Analysis

  • max time kernel
    293s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2023, 04:57

General

  • Target

    829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe

  • Size

    773KB

  • MD5

    db69da1c0bb0803f12994ee502770a3b

  • SHA1

    5c1068f82ec009f1b19dd32b8d3c08856e7fcc0e

  • SHA256

    829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6

  • SHA512

    27c1d30b72f7844982f5b2f194aa55dc5dc9ff79af0e500ca36cd5caa7aa9ba23d5c5a10ea4a4d5e38a16300fa9e01580a91f0eb3251bf1750aaa978a44b323a

  • SSDEEP

    12288:a5Mr5CVqpBno7YBjK2KwBjeHE8Dwx14j1Nj1LBHjqKgPB2VkqfSj:aYCgXeYBjK2ZjT82mP1LR42VPfSj

Malware Config

Extracted

Family

djvu

C2

http://zexeq.com/raud/get.php

Attributes
  • extension

    .ppvt

  • offline_id

    phJtdHo970vyx7vwlYG00OakDR75RuJz7NXDArt1

  • payload_url

    http://colisumy.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-eyUsqpKbFl Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0817JOsie

rsa_pubkey.plain

Signatures

  • Detected Djvu ransomware 14 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe
    "C:\Users\Admin\AppData\Local\Temp\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe
      "C:\Users\Admin\AppData\Local\Temp\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\733a7481-09ee-462b-8d17-1aeebeaa4c95" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2976
      • C:\Users\Admin\AppData\Local\Temp\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe
        "C:\Users\Admin\AppData\Local\Temp\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Users\Admin\AppData\Local\Temp\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe
          "C:\Users\Admin\AppData\Local\Temp\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe
            "C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1596
            • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe
              "C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:2936
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\KECBFBAEBK.exe"
                7⤵
                  PID:240
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe" & del "C:\ProgramData\*.dll"" & exit
                  7⤵
                    PID:2020
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 5
                      8⤵
                      • Delays execution with timeout.exe
                      PID:2028
              • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe
                "C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1112
                • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe
                  "C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3040
                  • C:\Windows\SysWOW64\schtasks.exe
                    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                    7⤵
                    • Creates scheduled task(s)
                    PID:556
      • C:\Windows\system32\taskeng.exe
        taskeng.exe {92E38259-A820-4CFC-A8F9-5A1C8BC04B4E} S-1-5-21-2084844033-2744876406-2053742436-1000:GGPVHMXR\Admin:Interactive:[1]
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2176
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:2796
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:2084
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              4⤵
              • Creates scheduled task(s)
              PID:2564
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:2996
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:2368
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:1968
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:1492
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:920
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:1504
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:1708
          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
            3⤵
            • Executes dropped EXE
            PID:2352

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

        Filesize

        1KB

        MD5

        20f3f79c0512ca66bfc591ece81b7c8a

        SHA1

        46d5d6945b91d788fdd5ae9b9cda6fd6eb00ee78

        SHA256

        2a63662abb65e53c96a524f85948c6ec6b6905ce6d4c9016095c8f7f16ad1aa1

        SHA512

        cf31784e2d299c209e7782ce749caee99d5abfe6ceca5a8e54508a11c3579f1b08e30b5d146b996563cc6ae8b765efa64528cf09eedf263a3ec2774ca1bf8384

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

        Filesize

        724B

        MD5

        8202a1cd02e7d69597995cabbe881a12

        SHA1

        8858d9d934b7aa9330ee73de6c476acf19929ff6

        SHA256

        58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

        SHA512

        97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

        Filesize

        410B

        MD5

        b6b5e178265a28d81871e4548d3cdf23

        SHA1

        d761f1fde20ccbd6c28089b9d12825f820334314

        SHA256

        17d29c667576fbf04e83683e9b4ae596e6e17cfa7be95a7369797d5dee849ec7

        SHA512

        6d617d3b408b73b06ee17502f11d54752b669396096ee32e579df5d8a4d38569d6b912623d5198e7c2fbc3bc39dcf2cb4ef27ee3fc09fe12ec13f1ae6009adb6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        01d7ce7579ea41dfcaa9341466381ece

        SHA1

        d6e699334c6ac5f15660086cc6a42166bef00607

        SHA256

        f9b39ea4c678536849518465135faa8b337819a81f7855519f11d54c40d2eab1

        SHA512

        9dbbae324300441a7ec98404b56448f35748723affb0da8173aae3963cd5b849414520073e85de06b14ca89cfada62bb1a61acb0200bc5e00b8233d39ca90839

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

        Filesize

        392B

        MD5

        18363bc0fad86932cb225c5504af8f9b

        SHA1

        af4f8ccd1680ebc26a888a0d7edfd2328a56e987

        SHA256

        e02f847a2e38af4b34050348cdeee981b1f514c1a85083fff4ce442a637df7d0

        SHA512

        db0bde79a2f4de2145ffdf331361895d639b8271ceb4453901f95ec5766b49ade44a8cb88bdff2bc0416be2bb2c9fc8dbe4b7af79ce9104d397e66932ded8d28

      • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe

        Filesize

        249KB

        MD5

        b60dda9836928c19f8e6ff647813fc2a

        SHA1

        10c6fc99a5352c640697bc4a133cc7265983a795

        SHA256

        2351b9bef85654b5b45d60f849f11eefc9345afd9072739504cac67d734da8d7

        SHA512

        0ea1062a0448de8c458a34bab9534fa88a14b912dde4e9e3a0e9ae6bd99a73226384ef8dd0c9a4d43657df89b3ce9a7d96a45ee4950b31e02d6565ca23d57b43

      • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe

        Filesize

        249KB

        MD5

        b60dda9836928c19f8e6ff647813fc2a

        SHA1

        10c6fc99a5352c640697bc4a133cc7265983a795

        SHA256

        2351b9bef85654b5b45d60f849f11eefc9345afd9072739504cac67d734da8d7

        SHA512

        0ea1062a0448de8c458a34bab9534fa88a14b912dde4e9e3a0e9ae6bd99a73226384ef8dd0c9a4d43657df89b3ce9a7d96a45ee4950b31e02d6565ca23d57b43

      • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe

        Filesize

        249KB

        MD5

        b60dda9836928c19f8e6ff647813fc2a

        SHA1

        10c6fc99a5352c640697bc4a133cc7265983a795

        SHA256

        2351b9bef85654b5b45d60f849f11eefc9345afd9072739504cac67d734da8d7

        SHA512

        0ea1062a0448de8c458a34bab9534fa88a14b912dde4e9e3a0e9ae6bd99a73226384ef8dd0c9a4d43657df89b3ce9a7d96a45ee4950b31e02d6565ca23d57b43

      • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe

        Filesize

        249KB

        MD5

        b60dda9836928c19f8e6ff647813fc2a

        SHA1

        10c6fc99a5352c640697bc4a133cc7265983a795

        SHA256

        2351b9bef85654b5b45d60f849f11eefc9345afd9072739504cac67d734da8d7

        SHA512

        0ea1062a0448de8c458a34bab9534fa88a14b912dde4e9e3a0e9ae6bd99a73226384ef8dd0c9a4d43657df89b3ce9a7d96a45ee4950b31e02d6565ca23d57b43

      • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Local\733a7481-09ee-462b-8d17-1aeebeaa4c95\829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6.exe

        Filesize

        773KB

        MD5

        db69da1c0bb0803f12994ee502770a3b

        SHA1

        5c1068f82ec009f1b19dd32b8d3c08856e7fcc0e

        SHA256

        829b537fcc03356bab21bfb8d742a2e23a272337628e747971363a824c7b6ea6

        SHA512

        27c1d30b72f7844982f5b2f194aa55dc5dc9ff79af0e500ca36cd5caa7aa9ba23d5c5a10ea4a4d5e38a16300fa9e01580a91f0eb3251bf1750aaa978a44b323a

      • C:\Users\Admin\AppData\Local\Temp\Cab844D.tmp

        Filesize

        61KB

        MD5

        f3441b8572aae8801c04f3060b550443

        SHA1

        4ef0a35436125d6821831ef36c28ffaf196cda15

        SHA256

        6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

        SHA512

        5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

      • C:\Users\Admin\AppData\Local\Temp\TarACB4.tmp

        Filesize

        163KB

        MD5

        9441737383d21192400eca82fda910ec

        SHA1

        725e0d606a4fc9ba44aa8ffde65bed15e65367e4

        SHA256

        bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

        SHA512

        7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • \ProgramData\mozglue.dll

        Filesize

        593KB

        MD5

        c8fd9be83bc728cc04beffafc2907fe9

        SHA1

        95ab9f701e0024cedfbd312bcfe4e726744c4f2e

        SHA256

        ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

        SHA512

        fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

      • \ProgramData\nss3.dll

        Filesize

        2.0MB

        MD5

        1cc453cdf74f31e4d913ff9c10acdde2

        SHA1

        6e85eae544d6e965f15fa5c39700fa7202f3aafe

        SHA256

        ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

        SHA512

        dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

      • \Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe

        Filesize

        249KB

        MD5

        b60dda9836928c19f8e6ff647813fc2a

        SHA1

        10c6fc99a5352c640697bc4a133cc7265983a795

        SHA256

        2351b9bef85654b5b45d60f849f11eefc9345afd9072739504cac67d734da8d7

        SHA512

        0ea1062a0448de8c458a34bab9534fa88a14b912dde4e9e3a0e9ae6bd99a73226384ef8dd0c9a4d43657df89b3ce9a7d96a45ee4950b31e02d6565ca23d57b43

      • \Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build2.exe

        Filesize

        249KB

        MD5

        b60dda9836928c19f8e6ff647813fc2a

        SHA1

        10c6fc99a5352c640697bc4a133cc7265983a795

        SHA256

        2351b9bef85654b5b45d60f849f11eefc9345afd9072739504cac67d734da8d7

        SHA512

        0ea1062a0448de8c458a34bab9534fa88a14b912dde4e9e3a0e9ae6bd99a73226384ef8dd0c9a4d43657df89b3ce9a7d96a45ee4950b31e02d6565ca23d57b43

      • \Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • \Users\Admin\AppData\Local\01f86fbb-0577-4098-a100-a56134ea9891\build3.exe

        Filesize

        299KB

        MD5

        41b883a061c95e9b9cb17d4ca50de770

        SHA1

        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

        SHA256

        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

        SHA512

        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

      • memory/240-388-0x00000000021F0000-0x00000000021F1000-memory.dmp

        Filesize

        4KB

      • memory/920-457-0x0000000000230000-0x0000000000330000-memory.dmp

        Filesize

        1024KB

      • memory/1112-234-0x00000000002A0000-0x00000000002A4000-memory.dmp

        Filesize

        16KB

      • memory/1112-232-0x0000000000860000-0x0000000000960000-memory.dmp

        Filesize

        1024KB

      • memory/1460-9-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/1460-27-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/1460-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1460-5-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/1460-8-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/1596-177-0x0000000000220000-0x000000000023C000-memory.dmp

        Filesize

        112KB

      • memory/1596-173-0x0000000000930000-0x0000000000A30000-memory.dmp

        Filesize

        1024KB

      • memory/1708-482-0x0000000000900000-0x0000000000A00000-memory.dmp

        Filesize

        1024KB

      • memory/1968-434-0x00000000008F0000-0x00000000009F0000-memory.dmp

        Filesize

        1024KB

      • memory/2352-485-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/2580-146-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2580-137-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2580-138-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2580-145-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2580-142-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2580-124-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2580-144-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2580-168-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2580-44-0x0000000000400000-0x0000000000537000-memory.dmp

        Filesize

        1.2MB

      • memory/2668-7-0x00000000002B0000-0x0000000000342000-memory.dmp

        Filesize

        584KB

      • memory/2668-1-0x00000000002B0000-0x0000000000342000-memory.dmp

        Filesize

        584KB

      • memory/2668-2-0x00000000020F0000-0x000000000220B000-memory.dmp

        Filesize

        1.1MB

      • memory/2668-0-0x00000000002B0000-0x0000000000342000-memory.dmp

        Filesize

        584KB

      • memory/2796-324-0x0000000000990000-0x0000000000A90000-memory.dmp

        Filesize

        1024KB

      • memory/2908-42-0x0000000000300000-0x0000000000392000-memory.dmp

        Filesize

        584KB

      • memory/2908-28-0x0000000000300000-0x0000000000392000-memory.dmp

        Filesize

        584KB

      • memory/2908-30-0x0000000000300000-0x0000000000392000-memory.dmp

        Filesize

        584KB

      • memory/2936-180-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-308-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-320-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-322-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-328-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-314-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-309-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-374-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-307-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-181-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-303-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-315-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-302-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-245-0x0000000061E00000-0x0000000061EF3000-memory.dmp

        Filesize

        972KB

      • memory/2936-244-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-243-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2936-176-0x0000000000400000-0x000000000062E000-memory.dmp

        Filesize

        2.2MB

      • memory/2996-416-0x00000000008F0000-0x00000000009F0000-memory.dmp

        Filesize

        1024KB

      • memory/3040-235-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/3040-231-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/3040-238-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/3040-240-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB