Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-04-2023 00:25
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
734KB
-
MD5
f57e7fccf0bcd56b6497a67654a00b6f
-
SHA1
3fa7b4b8ee11c0cd9dbad6f20581315d68b57a9c
-
SHA256
92f300949b64286a0bd75f516473705cbadf67ddcae87c9b27f025f657a8442c
-
SHA512
ec1fd7f8d42ec41eb91f782da1344daf1d8b947dd3a851fb205fc9a1d9a215f5728a0da7106a35fd2ed09f4380c0d5a369915af3e76dc2721c5300c3b6cc8be5
-
SSDEEP
12288:Atg5af6cDh/ywouUImddiAFPSicN4xKT8QbmrddcjmQdJ1:Mg5I6qhJ14dicPS6YT8QqZc9
Malware Config
Extracted
djvu
http://zexeq.com/raud/get.php
-
extension
.coza
-
offline_id
O8Ao46dcCReRPC4I1PGMYsRFFc9WI5eOp0O3MFt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-EPBZCVAS8s Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0693JOsie
Extracted
vidar
3.5
bf58e1879f88b222ba2391682babf9d8
https://steamcommunity.com/profiles/76561199497218285
https://t.me/tg_duckworld
-
profile_id_v2
bf58e1879f88b222ba2391682babf9d8
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Vivaldi/3.7
Signatures
-
Detected Djvu ransomware 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-56-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/932-58-0x0000000004770000-0x000000000488B000-memory.dmp family_djvu behavioral1/memory/2024-59-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2024-61-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2024-98-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1056-118-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1056-160-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1056-161-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1056-192-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1056-203-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1056-212-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1056-213-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
build2.exebuild2.exebuild3.exemstsca.exepid process 980 build2.exe 1868 build2.exe 1800 build3.exe 1324 mstsca.exe -
Loads dropped DLL 14 IoCs
Processes:
setup.exebuild2.exebuild2.exebuild3.exepid process 1056 setup.exe 1056 setup.exe 980 build2.exe 980 build2.exe 980 build2.exe 980 build2.exe 1868 build2.exe 1868 build2.exe 1868 build2.exe 1056 setup.exe 1056 setup.exe 1800 build3.exe 1800 build3.exe 1800 build3.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
setup.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a7d57e31-5d5d-42b2-8330-dae15aeec28e\\setup.exe\" --AutoStart" setup.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.2ip.ua 4 api.2ip.ua 12 api.2ip.ua -
Suspicious use of SetThreadContext 3 IoCs
Processes:
setup.exesetup.exebuild2.exedescription pid process target process PID 932 set thread context of 2024 932 setup.exe setup.exe PID 1608 set thread context of 1056 1608 setup.exe setup.exe PID 980 set thread context of 1868 980 build2.exe build2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2036 schtasks.exe 1912 schtasks.exe -
Processes:
setup.exesetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 setup.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
setup.exesetup.exepid process 2024 setup.exe 2024 setup.exe 1056 setup.exe 1056 setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
setup.exedescription pid process Token: SeRestorePrivilege 2024 setup.exe Token: SeBackupPrivilege 2024 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup.exesetup.exesetup.exesetup.exebuild2.exedescription pid process target process PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 932 wrote to memory of 2024 932 setup.exe setup.exe PID 2024 wrote to memory of 1124 2024 setup.exe icacls.exe PID 2024 wrote to memory of 1124 2024 setup.exe icacls.exe PID 2024 wrote to memory of 1124 2024 setup.exe icacls.exe PID 2024 wrote to memory of 1124 2024 setup.exe icacls.exe PID 2024 wrote to memory of 1124 2024 setup.exe icacls.exe PID 2024 wrote to memory of 1124 2024 setup.exe icacls.exe PID 2024 wrote to memory of 1124 2024 setup.exe icacls.exe PID 2024 wrote to memory of 1608 2024 setup.exe setup.exe PID 2024 wrote to memory of 1608 2024 setup.exe setup.exe PID 2024 wrote to memory of 1608 2024 setup.exe setup.exe PID 2024 wrote to memory of 1608 2024 setup.exe setup.exe PID 2024 wrote to memory of 1608 2024 setup.exe setup.exe PID 2024 wrote to memory of 1608 2024 setup.exe setup.exe PID 2024 wrote to memory of 1608 2024 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1608 wrote to memory of 1056 1608 setup.exe setup.exe PID 1056 wrote to memory of 980 1056 setup.exe build2.exe PID 1056 wrote to memory of 980 1056 setup.exe build2.exe PID 1056 wrote to memory of 980 1056 setup.exe build2.exe PID 1056 wrote to memory of 980 1056 setup.exe build2.exe PID 1056 wrote to memory of 980 1056 setup.exe build2.exe PID 1056 wrote to memory of 980 1056 setup.exe build2.exe PID 1056 wrote to memory of 980 1056 setup.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 980 wrote to memory of 1868 980 build2.exe build2.exe PID 1056 wrote to memory of 1800 1056 setup.exe build3.exe PID 1056 wrote to memory of 1800 1056 setup.exe build3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\a7d57e31-5d5d-42b2-8330-dae15aeec28e" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exe"C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exe"C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exe"C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {20946297-7703-4D86-8AB2-6F259B071556} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD50a0291b9bdf89c7e506366a8be70a80c
SHA1a30ddab885654862ba0be0159155bc99945c053f
SHA25631631ce5dfb41c09757fbd14367f9e46dc012eed1b8d462e933a34c102441272
SHA512b0c29fd46693496d0bd726db2a615049c8cc2996bc38132a57878706a8ee022bbb964b3f9c9bb67e520a82f2144d352655287e015f3617c85fabf72f752e30d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD5b7263b275d39b35a30dc1c997259591b
SHA122ff18c6f51280d4b41361fbc36c8cc8134bd70c
SHA256f9bf7b98d683c868daf9015ff946510adef6cdbe093bf3b30004bc3db0d5963a
SHA512251cbce9f5dc25f83cf4c6542e87dbe232b740667b48b5eec5903fb0c3a6c4442841bd8021dc949bc719a874055cbffff0bb522635aae8c8e24817ee83a91506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD518b8219febd4a4faf6a95796e40c7529
SHA1b20162ca73fcb323401c50779d8aa32490f2c3a2
SHA256d5f823bf1846e559021f9eccb46cf95b2d0250a924ed6858d188ee7bbaa2df23
SHA51281b3f859aa88f08cdf2fd6ebd96fcbdbd6254efa681355b25c603122b99e69ff5922bad3f5e21f2848e228d51ededdab128eb51894855427912c192b0b06dd05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5950b630273a5a9d67ae0c54d7ea437d2
SHA13a4baa53943761f0542926788db4d1a5c86bcbca
SHA256db6c0a1f75c23482a5ed68aea3b1bf9841e627e98260dec9b1707faed40c6ab0
SHA5121e56e800db8fd11d87eb1210b7a721605cc550b284c47b635ab0b7a59ce00a9fb176844af34f988e9c89268e18417760fcd14956fbc2e3661e602efc09d3c5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD54b1f8efad4f3fb5860941ffd2a53c048
SHA1a3a7ad5e87c96f6da4543447f41f9ab7dbd28985
SHA256166a64880968c5b3c089d7ec7f75118aebb43d603d0ff350456bac6adc929a9e
SHA51228264728aef77c2e997bace101cf63b64bc5b671c476a2cf61781d3b519bb62baff1c3bfd00df3ed271f2729a63e8f73ccee91d3e075d2023fb5f45c7c5dc447
-
C:\Users\Admin\AppData\Local\Temp\Tar6154.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Local\a7d57e31-5d5d-42b2-8330-dae15aeec28e\setup.exeFilesize
734KB
MD5f57e7fccf0bcd56b6497a67654a00b6f
SHA13fa7b4b8ee11c0cd9dbad6f20581315d68b57a9c
SHA25692f300949b64286a0bd75f516473705cbadf67ddcae87c9b27f025f657a8442c
SHA512ec1fd7f8d42ec41eb91f782da1344daf1d8b947dd3a851fb205fc9a1d9a215f5728a0da7106a35fd2ed09f4380c0d5a369915af3e76dc2721c5300c3b6cc8be5
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build2.exeFilesize
324KB
MD5d0eb40fe08f409805aed3f5312bfb5b8
SHA15f7942d58673854f01d25c3831efcba4182882e9
SHA2562689a2c221cb723b4f35e912efa5c1f6df415d9f656b44c1c9cbbccf248ad1c6
SHA512ad0925312dfb7f2ac82670b77c746920154dc2095553ef0df70c0a935bf4d0e31850bd6c4781cbd4e97fcc0a1bf3f918e977134b9d9101ed71088278a7b61e94
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
\Users\Admin\AppData\Local\bb68f7f2-94d2-40d9-ac01-f9e8743a6f45\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
memory/932-54-0x0000000002C30000-0x0000000002CC1000-memory.dmpFilesize
580KB
-
memory/932-58-0x0000000004770000-0x000000000488B000-memory.dmpFilesize
1.1MB
-
memory/980-183-0x0000000000310000-0x0000000000367000-memory.dmpFilesize
348KB
-
memory/1056-192-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1056-203-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1056-161-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1056-118-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1056-212-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1056-160-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1056-213-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1608-99-0x0000000000280000-0x0000000000311000-memory.dmpFilesize
580KB
-
memory/1868-180-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/1868-184-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2024-59-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2024-61-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2024-98-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2024-56-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2024-55-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB