Analysis

  • max time kernel
    296s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 04:50

General

  • Target

    4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe

  • Size

    833KB

  • MD5

    02e6b05a5b3bccc63fb6b3fa09bd4f70

  • SHA1

    5623fe73980bbd64b70adc6ceaf92f414aae097f

  • SHA256

    4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d

  • SHA512

    d8079833c6e7d2a53b497f037306c74ea7705c95e27c54771bb1220e843d08f373261e72ec04b8353f4cc358779fa97702c43d9b9f4332cec37bbe4ff1a1d6ce

  • SSDEEP

    24576:oGvU6wUbW4oVU9FZhQRUZ/fXCHpxjuDTv:HvaUtoiZhQq/fd

Malware Config

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdcc

  • offline_id

    LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw

rsa_pubkey.plain

Extracted

Family

vidar

Version

7.6

Botnet

1b9d7ec5a25ab9d78c31777a0016a097

C2

https://t.me/tvrugrats

https://steamcommunity.com/profiles/76561199627279110

Attributes
  • profile_id_v2

    1b9d7ec5a25ab9d78c31777a0016a097

Signatures

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 11 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe
    "C:\Users\Admin\AppData\Local\Temp\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe
      "C:\Users\Admin\AppData\Local\Temp\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\2b2e7874-2df0-46de-8889-1f5aa95dc61a" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:2352
      • C:\Users\Admin\AppData\Local\Temp\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe
        "C:\Users\Admin\AppData\Local\Temp\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Users\Admin\AppData\Local\Temp\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe
          "C:\Users\Admin\AppData\Local\Temp\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
            "C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2156
          • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe
            "C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1972
            • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe
              "C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2568
  • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
    "C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe"
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 1448
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:3024
  • C:\Windows\SysWOW64\schtasks.exe
    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
    1⤵
    • Creates scheduled task(s)
    PID:1948
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {C674C21F-224D-4A91-BBE2-05F8060CE2FE} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]
    1⤵
      PID:700
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        PID:2264
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:1724
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:1200
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2828
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:488
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:1044
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:1604
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:1744
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:1820
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2168
    • C:\Windows\SysWOW64\schtasks.exe
      /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
      1⤵
      • Creates scheduled task(s)
      PID:1964

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    File and Directory Permissions Modification

    1
    T1222

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      8112ab2a9d7578692e66734917d00015

      SHA1

      5dc1f7cb2c66c925d195fb98784917d108a001dd

      SHA256

      919561b1927726f5218e79f21184c4bf7117db4466686fc93d3d5dbc1380033b

      SHA512

      538f1f36b44d628d2ade163cc40deb58b50cb7fbd56019d9526c8233c30771db8542ed5786d311322dfd2e9d44e979da9513c4a0bbc7416b47bb7beca90013d1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      cf1bfb0e35cda7fbe0e28d47cb08df15

      SHA1

      3ecb452e49ca22761b7302721e9acf1c5a10811e

      SHA256

      270f508ea59254a325edf2501bcdf85d50bdadf7c6d6e853d16d5fa0e1658504

      SHA512

      1a9fb85ec59c91a0d3f7cf24e54d268c53ce54434ad236cedb13bfff0e05f420d7e596707d2103b014be1f2e9a590e1618de58afab8a29583bc72d8d8a225922

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      f582533c4b8adcba226ceffee5bf27f2

      SHA1

      0c7e2a36a1198254e9ee4143fa1ae837b61547af

      SHA256

      889758bc1065bd9ca24229683f32a7db7403c524d2daf158c57a30b0e51c84e7

      SHA512

      9e392b5e9c01d894afdabd5fc2fa8e64cded344a91634390f41f55e56a9901dd5c0e070440b3fa4a72d160a6285c33f0d80125a00fc51d0036b2a243a14f9686

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      5135b621e17e718f8270942375cfbdc6

      SHA1

      a9e61ecd85121712980d183cfe565dde2c7cc62b

      SHA256

      d447298737de09a49c2772bc3f253ad5736476a58fef26521174b9991edb5e20

      SHA512

      98fd44657ebacffb06fb0635907ff4bdcfed38f886b418cc6e7c86be9182aa9a03afa04ee537b8542d6afa08747bd9c6e26340af17b24a1e429ff2377d03c795

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      392B

      MD5

      82eedb2bb300f3f7eb1890d86e20e115

      SHA1

      4d4998e2af22a4c72575ae479ec6c1ada42be91b

      SHA256

      7497efb18571a6a087b0817f8ac812a0537e8156a34d1500b3171b40fe8021e2

      SHA512

      6a403c6a5da1f2e72ffe6941ac05c7e726dcf7d315d8b77a88110c10fae7b6bcbd7fefa3d727c3f6652a7f577edc6dad0dc9504b136262b48454b8024c9ec94c

    • C:\Users\Admin\AppData\Local\2b2e7874-2df0-46de-8889-1f5aa95dc61a\4db3c3cbc49012848a0be2614f4510ae1c29b43aa35973ebf431c7fe1c6c4c8d.exe
      Filesize

      114KB

      MD5

      9fdf9a74e3c0a1e26535c6a4e0a856fa

      SHA1

      db857e1c3dc2d31c092141fe40456508104104f1

      SHA256

      0853d11c2fb7a388255d887f61927d8f522e54eabc14056c8fcbb41d3dd2bcc3

      SHA512

      58c5d76d35803d92172046fa33c781c16902908ab259588c7f7ba72b1372e8dd78f6377fc4b09e69772b75ec84cc5bc4d60a41eadb6b9012338eba3732d9e414

    • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      79KB

      MD5

      52ca5d607e02d345c2f318d1663e735d

      SHA1

      6f5760b50cfd4b519b16eee70daa527ef6a930ca

      SHA256

      de344b49109555b4472cb3a4953e17b0fc841d2ba5ada42a8a01ddf83eca7475

      SHA512

      aefb158a6ff923f49545c6c054c856fb1e8e37ffdc106cbc93419d027806330d7f3b2debb3bbac0f22308c64a99cc6bad3f7b2afa70e4137efb005c2b6c8ff7f

    • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      34KB

      MD5

      9f41f6ca8141687693f303fdd23ce89e

      SHA1

      9bf1f18f0e829fca53715cc8f544ef619770b958

      SHA256

      0a4d3d3835b37dd4ce45ff5a294ddabe8f9447e124834e3dac6552d679ed880e

      SHA512

      c04d663877f89b55a65f4163f511652abff1878a6c30513cf42d351238d62f068832f5baa4f4c30d913267b52af9632c6657c9fdb6407c1affd15dc16dc59721

    • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      83KB

      MD5

      c93759d4bea90c6d964c7d7a18a09ec9

      SHA1

      23b55498ce5851f210574bd9795aa26e9eb53d71

      SHA256

      4396d66981401925ebd94d85fa0e68b14155032647e0462dcb597227539b1655

      SHA512

      1ce7faea9370a10c42361c8df73a29091d9b1a910b74576f5b44195fa6dca181186058236807607228305d7c95eae3ec36a6929d6f18ba7495fb47c6733b4827

    • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      37KB

      MD5

      457397d607c01f77f67b74485f5b75f4

      SHA1

      801a5bbb6f29229bf2ef60b0e376f80d01b7afb4

      SHA256

      304983275785ddb41f442b4f45b66d43a24b7f54bed7e144f302653c4cc614ab

      SHA512

      8a5cb82d1634b02ca4e6d32cc548316247e416909b3e855cb4bb3fe40de7c735d5f334e6ba69726bb6d24101640227ca311a83898e9dd3e1500ffa3c85134005

    • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe
      Filesize

      175KB

      MD5

      77a8e8501d3e20f7f441c732902f0073

      SHA1

      75a5acad3cc66492948a0b30a64b8802ebad58a0

      SHA256

      1ef286edb270bf68b5f2483e0e668b70b5c72de84022d00e224fb20140fc7164

      SHA512

      f6aeda101b2540577630ac521ed8287824b163a5749388c449bfe0641e4cb1ec7c1d29e0d8b387678371772e2323ce6f2931f8c626d614ce33ef8aed2af26fd0

    • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe
      Filesize

      287KB

      MD5

      1b2d77c96b5194b6368989064bd7194c

      SHA1

      1c8e0c7df00ddd940398da90690416904dcad7d6

      SHA256

      32676dc29c4a41c1681c9a64131f53fd874995fb242a59749dd3013742f92150

      SHA512

      4066cf53dba68df904b59e58acd469ba56a01bffa419f0808582159cb4c31c47030abe8f123016689377e380e4a6fffe1b9cb21b37ae41a5815b391a1d10194a

    • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe
      Filesize

      299KB

      MD5

      41b883a061c95e9b9cb17d4ca50de770

      SHA1

      1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

      SHA256

      fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

      SHA512

      cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

    • C:\Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe
      Filesize

      253KB

      MD5

      c63ae370a31cc7efcd38732b9d1826ed

      SHA1

      2e19b44da461f1b62c225f28a94b7e3dda67c46a

      SHA256

      d5746b071abbda5a4c040ab987b2369e71bd9761de7034a8af8d05f98ff9ada7

      SHA512

      fb629c28a9398d5ed6735b0490ce8478d8f820f8d538976f5c592fffca13687619fe9598b06a2bf38bde70911938102b721c503e6a1159346b2ea2ad956c6ab6

    • C:\Users\Admin\AppData\Local\Temp\Cab1EB7.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar342B.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      79KB

      MD5

      356bb15a09d205ec41d0eca0ff04d892

      SHA1

      f81524a6340f57aa0148b2a3225cba9c2d621ec5

      SHA256

      d2d940202d353355d4d2d76db9191efd5d20e872c241318b46c49554fb1fe45f

      SHA512

      5ffba4e5d02f29133bcf4460931c3c97fa94bc978a083d5324389103dc23b0baa83f87f2370f97b71bfd500a11c0f9052b4b8bc98a0bc0eb618b71c72d2e8f35

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      28KB

      MD5

      ab86779177976f66e4111c38d07ecfea

      SHA1

      6428deba22b32d773d676c479dda788e96e2f4c0

      SHA256

      dd1b72a09d5e5b1cf22df3dfd95dd992c4957825dfdcffabb31fb6661e8e93f2

      SHA512

      a6d42a8cd4512526b986528b6725679faece307515a2ce528630c7bf764e7054415a90c15872be3e0570c49a38a559600674a2dfcddd511d854187d002845a54

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      97KB

      MD5

      1e64d97942830627fb544873647820e1

      SHA1

      29c6a1c88848453f38186e8d8ce350e2566ffc41

      SHA256

      d1cd178a86765bdb6ac0f0a292ea47527f3b86fb820dfd1308c64db4c0d4b547

      SHA512

      defbd03835dd4cb2a429c50d3e0c89b6e7bf18af363a071f87874a21737917cb5b64609fbc02683d22b6b7c40df5f5adf196301051dd484be2568fb62a37babd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      89KB

      MD5

      959218f467096e542bfd79ae9b12ee07

      SHA1

      0c5c62030638d0c5dce0f8c6337e0ea4f2e7498c

      SHA256

      0c8aa0821253376cb322899b9ec719ec26a618e14d8936c5f486caff96fc44ec

      SHA512

      482ae8332a047811554cc9c1c9e5ca10476ccba8e0932002f0903f48eb77a35f94062a8a2c55f71ef0430f085c6a1eb7fafa8efb751758da8b890f76fd74932c

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      163KB

      MD5

      868f5864540d7cf48782bf649d56f0bf

      SHA1

      6fc615469285a82194165dfecaabc0dcce67b692

      SHA256

      690d1c9a53e57e84623b84828cbf29dcfd4732e26d48e165db335bc73256d185

      SHA512

      a50ef03ff398d39dae7f0e87a63ef8186b1f28facb5fcb9c29d147cb4f0b132bbd1c4635ec4f3bbfee9646c65d693f24df1d9b22496b46635060fdcc5d2ec1c4

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      114KB

      MD5

      a0bce227c358159a31ef1fb5548ed269

      SHA1

      0632060bf7e530936304612397cb5187786256fd

      SHA256

      840b9745afb5e576591de7eda7eae7e581a59b5f1514180d54cde76e6be138b4

      SHA512

      a82cd0dc2f3ba1f568a99b45e442bb746717f196c7beea2c4cebf209004eb74672629cdd1358e593decfc347228ff8ad0b324c826a451c8464eb4a3b81535a97

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      110KB

      MD5

      8213e926ef4527f9b72a12d770cb021d

      SHA1

      6fadf4b8aa5fc5336a854fb85c2a73452b56b621

      SHA256

      6d2d6781bc49b00123a877a14f2413cbea2827a847c6ef74f90e770d09cb388d

      SHA512

      ce9090ac62cd6da1dee93c1d8e244c907742f0f2e0a1df685dfe4c21555528eb4df236a749f55ecfe8d7141a78c172542a53c3d07ef16d71516a57e77a0a3a5e

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      127KB

      MD5

      4eb6219d3feac9925914b2143ce31805

      SHA1

      fdeb64c9d90ee6f06c0d5e848f6cbdea6bce7560

      SHA256

      628707804c7fa718b9bab1d29277afa415d29e0f908db30f5ef1d74d921c828b

      SHA512

      9698b7ceea829bbfdc5bfd02ec42525da497bcff88b096e2d2323feb00172bbbb40dbc1128ce5888f81b0cc0de93f30e6e8571148f03bdc2e176f74e53934680

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      136KB

      MD5

      dee84a0a48acb5fcbb9e28a2e014f532

      SHA1

      233f14d667f6c378766669d9de107ca3bff560ca

      SHA256

      913d61306712f953f4d6054c7ea87a04ac8e654fa65605b23d2162cd7b103288

      SHA512

      f5be2bda0a1bc4d6b7f48994e66baf947ac8ef2fcac8a4f38edd5cc8d2b934eb91bda7f5355a318728f2446fc2533fb9e64873135a69cd63a28d55990a0ba2c4

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      140KB

      MD5

      5575dcd8dce190a8575d55f895d7248b

      SHA1

      05460b8ec1bcfbf9b15b489470d0c3ac9dabe2a0

      SHA256

      d1cc1fc1184bf6b5fe1f1169c1f0ace896edbffcd09b7f531758dc29a680bb31

      SHA512

      e0d9802b86e9f2635f8f3640161090d50fee44a323b67e29c262bd4e4deb7ce352649ca66a38fff9e441643472cad6250cdcdd958b372502ed8c13d0d79c398a

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      68KB

      MD5

      84fc5f7487db73593d06bd799cdec536

      SHA1

      26dc687213028606035d915587f99a9d0a860034

      SHA256

      5e228391775681648b5bd76fe67a8d0f6a721d0d83e2797d4a3cec6b7cc18fbb

      SHA512

      fd4ee4792a2b591d89de260a4e0bdde102af1fbef64b0b802be7e294ed4abc31db021a45732eef143565aff64b8dc7561f625063edc67739a30089eff69826ca

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      105KB

      MD5

      ce0c40bc9e223b8d29a58107149f41bf

      SHA1

      e36e915315da7b299a7098724bae28128653095e

      SHA256

      a9b536ea4237d39cca415659c4fb3c703cf737409d0a218ca345d8d4c801f36b

      SHA512

      ae8bd51f211438d5ae791c09997e8d2e72face7ef578cbc2e96f6b6050f61bd18579ab7526ca5d195b38970f8e590d701f33598e8c583ace099781d372973294

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build2.exe
      Filesize

      130KB

      MD5

      bb6ab14985482f8e22d4aad3001d9569

      SHA1

      ecdfa23191ae9bdd53c2a5c6a1d217ed0f523ceb

      SHA256

      c42c9a7536496d0a2cefb1f6b8e71bdd02dcb7cd16e7deaf6a2025e435bdeae8

      SHA512

      85d3434a986a96a27130c27f1f2a0734c8cdadc7b8ae852baae835edb047046abafa981f8cc976ff8cd1d15b2d772961ea4921e1625c44845de05d4cb93c65bd

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe
      Filesize

      69KB

      MD5

      94be4125e5c90b017bf374a3a228a78b

      SHA1

      c4edc2d852273912899698737a2f99ae78b9ae81

      SHA256

      90cbaf237e58a7f4c843fd9454fc7925deb890c1ade67ead808961286422976d

      SHA512

      81aafc70be857d5c9b7e0b93c009a67acb7487bf98be1363a5135c26a0d5a2d137b9a41bba284f95a8ce6f0ed2b14d9f8fd59a79e0916fd1599484ba8927985c

    • \Users\Admin\AppData\Local\4b458e42-914f-4aef-8712-0752fa6f9a58\build3.exe
      Filesize

      214KB

      MD5

      a51e5ac00cdc4efdc0bf6007e14c6eb2

      SHA1

      6ab7cc7879ebe19314e46cab212c58bf82fda980

      SHA256

      99964b819c804ca04114660bfd81b1a30a87e02180279348eb94e6b6e10894b6

      SHA512

      88946ba30b67f49e5561d7691a6fe3b0afc964d75dc9abd27dccbfef19e49293953de30add5e3ee4ba6be9800d743a3abf052272f95f8e29cb2768e103f78c7f

    • memory/488-294-0x0000000000270000-0x0000000000370000-memory.dmp
      Filesize

      1024KB

    • memory/1200-264-0x0000000000982000-0x0000000000992000-memory.dmp
      Filesize

      64KB

    • memory/1544-70-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1544-228-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/1544-77-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/1544-72-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/1544-78-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/1604-323-0x0000000000332000-0x0000000000342000-memory.dmp
      Filesize

      64KB

    • memory/1672-8-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1672-7-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1672-5-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1672-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1672-26-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1720-0-0x00000000004E0000-0x0000000000571000-memory.dmp
      Filesize

      580KB

    • memory/1720-1-0x00000000004E0000-0x0000000000571000-memory.dmp
      Filesize

      580KB

    • memory/1720-3-0x0000000001D90000-0x0000000001EAB000-memory.dmp
      Filesize

      1.1MB

    • memory/1820-363-0x00000000008B0000-0x00000000009B0000-memory.dmp
      Filesize

      1024KB

    • memory/1820-353-0x00000000008B0000-0x00000000009B0000-memory.dmp
      Filesize

      1024KB

    • memory/1972-197-0x00000000001B0000-0x00000000001B4000-memory.dmp
      Filesize

      16KB

    • memory/1972-195-0x0000000000332000-0x0000000000343000-memory.dmp
      Filesize

      68KB

    • memory/2156-231-0x00000000001C0000-0x00000000001F0000-memory.dmp
      Filesize

      192KB

    • memory/2156-74-0x0000000000340000-0x000000000035B000-memory.dmp
      Filesize

      108KB

    • memory/2156-76-0x00000000001C0000-0x00000000001F0000-memory.dmp
      Filesize

      192KB

    • memory/2568-193-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/2568-191-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2568-200-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/2568-198-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/2688-229-0x0000000000220000-0x00000000002B1000-memory.dmp
      Filesize

      580KB

    • memory/2688-27-0x0000000000220000-0x00000000002B1000-memory.dmp
      Filesize

      580KB

    • memory/2688-29-0x0000000000220000-0x00000000002B1000-memory.dmp
      Filesize

      580KB

    • memory/2972-34-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2972-35-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2972-151-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2972-49-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2972-48-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2972-55-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2972-56-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2972-79-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2972-53-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB