Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-06-2023 12:47

General

  • Target

    07849699.exe

  • Size

    58.4MB

  • MD5

    a15d6e20d0107f59af14bfe1bfee8a5a

  • SHA1

    a16c498932a3c2851f255bf355f12076159afba7

  • SHA256

    301ee3fb48efa7dc3d15c8e434b93ae36bd9953d7d62efcc85e054a8720595c7

  • SHA512

    02ed872a21f838422881fb2e6099ee3bb3b5e6c22a9ea4439de54cac0fc1aa7cadbf4f1e601cff50bd300941c529313e844c3547f8b3a5bdd4f7b7f47bb6e21e

  • SSDEEP

    1572864:gDG8e0q6S1HeWXgyzRT//W87ghVzJNUXhhgTO0GsrVRUZUcf8E:KMMi++9XWDX+0rrVRTE

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Downloads MZ/PE file
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\07849699.exe
    "C:\Users\Admin\AppData\Local\Temp\07849699.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Windows\Temp\{188B2796-5050-4924-BE4C-FA3F843B4D80}\.cr\07849699.exe
      "C:\Windows\Temp\{188B2796-5050-4924-BE4C-FA3F843B4D80}\.cr\07849699.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\07849699.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.be\ExpressVPN_12.43.0.0.exe
        "C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.be\ExpressVPN_12.43.0.0.exe" -q -burn.elevated BurnPipe.{2113F3C7-99AC-4C15-A68B-FDAD5CBA79C3} {3C5DC3AE-170B-4DAD-ABEB-91074351EBBC} 3592
        3⤵
        • Adds Run key to start application
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\ProgramData\Package Cache\A176F140E942920B777F80DE89E16EA57EE32BE8\VC_redist.x64.exe
          "C:\ProgramData\Package Cache\A176F140E942920B777F80DE89E16EA57EE32BE8\VC_redist.x64.exe" /install /quiet /norestart
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2076
          • C:\Windows\Temp\{D19A2907-63FB-4276-8D24-1B84CFF14FB7}\.cr\VC_redist.x64.exe
            "C:\Windows\Temp\{D19A2907-63FB-4276-8D24-1B84CFF14FB7}\.cr\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\A176F140E942920B777F80DE89E16EA57EE32BE8\VC_redist.x64.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 /install /quiet /norestart
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:3372
            • C:\Windows\Temp\{272AA470-E9FF-409C-8893-14980940753F}\.be\VC_redist.x64.exe
              "C:\Windows\Temp\{272AA470-E9FF-409C-8893-14980940753F}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{4DF5BA6E-4C5E-4D30-99EB-866670DF67DB} {41570128-0DE0-4C00-9E61-C12994A57C99} 3372
              6⤵
              • Adds Run key to start application
              • Executes dropped EXE
              • Modifies registry class
              PID:5112
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 1048
              6⤵
              • Program crash
              PID:2100
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3952
  • C:\Windows\system32\srtasks.exe
    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1924
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3372 -ip 3372
    1⤵
      PID:3608

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Package Cache\A176F140E942920B777F80DE89E16EA57EE32BE8\VC_redist.x64.exe
      Filesize

      24.3MB

      MD5

      703bd677778f2a1ba1eb4338bac3b868

      SHA1

      a176f140e942920b777f80de89e16ea57ee32be8

      SHA256

      2257b3fbe3c7559de8b31170155a433faf5b83829e67c589d5674ff086b868b9

      SHA512

      a66ea382d8bdd31491627fd698242d2eda38b1d9df762c402923ef40bbca6aa2f43f22fa811c5fc894b529f9e77fcdd5ced9cd8af4a19f53845fce3780e8c041

    • C:\ProgramData\Package Cache\{208ef9aa-412e-4b5a-a16e-e98d7b9bf2fc}\ExpressVPN_12.43.0.0.exe
      Filesize

      10.3MB

      MD5

      3b2354b92f91a4383b867b594196cd1c

      SHA1

      43c830cfa6b873b66a323e3747a199365cb18b50

      SHA256

      2600f1e1b62070d15018ee507d9f91dd13ed93b775c4c62ffbfda85f601d85e7

      SHA512

      7421cc4f7254099f87c49a201f8816fa1adacd14333818bd85bed941c82932656159da3aaac1e7d2246874068020bfd5947f6d157882f8703408adce8ce288da

    • C:\ProgramData\Package Cache\{208ef9aa-412e-4b5a-a16e-e98d7b9bf2fc}\state.rsm
      Filesize

      896B

      MD5

      b29fdaa20b1c4afce66bdd228bf9900f

      SHA1

      583d67979b65550b16b37fe2161f602296aed0b3

      SHA256

      19cf48928a0211cca6c0bdf45835228961aa5592a664b050e725a49e69e44425

      SHA512

      aa51413e65f84fcbd0aa651625af3d6308b5698e271d0f388f258f388abd3ff0df1cb626c2f13c14b6a482d2f551aaf9034a3b8b3252528ca0986762c58633df

    • C:\Windows\Temp\{188B2796-5050-4924-BE4C-FA3F843B4D80}\.cr\07849699.exe
      Filesize

      10.3MB

      MD5

      3b2354b92f91a4383b867b594196cd1c

      SHA1

      43c830cfa6b873b66a323e3747a199365cb18b50

      SHA256

      2600f1e1b62070d15018ee507d9f91dd13ed93b775c4c62ffbfda85f601d85e7

      SHA512

      7421cc4f7254099f87c49a201f8816fa1adacd14333818bd85bed941c82932656159da3aaac1e7d2246874068020bfd5947f6d157882f8703408adce8ce288da

    • C:\Windows\Temp\{188B2796-5050-4924-BE4C-FA3F843B4D80}\.cr\07849699.exe
      Filesize

      10.3MB

      MD5

      3b2354b92f91a4383b867b594196cd1c

      SHA1

      43c830cfa6b873b66a323e3747a199365cb18b50

      SHA256

      2600f1e1b62070d15018ee507d9f91dd13ed93b775c4c62ffbfda85f601d85e7

      SHA512

      7421cc4f7254099f87c49a201f8816fa1adacd14333818bd85bed941c82932656159da3aaac1e7d2246874068020bfd5947f6d157882f8703408adce8ce288da

    • C:\Windows\Temp\{272AA470-E9FF-409C-8893-14980940753F}\.ba\logo.png
      Filesize

      1KB

      MD5

      d6bd210f227442b3362493d046cea233

      SHA1

      ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

      SHA256

      335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

      SHA512

      464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

    • C:\Windows\Temp\{272AA470-E9FF-409C-8893-14980940753F}\.ba\wixstdba.dll
      Filesize

      191KB

      MD5

      eab9caf4277829abdf6223ec1efa0edd

      SHA1

      74862ecf349a9bedd32699f2a7a4e00b4727543d

      SHA256

      a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041

      SHA512

      45b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2

    • C:\Windows\Temp\{272AA470-E9FF-409C-8893-14980940753F}\.be\VC_redist.x64.exe
      Filesize

      635KB

      MD5

      848da6b57cb8acc151a8d64d15ba383d

      SHA1

      8f4d4a1afa9fd985c67642213b3e7ccf415591da

      SHA256

      5a61f9775032457db28edd41f98f08c874e759f344ea8475c9ac8abbba68de12

      SHA512

      ff8b87e7746ecf19a150874dedd6ea4c51c76cfc291c5a80d9e5073a9bbbb2bd6ed7d10425b083578dc8d28d0d905e379fa3f919a60979e5b5c44ebc0ac613e6

    • C:\Windows\Temp\{272AA470-E9FF-409C-8893-14980940753F}\.be\VC_redist.x64.exe
      Filesize

      635KB

      MD5

      848da6b57cb8acc151a8d64d15ba383d

      SHA1

      8f4d4a1afa9fd985c67642213b3e7ccf415591da

      SHA256

      5a61f9775032457db28edd41f98f08c874e759f344ea8475c9ac8abbba68de12

      SHA512

      ff8b87e7746ecf19a150874dedd6ea4c51c76cfc291c5a80d9e5073a9bbbb2bd6ed7d10425b083578dc8d28d0d905e379fa3f919a60979e5b5c44ebc0ac613e6

    • C:\Windows\Temp\{272AA470-E9FF-409C-8893-14980940753F}\.be\VC_redist.x64.exe
      Filesize

      635KB

      MD5

      848da6b57cb8acc151a8d64d15ba383d

      SHA1

      8f4d4a1afa9fd985c67642213b3e7ccf415591da

      SHA256

      5a61f9775032457db28edd41f98f08c874e759f344ea8475c9ac8abbba68de12

      SHA512

      ff8b87e7746ecf19a150874dedd6ea4c51c76cfc291c5a80d9e5073a9bbbb2bd6ed7d10425b083578dc8d28d0d905e379fa3f919a60979e5b5c44ebc0ac613e6

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\BootstrapperCore.config
      Filesize

      1KB

      MD5

      0c79473766c4a706b8acacbeff369bc6

      SHA1

      f5470d0ec6fd98403fa756d1760ddf0ecb3c5b81

      SHA256

      c044ee99956b0b7628f29d2c7f8d0aaaf18054156acf910915c86edbb09476aa

      SHA512

      991a357bcea62be7e926a9768e3cf3d399303b5cc7667bfe71c9487de289efbeaca91d98e18880125daac6b7f73b6d298bbbd2276452f155e82173ac5aac1c02

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\BootstrapperCore.dll
      Filesize

      87KB

      MD5

      b0d10a2a622a322788780e7a3cbb85f3

      SHA1

      04d90b16fa7b47a545c1133d5c0ca9e490f54633

      SHA256

      f2c2b3ce2df70a3206f3111391ffc7b791b32505fa97aef22c0c2dbf6f3b0426

      SHA512

      62b0aa09234067e67969c5f785736d92cd7907f1f680a07f6b44a1caf43bfeb2df96f29034016f3345c4580c6c9bc1b04bea932d06e53621da4fcf7b8c0a489f

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\BootstrapperCore.dll
      Filesize

      87KB

      MD5

      b0d10a2a622a322788780e7a3cbb85f3

      SHA1

      04d90b16fa7b47a545c1133d5c0ca9e490f54633

      SHA256

      f2c2b3ce2df70a3206f3111391ffc7b791b32505fa97aef22c0c2dbf6f3b0426

      SHA512

      62b0aa09234067e67969c5f785736d92cd7907f1f680a07f6b44a1caf43bfeb2df96f29034016f3345c4580c6c9bc1b04bea932d06e53621da4fcf7b8c0a489f

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\ExpressVPN.Common.Shared.dll
      Filesize

      60KB

      MD5

      5c1c022ec70d55d24bf799f1e71d4575

      SHA1

      b1367945eb8e896a3f002f3e5ee6c8d1719b5f82

      SHA256

      09177650cb3caa6378aca696d5fce36f2bbe65f729a12b97aa887e8318507260

      SHA512

      372f951beb646c154de72c09ebf529f8bf6f70c6c073eb2467e5f9d59352ef102f0cce3b7a3164ab2c020c1f9b1e42aa7ec1095127ff576603dac814b7145070

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\ExpressVPN.Common.Shared.dll
      Filesize

      60KB

      MD5

      5c1c022ec70d55d24bf799f1e71d4575

      SHA1

      b1367945eb8e896a3f002f3e5ee6c8d1719b5f82

      SHA256

      09177650cb3caa6378aca696d5fce36f2bbe65f729a12b97aa887e8318507260

      SHA512

      372f951beb646c154de72c09ebf529f8bf6f70c6c073eb2467e5f9d59352ef102f0cce3b7a3164ab2c020c1f9b1e42aa7ec1095127ff576603dac814b7145070

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\ExpressVPN.Utils.dll
      Filesize

      111KB

      MD5

      76af5689ae5e1f396292b0ac8705e9b5

      SHA1

      d73ee7dd91892c57281947c8c1e921c622ff043f

      SHA256

      626c99223195921b3063ea350bd8449633c4f1d98614545d7487cb777f5097f3

      SHA512

      4616d073202a821c1240d2da43511ac1c6c69bc872b01da0f11747d9eb4f89132890c9877103273e5641b7e963eaa73b3335fd7b8b1f88f5d708892f532d2ad9

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\ExpressVPN.Utils.dll
      Filesize

      111KB

      MD5

      76af5689ae5e1f396292b0ac8705e9b5

      SHA1

      d73ee7dd91892c57281947c8c1e921c622ff043f

      SHA256

      626c99223195921b3063ea350bd8449633c4f1d98614545d7487cb777f5097f3

      SHA512

      4616d073202a821c1240d2da43511ac1c6c69bc872b01da0f11747d9eb4f89132890c9877103273e5641b7e963eaa73b3335fd7b8b1f88f5d708892f532d2ad9

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\ExpressVpn.Client.Setup.Shared.dll
      Filesize

      18KB

      MD5

      79335077a88f53da50c2d448ef4a6df0

      SHA1

      927d2fc8a3fa36aafa8c9ca6a96ec79607511e37

      SHA256

      28db0799ee4a3b7efc080de83bec170f0c35b53818e06e7da1b31fb10327920b

      SHA512

      992a1c0e47e56051f4b6f4d130b3528143657dcbd9104b58b66e0fd7a573c9e832c2a60d27034e5511aae793313a1ac178afabf9c1a77ed2dfb29fb55ac7f829

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\ExpressVpn.Client.Setup.Shared.dll
      Filesize

      18KB

      MD5

      79335077a88f53da50c2d448ef4a6df0

      SHA1

      927d2fc8a3fa36aafa8c9ca6a96ec79607511e37

      SHA256

      28db0799ee4a3b7efc080de83bec170f0c35b53818e06e7da1b31fb10327920b

      SHA512

      992a1c0e47e56051f4b6f4d130b3528143657dcbd9104b58b66e0fd7a573c9e832c2a60d27034e5511aae793313a1ac178afabf9c1a77ed2dfb29fb55ac7f829

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\ExpressVpn.Common.Logging.dll
      Filesize

      79KB

      MD5

      85808933176b57cd4c9dc7f506071dd8

      SHA1

      7c8184c7da881ff84bf71f2587353ade0aa3f2b1

      SHA256

      8fb910654c881b51c4c5a0ddf55302a1e98ce9ab5dc5164726b4b848fc70db8f

      SHA512

      13f41d43de8a1eec53720f9c9da3bf223a4142fb3d53f8cfedded550f616bd44770f123f722476fd7fc70cb39e99e4222c84ea1de22af755f31cad7333350701

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\ExpressVpn.Common.Logging.dll
      Filesize

      79KB

      MD5

      85808933176b57cd4c9dc7f506071dd8

      SHA1

      7c8184c7da881ff84bf71f2587353ade0aa3f2b1

      SHA256

      8fb910654c881b51c4c5a0ddf55302a1e98ce9ab5dc5164726b4b848fc70db8f

      SHA512

      13f41d43de8a1eec53720f9c9da3bf223a4142fb3d53f8cfedded550f616bd44770f123f722476fd7fc70cb39e99e4222c84ea1de22af755f31cad7333350701

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Microsoft.Bcl.AsyncInterfaces.dll
      Filesize

      21KB

      MD5

      48efe61d6ca3054309907b532d576d2a

      SHA1

      f36403aabb16540c93fb35245ec0b4e435628aae

      SHA256

      295af2142d9214f3fd84eafe4778dca119be7e0229f14b6ba8d5269c2f1e2e78

      SHA512

      778e7c4675d8fde9e083230213d2efa19aa6924fe892ed74fa1ea2ec16743bb14b99b51856e75eaef632d57be7f36dd1bc7ce39a7c2b0435b2f3211bb19836a3

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Microsoft.Bcl.AsyncInterfaces.dll
      Filesize

      21KB

      MD5

      48efe61d6ca3054309907b532d576d2a

      SHA1

      f36403aabb16540c93fb35245ec0b4e435628aae

      SHA256

      295af2142d9214f3fd84eafe4778dca119be7e0229f14b6ba8d5269c2f1e2e78

      SHA512

      778e7c4675d8fde9e083230213d2efa19aa6924fe892ed74fa1ea2ec16743bb14b99b51856e75eaef632d57be7f36dd1bc7ce39a7c2b0435b2f3211bb19836a3

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Microsoft.Extensions.DependencyInjection.Abstractions.dll
      Filesize

      46KB

      MD5

      405bf969e7e50ef47422e54fa33605c8

      SHA1

      4f3c5c8803212719ee74c60813b9ae08604684b3

      SHA256

      95a7c66abd60ba45a2020ac3d42702fd9823f7b6db2ceec6a37c9e9b0602fed1

      SHA512

      d04978227453e3341fbdc6a8730da193f1c5e19a2635e02cb5d6eb6fef7c3ea53cf7df5df16230c12693cdaaccc90add812c5ad0a6ed0749e8de75c03602502a

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Microsoft.Extensions.DependencyInjection.Abstractions.dll
      Filesize

      46KB

      MD5

      405bf969e7e50ef47422e54fa33605c8

      SHA1

      4f3c5c8803212719ee74c60813b9ae08604684b3

      SHA256

      95a7c66abd60ba45a2020ac3d42702fd9823f7b6db2ceec6a37c9e9b0602fed1

      SHA512

      d04978227453e3341fbdc6a8730da193f1c5e19a2635e02cb5d6eb6fef7c3ea53cf7df5df16230c12693cdaaccc90add812c5ad0a6ed0749e8de75c03602502a

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Microsoft.Extensions.DependencyInjection.dll
      Filesize

      82KB

      MD5

      f2a9c263e730b94057d26d8e6562e342

      SHA1

      e36e4c8100585db5c7dbd07ff66f4adad8ccd37f

      SHA256

      d6de20035b25367a82da6180c45511d9077374c5f96f6cc5fedd2107d61efb9c

      SHA512

      976fff499e641484a176801ca904221270220d07a1ffe14c03a9b3f32372a264ebe25e704dc63ec18f1bc2a430afa6a098847c327d695a3d19359422a300d4e9

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Microsoft.Extensions.DependencyInjection.dll
      Filesize

      82KB

      MD5

      f2a9c263e730b94057d26d8e6562e342

      SHA1

      e36e4c8100585db5c7dbd07ff66f4adad8ccd37f

      SHA256

      d6de20035b25367a82da6180c45511d9077374c5f96f6cc5fedd2107d61efb9c

      SHA512

      976fff499e641484a176801ca904221270220d07a1ffe14c03a9b3f32372a264ebe25e704dc63ec18f1bc2a430afa6a098847c327d695a3d19359422a300d4e9

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Microsoft.Extensions.Logging.Abstractions.dll
      Filesize

      51KB

      MD5

      1237591a98cea80b03eaa68dbbcb2176

      SHA1

      5761dfe8070d1e273c20bf6ce50eb46a8780e065

      SHA256

      ce8a3129430b92e206d59720adff91ebae0af7c8a808ba81b2ecf9ce680260e1

      SHA512

      1446308e87aaf15ac1b3f79d8f4620b2172fb4c5f34059df75fae0ab244015cae6ac46faa86a0ab91b71d51bf91476dc407f473016ed0b71526ff6e446bbda07

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Microsoft.Extensions.Logging.Abstractions.dll
      Filesize

      51KB

      MD5

      1237591a98cea80b03eaa68dbbcb2176

      SHA1

      5761dfe8070d1e273c20bf6ce50eb46a8780e065

      SHA256

      ce8a3129430b92e206d59720adff91ebae0af7c8a808ba81b2ecf9ce680260e1

      SHA512

      1446308e87aaf15ac1b3f79d8f4620b2172fb4c5f34059df75fae0ab244015cae6ac46faa86a0ab91b71d51bf91476dc407f473016ed0b71526ff6e446bbda07

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Newtonsoft.Json.dll
      Filesize

      683KB

      MD5

      6815034209687816d8cf401877ec8133

      SHA1

      1248142eb45eed3beb0d9a2d3b8bed5fe2569b10

      SHA256

      7f912b28a07c226e0be3acfb2f57f050538aba0100fa1f0bf2c39f1a1f1da814

      SHA512

      3398094ce429ab5dcdecf2ad04803230669bb4accaef7083992e9b87afac55841ba8def2a5168358bd17e60799e55d076b0e5ca44c86b9e6c91150d3dc37c721

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\Newtonsoft.Json.dll
      Filesize

      683KB

      MD5

      6815034209687816d8cf401877ec8133

      SHA1

      1248142eb45eed3beb0d9a2d3b8bed5fe2569b10

      SHA256

      7f912b28a07c226e0be3acfb2f57f050538aba0100fa1f0bf2c39f1a1f1da814

      SHA512

      3398094ce429ab5dcdecf2ad04803230669bb4accaef7083992e9b87afac55841ba8def2a5168358bd17e60799e55d076b0e5ca44c86b9e6c91150d3dc37c721

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\System.Threading.Tasks.Extensions.dll
      Filesize

      25KB

      MD5

      e1e9d7d46e5cd9525c5927dc98d9ecc7

      SHA1

      2242627282f9e07e37b274ea36fac2d3cd9c9110

      SHA256

      4f81ffd0dc7204db75afc35ea4291769b07c440592f28894260eea76626a23c6

      SHA512

      da7ab8c0100e7d074f0e680b28d241940733860dfbdc5b8c78428b76e807f27e44d1c5ec95ee80c0b5098e8c5d5da4d48bce86800164f9734a05035220c3ff11

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\System.Threading.Tasks.Extensions.dll
      Filesize

      25KB

      MD5

      e1e9d7d46e5cd9525c5927dc98d9ecc7

      SHA1

      2242627282f9e07e37b274ea36fac2d3cd9c9110

      SHA256

      4f81ffd0dc7204db75afc35ea4291769b07c440592f28894260eea76626a23c6

      SHA512

      da7ab8c0100e7d074f0e680b28d241940733860dfbdc5b8c78428b76e807f27e44d1c5ec95ee80c0b5098e8c5d5da4d48bce86800164f9734a05035220c3ff11

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\WixSharp Setup.exe
      Filesize

      1.5MB

      MD5

      29ef76d3f5d45b200c62f4e2661181db

      SHA1

      b3d6a4bbeb429b42f2a9fbdb090b1e1ab1d32c43

      SHA256

      aed2bd63c0eaa5c0e366cbb23cf35de086e37d1a4d748528d2634931d127f53c

      SHA512

      e0fbcc549ffb0b4adfd989c38513b9f2cd1d0dac7b15dabb661259ba66dea799b4ee5a412ebb7706e8995d51bf86eb50df64366a7599206ebe1e8986ebe8c85b

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\WixSharp Setup.exe
      Filesize

      1.5MB

      MD5

      29ef76d3f5d45b200c62f4e2661181db

      SHA1

      b3d6a4bbeb429b42f2a9fbdb090b1e1ab1d32c43

      SHA256

      aed2bd63c0eaa5c0e366cbb23cf35de086e37d1a4d748528d2634931d127f53c

      SHA512

      e0fbcc549ffb0b4adfd989c38513b9f2cd1d0dac7b15dabb661259ba66dea799b4ee5a412ebb7706e8995d51bf86eb50df64366a7599206ebe1e8986ebe8c85b

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.ba\mbahost.dll
      Filesize

      119KB

      MD5

      c59832217903ce88793a6c40888e3cae

      SHA1

      6d9facabf41dcf53281897764d467696780623b8

      SHA256

      9dfa1bc5d2ab4c652304976978749141b8c312784b05cb577f338a0aa91330db

      SHA512

      1b1f4cb2e3fa57cb481e28a967b19a6fefa74f3c77a3f3214a6b09e11ceb20ae428d036929f000710b4eb24a2c57d5d7dfe39661d5a1f48ee69a02d83381d1a9

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.be\ExpressVPN_12.43.0.0.exe
      Filesize

      10.3MB

      MD5

      3b2354b92f91a4383b867b594196cd1c

      SHA1

      43c830cfa6b873b66a323e3747a199365cb18b50

      SHA256

      2600f1e1b62070d15018ee507d9f91dd13ed93b775c4c62ffbfda85f601d85e7

      SHA512

      7421cc4f7254099f87c49a201f8816fa1adacd14333818bd85bed941c82932656159da3aaac1e7d2246874068020bfd5947f6d157882f8703408adce8ce288da

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.be\ExpressVPN_12.43.0.0.exe
      Filesize

      10.3MB

      MD5

      3b2354b92f91a4383b867b594196cd1c

      SHA1

      43c830cfa6b873b66a323e3747a199365cb18b50

      SHA256

      2600f1e1b62070d15018ee507d9f91dd13ed93b775c4c62ffbfda85f601d85e7

      SHA512

      7421cc4f7254099f87c49a201f8816fa1adacd14333818bd85bed941c82932656159da3aaac1e7d2246874068020bfd5947f6d157882f8703408adce8ce288da

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\.be\ExpressVPN_12.43.0.0.exe
      Filesize

      10.3MB

      MD5

      3b2354b92f91a4383b867b594196cd1c

      SHA1

      43c830cfa6b873b66a323e3747a199365cb18b50

      SHA256

      2600f1e1b62070d15018ee507d9f91dd13ed93b775c4c62ffbfda85f601d85e7

      SHA512

      7421cc4f7254099f87c49a201f8816fa1adacd14333818bd85bed941c82932656159da3aaac1e7d2246874068020bfd5947f6d157882f8703408adce8ce288da

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\MainMsi
      Filesize

      69.2MB

      MD5

      6b317a8789f3b27198323d006bf35d5d

      SHA1

      acc0016e0840199e2c24a9bd76baf92a91c362cc

      SHA256

      9f37bd05c7c7cdd185e660c0542fdc5d5c8e184817b72f18ef02e154724e03e7

      SHA512

      26d9ffc44d7f472ca0fd80c75040e9da8d142dc971c489ca1b9d7b8e3c035c59d26501bd23edb40a8dc3a077d9b79f310b4a83ab9960d288df2d14b4d0dedbb0

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\Net6DesktopRuntime64
      Filesize

      55.1MB

      MD5

      26d558f92be15a50d59b8261123de56b

      SHA1

      b5b1819cca753b070181f50411375b80412860a3

      SHA256

      1b305b1ae89b2391a4411bb2c5edb6b059a7bf7955275c57b43d1f2a94ce3f62

      SHA512

      5eb1537295cdb513197419c311777229fd43af6cea0ef6134f9990b32b8ac26aa51139f2c0b63d9cdfb6d753dd9db6f243b887ec511f15866157aa9e127b5cea

    • C:\Windows\Temp\{2EED49A3-69A5-4485-A841-BBA53BC97FBB}\VCRedist64
      Filesize

      24.3MB

      MD5

      703bd677778f2a1ba1eb4338bac3b868

      SHA1

      a176f140e942920b777f80de89e16ea57ee32be8

      SHA256

      2257b3fbe3c7559de8b31170155a433faf5b83829e67c589d5674ff086b868b9

      SHA512

      a66ea382d8bdd31491627fd698242d2eda38b1d9df762c402923ef40bbca6aa2f43f22fa811c5fc894b529f9e77fcdd5ced9cd8af4a19f53845fce3780e8c041

    • C:\Windows\Temp\{D19A2907-63FB-4276-8D24-1B84CFF14FB7}\.cr\VC_redist.x64.exe
      Filesize

      635KB

      MD5

      848da6b57cb8acc151a8d64d15ba383d

      SHA1

      8f4d4a1afa9fd985c67642213b3e7ccf415591da

      SHA256

      5a61f9775032457db28edd41f98f08c874e759f344ea8475c9ac8abbba68de12

      SHA512

      ff8b87e7746ecf19a150874dedd6ea4c51c76cfc291c5a80d9e5073a9bbbb2bd6ed7d10425b083578dc8d28d0d905e379fa3f919a60979e5b5c44ebc0ac613e6

    • C:\Windows\Temp\{D19A2907-63FB-4276-8D24-1B84CFF14FB7}\.cr\VC_redist.x64.exe
      Filesize

      635KB

      MD5

      848da6b57cb8acc151a8d64d15ba383d

      SHA1

      8f4d4a1afa9fd985c67642213b3e7ccf415591da

      SHA256

      5a61f9775032457db28edd41f98f08c874e759f344ea8475c9ac8abbba68de12

      SHA512

      ff8b87e7746ecf19a150874dedd6ea4c51c76cfc291c5a80d9e5073a9bbbb2bd6ed7d10425b083578dc8d28d0d905e379fa3f919a60979e5b5c44ebc0ac613e6

    • memory/3592-313-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-316-0x000000007F250000-0x000000007F260000-memory.dmp
      Filesize

      64KB

    • memory/3592-293-0x000000007F250000-0x000000007F260000-memory.dmp
      Filesize

      64KB

    • memory/3592-296-0x0000000007EC0000-0x0000000007EC8000-memory.dmp
      Filesize

      32KB

    • memory/3592-297-0x000000000A3E0000-0x000000000A418000-memory.dmp
      Filesize

      224KB

    • memory/3592-298-0x000000000A3B0000-0x000000000A3BE000-memory.dmp
      Filesize

      56KB

    • memory/3592-299-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-262-0x00000000070F0000-0x000000000710A000-memory.dmp
      Filesize

      104KB

    • memory/3592-303-0x000000000A5D0000-0x000000000A5D8000-memory.dmp
      Filesize

      32KB

    • memory/3592-266-0x0000000007130000-0x0000000007150000-memory.dmp
      Filesize

      128KB

    • memory/3592-280-0x0000000007110000-0x000000000711A000-memory.dmp
      Filesize

      40KB

    • memory/3592-312-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-284-0x0000000007180000-0x0000000007190000-memory.dmp
      Filesize

      64KB

    • memory/3592-314-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-315-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-292-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-317-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-291-0x0000000006E10000-0x0000000006E32000-memory.dmp
      Filesize

      136KB

    • memory/3592-257-0x0000000006F10000-0x0000000006F28000-memory.dmp
      Filesize

      96KB

    • memory/3592-272-0x0000000007150000-0x0000000007168000-memory.dmp
      Filesize

      96KB

    • memory/3592-253-0x0000000006B90000-0x0000000006BA0000-memory.dmp
      Filesize

      64KB

    • memory/3592-288-0x0000000007420000-0x00000000074D0000-memory.dmp
      Filesize

      704KB

    • memory/3592-261-0x00000000070D0000-0x00000000070E4000-memory.dmp
      Filesize

      80KB

    • memory/3592-249-0x00000000049E0000-0x00000000049E8000-memory.dmp
      Filesize

      32KB

    • memory/3592-245-0x0000000006F40000-0x00000000070C8000-memory.dmp
      Filesize

      1.5MB

    • memory/3592-267-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-268-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-238-0x0000000004950000-0x0000000004968000-memory.dmp
      Filesize

      96KB

    • memory/3592-233-0x0000000006BA0000-0x0000000006BB0000-memory.dmp
      Filesize

      64KB

    • memory/3592-276-0x0000000006F30000-0x0000000006F3A000-memory.dmp
      Filesize

      40KB