Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
19-10-2021 13:31
Static task
static1
Behavioral task
behavioral1
Sample
13c23cbf373b0460e1b150be9d334941.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
13c23cbf373b0460e1b150be9d334941.exe
Resource
win10-en-20211014
General
-
Target
13c23cbf373b0460e1b150be9d334941.exe
-
Size
811KB
-
MD5
13c23cbf373b0460e1b150be9d334941
-
SHA1
59b1a93ddc3bec17a484a294fbdd0696550a25ef
-
SHA256
43b31ea75f3c0666523aefc13e216a651e8e93feaeff1165cb35ed374365cdd6
-
SHA512
b4b11950994a682fb9d1a7fe970c4fc23cad760410a344daeaf9f2db2533098fac632fe79823e0b3bd0e1c4042a65682baa4373ee924a4783784ea35bd97dfa0
Malware Config
Extracted
vidar
41.3
517
https://mas.to/@oleg98
-
profile_id
517
Extracted
djvu
http://rlrz.org/lancer
Signatures
-
Detected Djvu ransomware 6 IoCs
Processes:
resource yara_rule behavioral1/memory/852-54-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/852-55-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/1428-56-0x0000000004900000-0x0000000004A1B000-memory.dmp family_djvu behavioral1/memory/852-58-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1476-64-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/1476-66-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1636-84-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral1/memory/1636-85-0x00000000004A192D-mapping.dmp family_vidar behavioral1/memory/1780-88-0x0000000003080000-0x0000000003156000-memory.dmp family_vidar behavioral1/memory/1636-96-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
build2.exebuild3.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exepid process 1780 build2.exe 1868 build3.exe 1636 build2.exe 1624 build3.exe 268 mstsca.exe 1612 mstsca.exe 652 mstsca.exe 1628 mstsca.exe 1836 mstsca.exe 1956 mstsca.exe -
Loads dropped DLL 8 IoCs
Processes:
13c23cbf373b0460e1b150be9d334941.exeWerFault.exepid process 1476 13c23cbf373b0460e1b150be9d334941.exe 1476 13c23cbf373b0460e1b150be9d334941.exe 1476 13c23cbf373b0460e1b150be9d334941.exe 1476 13c23cbf373b0460e1b150be9d334941.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
13c23cbf373b0460e1b150be9d334941.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a4b62fc5-3bb0-4a94-b182-d4741d266e8b\\13c23cbf373b0460e1b150be9d334941.exe\" --AutoStart" 13c23cbf373b0460e1b150be9d334941.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.2ip.ua 5 api.2ip.ua 13 api.2ip.ua -
Suspicious use of SetThreadContext 7 IoCs
Processes:
13c23cbf373b0460e1b150be9d334941.exe13c23cbf373b0460e1b150be9d334941.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exedescription pid process target process PID 1428 set thread context of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 set thread context of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1780 set thread context of 1636 1780 build2.exe build2.exe PID 1868 set thread context of 1624 1868 build3.exe build3.exe PID 268 set thread context of 1612 268 mstsca.exe mstsca.exe PID 652 set thread context of 1628 652 mstsca.exe mstsca.exe PID 1836 set thread context of 1956 1836 mstsca.exe mstsca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1936 1636 WerFault.exe build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1036 schtasks.exe 1628 schtasks.exe -
Processes:
13c23cbf373b0460e1b150be9d334941.exe13c23cbf373b0460e1b150be9d334941.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 13c23cbf373b0460e1b150be9d334941.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 13c23cbf373b0460e1b150be9d334941.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 13c23cbf373b0460e1b150be9d334941.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 13c23cbf373b0460e1b150be9d334941.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 13c23cbf373b0460e1b150be9d334941.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
13c23cbf373b0460e1b150be9d334941.exe13c23cbf373b0460e1b150be9d334941.exeWerFault.exepid process 852 13c23cbf373b0460e1b150be9d334941.exe 852 13c23cbf373b0460e1b150be9d334941.exe 1476 13c23cbf373b0460e1b150be9d334941.exe 1476 13c23cbf373b0460e1b150be9d334941.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe 1936 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1936 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1936 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
13c23cbf373b0460e1b150be9d334941.exe13c23cbf373b0460e1b150be9d334941.exe13c23cbf373b0460e1b150be9d334941.exe13c23cbf373b0460e1b150be9d334941.exebuild2.exebuild3.exebuild3.exebuild2.exedescription pid process target process PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1428 wrote to memory of 852 1428 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 852 wrote to memory of 432 852 13c23cbf373b0460e1b150be9d334941.exe icacls.exe PID 852 wrote to memory of 432 852 13c23cbf373b0460e1b150be9d334941.exe icacls.exe PID 852 wrote to memory of 432 852 13c23cbf373b0460e1b150be9d334941.exe icacls.exe PID 852 wrote to memory of 432 852 13c23cbf373b0460e1b150be9d334941.exe icacls.exe PID 852 wrote to memory of 1032 852 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 852 wrote to memory of 1032 852 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 852 wrote to memory of 1032 852 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 852 wrote to memory of 1032 852 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1032 wrote to memory of 1476 1032 13c23cbf373b0460e1b150be9d334941.exe 13c23cbf373b0460e1b150be9d334941.exe PID 1476 wrote to memory of 1780 1476 13c23cbf373b0460e1b150be9d334941.exe build2.exe PID 1476 wrote to memory of 1780 1476 13c23cbf373b0460e1b150be9d334941.exe build2.exe PID 1476 wrote to memory of 1780 1476 13c23cbf373b0460e1b150be9d334941.exe build2.exe PID 1476 wrote to memory of 1780 1476 13c23cbf373b0460e1b150be9d334941.exe build2.exe PID 1476 wrote to memory of 1868 1476 13c23cbf373b0460e1b150be9d334941.exe build3.exe PID 1476 wrote to memory of 1868 1476 13c23cbf373b0460e1b150be9d334941.exe build3.exe PID 1476 wrote to memory of 1868 1476 13c23cbf373b0460e1b150be9d334941.exe build3.exe PID 1476 wrote to memory of 1868 1476 13c23cbf373b0460e1b150be9d334941.exe build3.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1780 wrote to memory of 1636 1780 build2.exe build2.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1868 wrote to memory of 1624 1868 build3.exe build3.exe PID 1624 wrote to memory of 1628 1624 build3.exe schtasks.exe PID 1624 wrote to memory of 1628 1624 build3.exe schtasks.exe PID 1624 wrote to memory of 1628 1624 build3.exe schtasks.exe PID 1624 wrote to memory of 1628 1624 build3.exe schtasks.exe PID 1636 wrote to memory of 1936 1636 build2.exe WerFault.exe PID 1636 wrote to memory of 1936 1636 build2.exe WerFault.exe PID 1636 wrote to memory of 1936 1636 build2.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13c23cbf373b0460e1b150be9d334941.exe"C:\Users\Admin\AppData\Local\Temp\13c23cbf373b0460e1b150be9d334941.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\13c23cbf373b0460e1b150be9d334941.exe"C:\Users\Admin\AppData\Local\Temp\13c23cbf373b0460e1b150be9d334941.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a4b62fc5-3bb0-4a94-b182-d4741d266e8b" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\13c23cbf373b0460e1b150be9d334941.exe"C:\Users\Admin\AppData\Local\Temp\13c23cbf373b0460e1b150be9d334941.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\13c23cbf373b0460e1b150be9d334941.exe"C:\Users\Admin\AppData\Local\Temp\13c23cbf373b0460e1b150be9d334941.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exe"C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exe"C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 9047⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exe"C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exe"C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {C9EDC373-DF84-4647-9715-876FABC14860} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
3183751859498c44f6d0ee8e2aab2c17
SHA13948927d001256209b5e4b25003c3c4ccb9ad6bc
SHA256fd7b40ffbaccd347c4daa2d0530a3b74114fcb55c78423d67750a8be92c70a28
SHA51288de4b4c2818650f7080a9afdcbe8764f1604bbf77f08f2ce286beb5a00e6cb30352f6180f64e7b5d9790a1e5ebefde6e62d8221e55228942d5652a1e0cd4fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
ab5c36d10261c173c5896f3478cdc6b7
SHA187ac53810ad125663519e944bc87ded3979cbee4
SHA256f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9
SHA512e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
98a2414b3a6062f69b5e91e8ef853e60
SHA1a7c76d8cc77cc535d73bc6b0ee4f64527572145d
SHA256cea0b3398c3a6ac31f4582a21afb131878dfd3e489d101af94fd3d682000dba3
SHA512d186ac4f87a04cc56d2a120d1aa7d96f1574ac7353a7d8b237452260f11a3ebfadb556eb46ee894c75ae1bdc6dae480599c6109eb25873074546847d158dddda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DMD5
