b50cad448880ac672347a05946fc91bb244dc3460288f70a189677ab8aeb7c57db37f7ee905d5b9f93acdb19a7bfbdae2a160b20f8d00643b4410

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
        MD5

        c63047d17999d4783b9d02035f2faee1

        SHA1

        1032a1393265a62b56f4a527f0c63da3688686c4

        SHA256

        d998577e784a0c8a39aff05661d37c7bd6af88af662a977fdaf578be6269a362

        SHA512

        dc5ea11d3808b18925d74cb20b8e1793cc8f4ba5c35fd6e47a269c345cc6c699e5366a5d88afbf2ad9ad5c8ca5b20013e8f3c52e013124a26511c09f85975a37

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
        MD5

        b491373fb8b64753a2b749aba7dc767d

        SHA1

        72b8dd6b212112b3447fbfefdeec59fd93c571a3

        SHA256

        8f063aea4fa7a3cb5a65c8ee3302efa292c42afedaba1bbe161ff66396b608c3

        SHA512

        58256ced23fe940f2a8253689b086749f77890d6dbb5dc7b34150cab3855e2c6dcc2d89a613e194729d535c4c7497ef92c9c613fa70ca2fb645040d3b5fe8d00

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        MD5

        0efb4cc3283271398601d515bd182bab

        SHA1

        e196812cf58de518ad5ef240aa532c0493a1c09e

        SHA256

        9f888a66e2cfe199a4d4cd807902b4b30d509263bd4c80d913c4b10d51cdfa50

        SHA512

        769146de25113f6e93ed8c294cd3a2b0f03339f9613bf0eca5a1777424163e45a05319a3c601a4192b9b3334b9f69286a9b80fb625f683a62f8dab79f30e1d5c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
        MD5

        7c5bddcf07fa264c1c16c49e26b685d4

        SHA1

        9b305c97c367498f92349f85f3c9e514302a3148

        SHA256

        f9d0e10d04d520141256b12c6cb25069bbb5c307a24d2d507337852cfdfdb5e8

        SHA512

        5a79302167d8de1902cf8e04b22fcb46891f8cea05d9bbe18e10c1df714f419954a452447ff1acaed1b0491b3bcbdae4707a54ac7161433260806dfe63662b21

      • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe
        MD5

        70d644484154523046292dffd74c7b16

        SHA1

        06266ea82865e14da5f1e71f403ae7f3e98e67f1

        SHA256

        86c773e97e1b1e59c48d72262cced026e06ad927b3e8d171bcfe0c8304d59ba4

        SHA512

        aab119f2f4a144b3263f6bbc884ab0c5003ba6bb99928dc23a8924f7c04ad46135f020b20a63670ca071ec1b56da3b2e633b19dda77221221c2b5dd1f250fcbc

      • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe
        MD5

        70d644484154523046292dffd74c7b16

        SHA1

        06266ea82865e14da5f1e71f403ae7f3e98e67f1

        SHA256

        86c773e97e1b1e59c48d72262cced026e06ad927b3e8d171bcfe0c8304d59ba4

        SHA512

        aab119f2f4a144b3263f6bbc884ab0c5003ba6bb99928dc23a8924f7c04ad46135f020b20a63670ca071ec1b56da3b2e633b19dda77221221c2b5dd1f250fcbc

      • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe
        MD5

        70d644484154523046292dffd74c7b16

        SHA1

        06266ea82865e14da5f1e71f403ae7f3e98e67f1

        SHA256

        86c773e97e1b1e59c48d72262cced026e06ad927b3e8d171bcfe0c8304d59ba4

        SHA512

        aab119f2f4a144b3263f6bbc884ab0c5003ba6bb99928dc23a8924f7c04ad46135f020b20a63670ca071ec1b56da3b2e633b19dda77221221c2b5dd1f250fcbc

      • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • C:\Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • C:\Users\Admin\AppData\Local\e3ed069c-5213-40e2-b712-06a627a504e8\9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18.exe
        MD5

        77c36556afc794900e8e90ff4a61d97e

        SHA1

        f0bda9fe7021e6021873a1ed2acfe8d0aec0426d

        SHA256

        9096aea718a781fff10669ace380c3e1905030469b8eeab8597f8f8df9d93c18

        SHA512

        e1446857e1cfce71b830c78d8eb928d2a91b3965e68db67647cda4e74e7d3a4fd7454b53805cb8831e715099d5df30af4a18dccf54b93998b5fa2c3f61f5656c

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • \ProgramData\mozglue.dll
        MD5

        8f73c08a9660691143661bf7332c3c27

        SHA1

        37fa65dd737c50fda710fdbde89e51374d0c204a

        SHA256

        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

        SHA512

        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

      • \ProgramData\msvcp140.dll
        MD5

        109f0f02fd37c84bfc7508d4227d7ed5

        SHA1

        ef7420141bb15ac334d3964082361a460bfdb975

        SHA256

        334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

        SHA512

        46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

      • \ProgramData\nss3.dll
        MD5

        bfac4e3c5908856ba17d41edcd455a51

        SHA1

        8eec7e888767aa9e4cca8ff246eb2aacb9170428

        SHA256

        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

        SHA512

        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

      • \ProgramData\vcruntime140.dll
        MD5

        7587bf9cb4147022cd5681b015183046

        SHA1

        f2106306a8f6f0da5afb7fc765cfa0757ad5a628

        SHA256

        c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

        SHA512

        0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

      • \Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe
        MD5

        70d644484154523046292dffd74c7b16

        SHA1

        06266ea82865e14da5f1e71f403ae7f3e98e67f1

        SHA256

        86c773e97e1b1e59c48d72262cced026e06ad927b3e8d171bcfe0c8304d59ba4

        SHA512

        aab119f2f4a144b3263f6bbc884ab0c5003ba6bb99928dc23a8924f7c04ad46135f020b20a63670ca071ec1b56da3b2e633b19dda77221221c2b5dd1f250fcbc

      • \Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build2.exe
        MD5

        70d644484154523046292dffd74c7b16

        SHA1

        06266ea82865e14da5f1e71f403ae7f3e98e67f1

        SHA256

        86c773e97e1b1e59c48d72262cced026e06ad927b3e8d171bcfe0c8304d59ba4

        SHA512

        aab119f2f4a144b3263f6bbc884ab0c5003ba6bb99928dc23a8924f7c04ad46135f020b20a63670ca071ec1b56da3b2e633b19dda77221221c2b5dd1f250fcbc

      • \Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • \Users\Admin\AppData\Local\64509296-f7ef-4ec4-88a8-877284e6732a\build3.exe
        MD5

        0fea771099e342facd95a9d659548919

        SHA1

        9f8b56a37870f8b4ac5aa0ff5677a666f94c7197

        SHA256

        6f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403

        SHA512

        2c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3

      • memory/308-117-0x0000000000401AFA-mapping.dmp
      • memory/480-60-0x0000000000000000-mapping.dmp
      • memory/576-70-0x0000000000400000-0x00000000004D7000-memory.dmp
        Filesize

        860KB

      • memory/576-75-0x0000000000400000-0x00000000004D7000-memory.dmp
        Filesize

        860KB

      • memory/576-71-0x00000000004A02AD-mapping.dmp
      • memory/628-85-0x0000000000000000-mapping.dmp
      • memory/764-86-0x0000000000220000-0x0000000000224000-memory.dmp
        Filesize

        16KB

      • memory/764-78-0x0000000000000000-mapping.dmp
      • memory/912-97-0x0000000000000000-mapping.dmp
      • memory/980-113-0x0000000000000000-mapping.dmp
      • memory/1020-99-0x0000000000000000-mapping.dmp
      • memory/1064-114-0x0000000000000000-mapping.dmp
      • memory/1092-110-0x0000000000401AFA-mapping.dmp
      • memory/1276-98-0x0000000000000000-mapping.dmp
      • memory/1488-58-0x0000000000000000-mapping.dmp
      • memory/1664-56-0x0000000003B50000-0x0000000003C6B000-memory.dmp
        Filesize

        1.1MB

      • memory/1696-67-0x0000000000000000-mapping.dmp
      • memory/1696-74-0x0000000001980000-0x0000000001A54000-memory.dmp
        Filesize

        848KB

      • memory/1768-57-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB

      • memory/1768-55-0x0000000074E61000-0x0000000074E63000-memory.dmp
        Filesize

        8KB

      • memory/1768-54-0x0000000000424141-mapping.dmp
      • memory/1768-53-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB

      • memory/1924-64-0x0000000000400000-0x0000000000537000-memory.dmp
        Filesize

        1.2MB

      • memory/1924-62-0x0000000000424141-mapping.dmp
      • memory/1996-87-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1996-81-0x0000000000400000-0x0000000000406000-memory.dmp
        Filesize

        24KB

      • memory/1996-82-0x0000000000401AFA-mapping.dmp
      • memory/2024-107-0x0000000000000000-mapping.dmp