Resubmissions

21-02-2024 21:44

240221-1lqdrafg5w 10

21-02-2024 18:39

240221-xanh8sdd21 10

15-02-2023 18:24

230215-w18fnada5x 10

15-02-2023 17:35

230215-v6c19scg9t 10

10-02-2023 13:30

230210-qr8geaah9x 10

10-02-2023 13:25

230210-qn1x6abc29 10

10-02-2023 13:11

230210-qe8awaag29 10

29-01-2023 06:15

230129-gzxv7sbe38 10

29-01-2023 06:02

230129-grzptsbb44 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 06:02

General

  • Target

    79fe08c83e8f2f3679c3dfdcff6698b92489fa915ccfb3c3458827861034814a.exe

  • Size

    298KB

  • MD5

    11511ba5fd4de1fc5051d0bcefb388ae

  • SHA1

    5e9476f39df92e01d0952e703869e71f85d470cd

  • SHA256

    79fe08c83e8f2f3679c3dfdcff6698b92489fa915ccfb3c3458827861034814a

  • SHA512

    904f0e3a252cd0ef8108492de955ac520008b10b66da736cc4bbdc6a8c3736440a9a11edb73707ba415d7f3f4c2c590dfa983aca01864b9d66a6c3559ed744e9

  • SSDEEP

    3072:0pb2LIT54Ga9Qzgp4gaCJrSjgBoMZmYKxQCBnIyCSyxzID1C7hZW0KIsiuNZ:xLIKGa96dfkBoMsDlqSwzIDM/KPP

Malware Config

Extracted

Family

djvu

C2

http://drampik.com/lancer/get.php

Attributes
  • extension

    .mzop

  • offline_id

    ex4uvTKsM2vEkIcr3MjXi2C6v27h1mS682iUXGt1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://drampik.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-uZxWxoKbU5 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshmail.top Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0637JOsie

rsa_pubkey.plain

Extracted

Family

vidar

Version

2.2

Botnet

19

C2

https://t.me/litlebey

https://steamcommunity.com/profiles/76561199472399815

Attributes
  • profile_id

    19

Signatures

  • Detected Djvu ransomware 10 IoCs
  • Detects Smokeloader packer 2 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79fe08c83e8f2f3679c3dfdcff6698b92489fa915ccfb3c3458827861034814a.exe
    "C:\Users\Admin\AppData\Local\Temp\79fe08c83e8f2f3679c3dfdcff6698b92489fa915ccfb3c3458827861034814a.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2104
  • C:\Users\Admin\AppData\Local\Temp\D98C.exe
    C:\Users\Admin\AppData\Local\Temp\D98C.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /tn "svcupdater" /tr "C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
      2⤵
      • Creates scheduled task(s)
      PID:2252
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 1028
      2⤵
      • Program crash
      PID:2720
  • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
    C:\Users\Admin\AppData\Local\Temp\DAB6.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4652
    • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
      C:\Users\Admin\AppData\Local\Temp\DAB6.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\85a090e9-9d89-4c03-888e-7727fdc928e9" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2684
      • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
        "C:\Users\Admin\AppData\Local\Temp\DAB6.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
          "C:\Users\Admin\AppData\Local\Temp\DAB6.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:4416
          • C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build2.exe
            "C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:908
            • C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build2.exe
              "C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build2.exe"
              6⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:2520
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build2.exe" & exit
                7⤵
                  PID:460
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 6
                    8⤵
                    • Delays execution with timeout.exe
                    PID:2352
            • C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build3.exe
              "C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build3.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:364
              • C:\Windows\SysWOW64\schtasks.exe
                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                6⤵
                • Creates scheduled task(s)
                PID:4236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4124 -ip 4124
      1⤵
        PID:1628
      • C:\Users\Admin\AppData\Local\Temp\2FAD.exe
        C:\Users\Admin\AppData\Local\Temp\2FAD.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:3764
      • C:\Users\Admin\AppData\Local\Temp\3200.exe
        C:\Users\Admin\AppData\Local\Temp\3200.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3600
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 1232
          2⤵
          • Program crash
          PID:2536
      • C:\Users\Admin\AppData\Local\Temp\3637.exe
        C:\Users\Admin\AppData\Local\Temp\3637.exe
        1⤵
        • Executes dropped EXE
        PID:4456
      • C:\Users\Admin\AppData\Local\Temp\3BF5.exe
        C:\Users\Admin\AppData\Local\Temp\3BF5.exe
        1⤵
        • Executes dropped EXE
        PID:2968
      • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
        C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
        1⤵
        • Executes dropped EXE
        PID:3136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3600 -ip 3600
        1⤵
          PID:4524
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          1⤵
          • Executes dropped EXE
          PID:2500
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
            2⤵
            • Creates scheduled task(s)
            PID:4944

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        File Permissions Modification

        1
        T1222

        Modify Registry

        1
        T1112

        Credential Access

        Credentials in Files

        3
        T1081

        Discovery

        Query Registry

        4
        T1012

        System Information Discovery

        4
        T1082

        Peripheral Device Discovery

        1
        T1120

        Collection

        Data from Local System

        3
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\mozglue.dll
          Filesize

          133KB

          MD5

          8f73c08a9660691143661bf7332c3c27

          SHA1

          37fa65dd737c50fda710fdbde89e51374d0c204a

          SHA256

          3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

          SHA512

          0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

        • C:\ProgramData\nss3.dll
          Filesize

          1.2MB

          MD5

          bfac4e3c5908856ba17d41edcd455a51

          SHA1

          8eec7e888767aa9e4cca8ff246eb2aacb9170428

          SHA256

          e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

          SHA512

          2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

        • C:\Users\Admin\AppData\Local\85a090e9-9d89-4c03-888e-7727fdc928e9\DAB6.exe
          Filesize

          793KB

          MD5

          fa8af53cd5ceab79747e9377c509a66e

          SHA1

          ad49e7ce1ca08394d5765776905a2354d94835e8

          SHA256

          a8218392b03673e0a5ccb3cf879d422fc8b0adb3ac775165e14063f0c69aa599

          SHA512

          8c1402f99f1774ba66567e2e0389f78279cb846801e4c810356f801062a3d8c932acb63b3610d09817163e3a8fd4128cd5667e0867db89d74cb66b73b9abed63

        • C:\Users\Admin\AppData\Local\Temp\2FAD.exe
          Filesize

          298KB

          MD5

          b79c364cdfd38ab9601e3daea7b2b503

          SHA1

          f795f0790f15b514f670564a341baf61f3dc038b

          SHA256

          a46f1a6b3dcecaf26a3f87011c08200f96b09255bcb13858d57bfc9ca3f72d59

          SHA512

          87261eb814762ecc9b4686fb745190e0e5b399b350549e5583842b0b7e8586557611d2a8fe69c42f09cc4963c5b5fc6ba880368f756f9f524ca4280f6e7a351b

        • C:\Users\Admin\AppData\Local\Temp\2FAD.exe
          Filesize

          298KB

          MD5

          b79c364cdfd38ab9601e3daea7b2b503

          SHA1

          f795f0790f15b514f670564a341baf61f3dc038b

          SHA256

          a46f1a6b3dcecaf26a3f87011c08200f96b09255bcb13858d57bfc9ca3f72d59

          SHA512

          87261eb814762ecc9b4686fb745190e0e5b399b350549e5583842b0b7e8586557611d2a8fe69c42f09cc4963c5b5fc6ba880368f756f9f524ca4280f6e7a351b

        • C:\Users\Admin\AppData\Local\Temp\3200.exe
          Filesize

          415KB

          MD5

          f38db0691e4ae14d1e5f27e106fd46a7

          SHA1

          b0012640def7873b8186f46fe2469f0b9863321a

          SHA256

          2cd0543b657767edb63b89fb8394ed54fffcd8b17e861ac4b3f001ff985fcfae

          SHA512

          61273cff076eeab9e903b18dad80ef54f60264e59a81fe1b608b572941c9b731e3b5bace8fa2e582c9e9f9cc31591cefb97af2d812a2792f37b3681f8840b8d2

        • C:\Users\Admin\AppData\Local\Temp\3200.exe
          Filesize

          415KB

          MD5

          f38db0691e4ae14d1e5f27e106fd46a7

          SHA1

          b0012640def7873b8186f46fe2469f0b9863321a

          SHA256

          2cd0543b657767edb63b89fb8394ed54fffcd8b17e861ac4b3f001ff985fcfae

          SHA512

          61273cff076eeab9e903b18dad80ef54f60264e59a81fe1b608b572941c9b731e3b5bace8fa2e582c9e9f9cc31591cefb97af2d812a2792f37b3681f8840b8d2

        • C:\Users\Admin\AppData\Local\Temp\3637.exe
          Filesize

          3.5MB

          MD5

          3dcc72414d99aa5ceabda8a5b40fe399

          SHA1

          13440890588d96a8368f38a3a3c7443fe0fd469e

          SHA256

          2ff76bc4da9995c9d30edd3b54e838fa5f3c55f5a12a8509d82b2e4837b55510

          SHA512

          437bd7033cffc68b9002c2d4004007680940195b6c56199083e925300f6ace30d4eb3763fff88b475e90dfc01f298c41bfc1f649b3b33d91826c2ce9af1d0215

        • C:\Users\Admin\AppData\Local\Temp\3637.exe
          Filesize

          3.5MB

          MD5

          3dcc72414d99aa5ceabda8a5b40fe399

          SHA1

          13440890588d96a8368f38a3a3c7443fe0fd469e

          SHA256

          2ff76bc4da9995c9d30edd3b54e838fa5f3c55f5a12a8509d82b2e4837b55510

          SHA512

          437bd7033cffc68b9002c2d4004007680940195b6c56199083e925300f6ace30d4eb3763fff88b475e90dfc01f298c41bfc1f649b3b33d91826c2ce9af1d0215

        • C:\Users\Admin\AppData\Local\Temp\3BF5.exe
          Filesize

          3.5MB

          MD5

          3dcc72414d99aa5ceabda8a5b40fe399

          SHA1

          13440890588d96a8368f38a3a3c7443fe0fd469e

          SHA256

          2ff76bc4da9995c9d30edd3b54e838fa5f3c55f5a12a8509d82b2e4837b55510

          SHA512

          437bd7033cffc68b9002c2d4004007680940195b6c56199083e925300f6ace30d4eb3763fff88b475e90dfc01f298c41bfc1f649b3b33d91826c2ce9af1d0215

        • C:\Users\Admin\AppData\Local\Temp\3BF5.exe
          Filesize

          3.5MB

          MD5

          3dcc72414d99aa5ceabda8a5b40fe399

          SHA1

          13440890588d96a8368f38a3a3c7443fe0fd469e

          SHA256

          2ff76bc4da9995c9d30edd3b54e838fa5f3c55f5a12a8509d82b2e4837b55510

          SHA512

          437bd7033cffc68b9002c2d4004007680940195b6c56199083e925300f6ace30d4eb3763fff88b475e90dfc01f298c41bfc1f649b3b33d91826c2ce9af1d0215

        • C:\Users\Admin\AppData\Local\Temp\D98C.exe
          Filesize

          408KB

          MD5

          261b1db94ccf4266128e2eb71a80fda4

          SHA1

          9d4cd03297f31eabe957f261dc7c3c6c268bd39f

          SHA256

          b0072463e78182e8d9721f91f889a62d9ce59a348fddc5196b6201a5fa68b259

          SHA512

          2dd25970561cf9e3d946acd891b601e6aa7e6563dde6c10ed5ac1a6486bbc1851cf3908b5bdee6c9b29633e51c90339209c50d97c0ea28b897bd6e7117b1ac7b

        • C:\Users\Admin\AppData\Local\Temp\D98C.exe
          Filesize

          408KB

          MD5

          261b1db94ccf4266128e2eb71a80fda4

          SHA1

          9d4cd03297f31eabe957f261dc7c3c6c268bd39f

          SHA256

          b0072463e78182e8d9721f91f889a62d9ce59a348fddc5196b6201a5fa68b259

          SHA512

          2dd25970561cf9e3d946acd891b601e6aa7e6563dde6c10ed5ac1a6486bbc1851cf3908b5bdee6c9b29633e51c90339209c50d97c0ea28b897bd6e7117b1ac7b

        • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
          Filesize

          793KB

          MD5

          fa8af53cd5ceab79747e9377c509a66e

          SHA1

          ad49e7ce1ca08394d5765776905a2354d94835e8

          SHA256

          a8218392b03673e0a5ccb3cf879d422fc8b0adb3ac775165e14063f0c69aa599

          SHA512

          8c1402f99f1774ba66567e2e0389f78279cb846801e4c810356f801062a3d8c932acb63b3610d09817163e3a8fd4128cd5667e0867db89d74cb66b73b9abed63

        • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
          Filesize

          793KB

          MD5

          fa8af53cd5ceab79747e9377c509a66e

          SHA1

          ad49e7ce1ca08394d5765776905a2354d94835e8

          SHA256

          a8218392b03673e0a5ccb3cf879d422fc8b0adb3ac775165e14063f0c69aa599

          SHA512

          8c1402f99f1774ba66567e2e0389f78279cb846801e4c810356f801062a3d8c932acb63b3610d09817163e3a8fd4128cd5667e0867db89d74cb66b73b9abed63

        • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
          Filesize

          793KB

          MD5

          fa8af53cd5ceab79747e9377c509a66e

          SHA1

          ad49e7ce1ca08394d5765776905a2354d94835e8

          SHA256

          a8218392b03673e0a5ccb3cf879d422fc8b0adb3ac775165e14063f0c69aa599

          SHA512

          8c1402f99f1774ba66567e2e0389f78279cb846801e4c810356f801062a3d8c932acb63b3610d09817163e3a8fd4128cd5667e0867db89d74cb66b73b9abed63

        • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
          Filesize

          793KB

          MD5

          fa8af53cd5ceab79747e9377c509a66e

          SHA1

          ad49e7ce1ca08394d5765776905a2354d94835e8

          SHA256

          a8218392b03673e0a5ccb3cf879d422fc8b0adb3ac775165e14063f0c69aa599

          SHA512

          8c1402f99f1774ba66567e2e0389f78279cb846801e4c810356f801062a3d8c932acb63b3610d09817163e3a8fd4128cd5667e0867db89d74cb66b73b9abed63

        • C:\Users\Admin\AppData\Local\Temp\DAB6.exe
          Filesize

          793KB

          MD5

          fa8af53cd5ceab79747e9377c509a66e

          SHA1

          ad49e7ce1ca08394d5765776905a2354d94835e8

          SHA256

          a8218392b03673e0a5ccb3cf879d422fc8b0adb3ac775165e14063f0c69aa599

          SHA512

          8c1402f99f1774ba66567e2e0389f78279cb846801e4c810356f801062a3d8c932acb63b3610d09817163e3a8fd4128cd5667e0867db89d74cb66b73b9abed63

        • C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build2.exe
          Filesize

          437KB

          MD5

          5bc3c0c24790b3738ab85b644a1c6fc9

          SHA1

          c68547eb157a77f30e88a6c4666f6024765b70d8

          SHA256

          c37e19ba7ca31d3984004ec6534551197c1e4ab710bf26f822924168f17cbe7e

          SHA512

          f7aafcc10e5d1513e523bf7a1aee42316141862ba0d54f5b75ccc18f65a6cd14361728cb4a6a6ea795569431a0bc03792b132269293ba240bd3d9fa1e012c3ab

        • C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build2.exe
          Filesize

          437KB

          MD5

          5bc3c0c24790b3738ab85b644a1c6fc9

          SHA1

          c68547eb157a77f30e88a6c4666f6024765b70d8

          SHA256

          c37e19ba7ca31d3984004ec6534551197c1e4ab710bf26f822924168f17cbe7e

          SHA512

          f7aafcc10e5d1513e523bf7a1aee42316141862ba0d54f5b75ccc18f65a6cd14361728cb4a6a6ea795569431a0bc03792b132269293ba240bd3d9fa1e012c3ab

        • C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build2.exe
          Filesize

          437KB

          MD5

          5bc3c0c24790b3738ab85b644a1c6fc9

          SHA1

          c68547eb157a77f30e88a6c4666f6024765b70d8

          SHA256

          c37e19ba7ca31d3984004ec6534551197c1e4ab710bf26f822924168f17cbe7e

          SHA512

          f7aafcc10e5d1513e523bf7a1aee42316141862ba0d54f5b75ccc18f65a6cd14361728cb4a6a6ea795569431a0bc03792b132269293ba240bd3d9fa1e012c3ab

        • C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build3.exe
          Filesize

          9KB

          MD5

          9ead10c08e72ae41921191f8db39bc16

          SHA1

          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

          SHA256

          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

          SHA512

          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

        • C:\Users\Admin\AppData\Local\c8a15119-cba5-4810-9f3d-515c5d209b46\build3.exe
          Filesize

          9KB

          MD5

          9ead10c08e72ae41921191f8db39bc16

          SHA1

          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

          SHA256

          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

          SHA512

          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          Filesize

          9KB

          MD5

          9ead10c08e72ae41921191f8db39bc16

          SHA1

          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

          SHA256

          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

          SHA512

          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          Filesize

          9KB

          MD5

          9ead10c08e72ae41921191f8db39bc16

          SHA1

          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

          SHA256

          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

          SHA512

          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

        • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
          Filesize

          686.3MB

          MD5

          8ccc99ca78125f9b8c6a66c8de49458d

          SHA1

          9b6375cd5a1921fb166f395244c43bb1863ca7a1

          SHA256

          910633d99fa7c63bf73db07b29e7c67de54e7a56021073b22c51165e0cd4d15c

          SHA512

          e83dd5ddf8b4608c2fe6c674b44d425ff1bf3cd9ec0b8b08bc2f08caf3c9de0628d260c7f71baed3a80d94d3e46f778befe5b0501b725e3ecaa0ffa43017b5dc

        • C:\Users\Admin\AppData\Roaming\Win32Sync\svcupdater.exe
          Filesize

          689.2MB

          MD5

          295d16936acf5d16f909dd1bae6a65cd

          SHA1

          a02f3ac5c9f83a1027e926ef2c77ff818acf65d4

          SHA256

          c273c8857ec8fbb837fea324af46decc954689de343123d260f5faa98f16442d

          SHA512

          294a013c4732bca9a839532644dfd8a38e078f8ad2ca7127ab715400e5ccbb231a1ea37f8641a5fd82c5a64a1f1090c4c9709f14bfcd5dd4553724dfe9917fe4

        • memory/364-207-0x0000000000000000-mapping.dmp
        • memory/460-250-0x0000000000000000-mapping.dmp
        • memory/908-222-0x0000000000700000-0x0000000000756000-memory.dmp
          Filesize

          344KB

        • memory/908-202-0x0000000000000000-mapping.dmp
        • memory/908-220-0x000000000079D000-0x00000000007CE000-memory.dmp
          Filesize

          196KB

        • memory/1244-178-0x0000000000000000-mapping.dmp
        • memory/1244-198-0x000000000079F000-0x0000000000831000-memory.dmp
          Filesize

          584KB

        • memory/1636-147-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/1636-142-0x0000000000000000-mapping.dmp
        • memory/1636-143-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/1636-145-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/1636-152-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/1636-179-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/2104-132-0x0000000000598000-0x00000000005AE000-memory.dmp
          Filesize

          88KB

        • memory/2104-133-0x0000000000530000-0x0000000000539000-memory.dmp
          Filesize

          36KB

        • memory/2104-134-0x0000000000400000-0x0000000000467000-memory.dmp
          Filesize

          412KB

        • memory/2104-135-0x0000000000400000-0x0000000000467000-memory.dmp
          Filesize

          412KB

        • memory/2252-153-0x0000000000000000-mapping.dmp
        • memory/2352-252-0x0000000000000000-mapping.dmp
        • memory/2520-251-0x0000000000400000-0x000000000046A000-memory.dmp
          Filesize

          424KB

        • memory/2520-216-0x0000000000000000-mapping.dmp
        • memory/2520-221-0x0000000000400000-0x000000000046A000-memory.dmp
          Filesize

          424KB

        • memory/2520-229-0x0000000060900000-0x0000000060992000-memory.dmp
          Filesize

          584KB

        • memory/2520-219-0x0000000000400000-0x000000000046A000-memory.dmp
          Filesize

          424KB

        • memory/2520-223-0x0000000000400000-0x000000000046A000-memory.dmp
          Filesize

          424KB

        • memory/2520-217-0x0000000000400000-0x000000000046A000-memory.dmp
          Filesize

          424KB

        • memory/2684-176-0x0000000000000000-mapping.dmp
        • memory/2968-169-0x0000000000000000-mapping.dmp
        • memory/2968-172-0x0000000140000000-0x0000000140619000-memory.dmp
          Filesize

          6.1MB

        • memory/3136-228-0x000000000064C000-0x0000000000676000-memory.dmp
          Filesize

          168KB

        • memory/3136-225-0x0000000000400000-0x000000000046D000-memory.dmp
          Filesize

          436KB

        • memory/3136-224-0x000000000064C000-0x0000000000676000-memory.dmp
          Filesize

          168KB

        • memory/3600-212-0x0000000006320000-0x00000000064E2000-memory.dmp
          Filesize

          1.8MB

        • memory/3600-185-0x0000000004BE0000-0x0000000005184000-memory.dmp
          Filesize

          5.6MB

        • memory/3600-227-0x0000000000400000-0x0000000000482000-memory.dmp
          Filesize

          520KB

        • memory/3600-226-0x00000000004D9000-0x0000000000508000-memory.dmp
          Filesize

          188KB

        • memory/3600-159-0x0000000000000000-mapping.dmp
        • memory/3600-184-0x0000000000400000-0x0000000000482000-memory.dmp
          Filesize

          520KB

        • memory/3600-205-0x0000000005B70000-0x0000000005C02000-memory.dmp
          Filesize

          584KB

        • memory/3600-191-0x0000000004B90000-0x0000000004BCC000-memory.dmp
          Filesize

          240KB

        • memory/3600-206-0x0000000005C10000-0x0000000005C76000-memory.dmp
          Filesize

          408KB

        • memory/3600-190-0x0000000004B70000-0x0000000004B82000-memory.dmp
          Filesize

          72KB

        • memory/3600-189-0x00000000057B0000-0x00000000058BA000-memory.dmp
          Filesize

          1.0MB

        • memory/3600-188-0x0000000005190000-0x00000000057A8000-memory.dmp
          Filesize

          6.1MB

        • memory/3600-186-0x00000000004D9000-0x0000000000508000-memory.dmp
          Filesize

          188KB

        • memory/3600-211-0x0000000000400000-0x0000000000482000-memory.dmp
          Filesize

          520KB

        • memory/3600-187-0x0000000002080000-0x00000000020CB000-memory.dmp
          Filesize

          300KB

        • memory/3600-213-0x0000000006500000-0x0000000006A2C000-memory.dmp
          Filesize

          5.2MB

        • memory/3600-214-0x00000000004D9000-0x0000000000508000-memory.dmp
          Filesize

          188KB

        • memory/3764-156-0x0000000000000000-mapping.dmp
        • memory/3764-182-0x00000000004E0000-0x00000000004E9000-memory.dmp
          Filesize

          36KB

        • memory/3764-181-0x0000000000549000-0x000000000055F000-memory.dmp
          Filesize

          88KB

        • memory/3764-192-0x0000000000400000-0x0000000000467000-memory.dmp
          Filesize

          412KB

        • memory/3764-183-0x0000000000400000-0x0000000000467000-memory.dmp
          Filesize

          412KB

        • memory/4124-150-0x00000000020B0000-0x00000000020F7000-memory.dmp
          Filesize

          284KB

        • memory/4124-155-0x0000000000400000-0x000000000046D000-memory.dmp
          Filesize

          436KB

        • memory/4124-136-0x0000000000000000-mapping.dmp
        • memory/4124-149-0x000000000071D000-0x0000000000747000-memory.dmp
          Filesize

          168KB

        • memory/4124-151-0x0000000000400000-0x000000000046D000-memory.dmp
          Filesize

          436KB

        • memory/4124-154-0x000000000071D000-0x0000000000747000-memory.dmp
          Filesize

          168KB

        • memory/4236-210-0x0000000000000000-mapping.dmp
        • memory/4416-199-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/4416-193-0x0000000000000000-mapping.dmp
        • memory/4416-215-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/4416-196-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/4416-197-0x0000000000400000-0x0000000000537000-memory.dmp
          Filesize

          1.2MB

        • memory/4456-162-0x0000000000000000-mapping.dmp
        • memory/4456-165-0x0000000140000000-0x0000000140619000-memory.dmp
          Filesize

          6.1MB

        • memory/4652-146-0x0000000000694000-0x0000000000726000-memory.dmp
          Filesize

          584KB

        • memory/4652-148-0x00000000022C0000-0x00000000023DB000-memory.dmp
          Filesize

          1.1MB

        • memory/4652-139-0x0000000000000000-mapping.dmp
        • memory/4944-255-0x0000000000000000-mapping.dmp