7b4529c3e6a0dad24ffbbe10262cb8cf
SHA13a5acec99e307fca6af3661dc8199ce389eea154
SHA256381b113b49902813df3eece3644e49f87d59d9759f3f3ad3c48b077b4e268cf2
SHA512c32a447881e73cc52af03efc61c953ba7d8a103b3762f456ac3d86067c00e873cf9f5ac2c90052007c74989ec86cd65b9c017fd643a97686a007c91b846bdba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
0af2d4136bdcfa9f5c11596ae7ffbd21
SHA116cce8e4a04f12f7f36794dd30bd4fa615b87a36
SHA2562f98b63acb13292e1a347363c73c25ac77410d6d69b73652e0d23de91fe5df06
SHA5125c6cd4ad229a19af5cc1341180fef1cd77d4ee7f0ebfbec222f295c0f8f751920da6d3807ffd2e2a7bf36941a013af543c3d36818d437733826f546512aa80c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EMD5
a7d12bc2baedc6ec70b1e78aef5f5810
SHA1af675b0f5343908f28c90b94507be18767c3ebb7
SHA256690e114edd1590868c2627b278af17d6a4b8e863296e402a7cbd266f16965712
SHA5121d5898a5e73ed56918e421aebc65b51c18d0e39274ce860214afd8b62163531f1b4a424509a7f23b3d6393b5e59615c277016cf31b3ef32e058c91b36b88f9c4
-
C:\Users\Admin\AppData\Local\a4b62fc5-3bb0-4a94-b182-d4741d266e8b\13c23cbf373b0460e1b150be9d334941.exeMD5
13c23cbf373b0460e1b150be9d334941
SHA159b1a93ddc3bec17a484a294fbdd0696550a25ef
SHA25643b31ea75f3c0666523aefc13e216a651e8e93feaeff1165cb35ed374365cdd6
SHA512b4b11950994a682fb9d1a7fe970c4fc23cad760410a344daeaf9f2db2533098fac632fe79823e0b3bd0e1c4042a65682baa4373ee924a4783784ea35bd97dfa0
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build2.exeMD5
673a786d98cb5709caaf1797142e0e6e
SHA14e2abf2aa7c9418a34815dc02c272a859eea23a6
SHA256b115531ef23c109fb58c392379b7f55eff11169e1317b263da60edd9ac98f6b1
SHA51283fcccd08944e8c578482a945d38f756ef7cb959d6796c3830fb3e582205c5924b7bb1fb495aaffeacb2f7ac838730e5e7c01e6dcce54ea624be98635b3e3044
-
\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
\Users\Admin\AppData\Local\d1a9c491-c599-41b2-8102-788e119288e7\build3.exeMD5
0fea771099e342facd95a9d659548919
SHA19f8b56a37870f8b4ac5aa0ff5677a666f94c7197
SHA2566f032f671284b3812373e90b0ab5b16ea737bd7dc87d22b8f2aabe558334e403
SHA5122c1eeb2909acdc1ac36a677dba5131775e97dd107cd60f03bc6672be1791b2dd83a9f588719cb376cc4771570c6b2c202e783e30450ae3c2aa48bbaf2ee049c3
-
memory/268-107-0x000000000026D000-0x000000000027E000-memory.dmpFilesize
68KB
-
memory/268-105-0x0000000000000000-mapping.dmp
-
memory/432-59-0x0000000000000000-mapping.dmp
-
memory/652-113-0x0000000000000000-mapping.dmp
-
memory/652-115-0x00000000032FD000-0x000000000330E000-memory.dmpFilesize
68KB
-
memory/852-57-0x00000000768C1000-0x00000000768C3000-memory.dmpFilesize
8KB
-
memory/852-54-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/852-55-0x0000000000424141-mapping.dmp
-
memory/852-58-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1032-62-0x0000000002FE0000-0x0000000003072000-memory.dmpFilesize
584KB
-
memory/1032-61-0x0000000000000000-mapping.dmp
-
memory/1036-112-0x0000000000000000-mapping.dmp
-
memory/1428-53-0x0000000000220000-0x00000000002B2000-memory.dmpFilesize
584KB
-
memory/1428-56-0x0000000004900000-0x0000000004A1B000-memory.dmpFilesize
1.1MB
-
memory/1476-64-0x0000000000424141-mapping.dmp
-
memory/1476-66-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1612-109-0x0000000000401AFA-mapping.dmp
-
memory/1624-90-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1624-97-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1624-91-0x0000000000401AFA-mapping.dmp
-
memory/1628-94-0x0000000000000000-mapping.dmp
-
memory/1628-117-0x0000000000401AFA-mapping.dmp
-
memory/1636-96-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1636-85-0x00000000004A192D-mapping.dmp
-
memory/1636-84-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/1780-75-0x0000000000000000-mapping.dmp
-
memory/1780-77-0x000000000187B000-0x00000000018F8000-memory.dmpFilesize
500KB
-
memory/1780-88-0x0000000003080000-0x0000000003156000-memory.dmpFilesize
856KB
-
memory/1836-120-0x0000000000000000-mapping.dmp
-
memory/1836-122-0x000000000339D000-0x00000000033AE000-memory.dmpFilesize
68KB
-
memory/1868-82-0x000000000336D000-0x000000000337E000-memory.dmpFilesize
68KB
-
memory/1868-95-0x0000000000230000-0x0000000000234000-memory.dmpFilesize
16KB
-
memory/1868-80-0x0000000000000000-mapping.dmp
-
memory/1936-103-0x0000000000410000-0x0000000000411000-memory.dmpFilesize
4KB
-
memory/1936-98-0x0000000000000000-mapping.dmp
-
memory/1956-124-0x0000000000401AFA-mapping.dmp