Analysis

  • max time kernel
    297s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2024 04:56

General

  • Target

    97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe

  • Size

    774KB

  • MD5

    faf9bf89fd060a85d2fcc98e9d511a8b

  • SHA1

    08d256665c3aa89eafa123cfb965c8c1b4b5f5d0

  • SHA256

    97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98

  • SHA512

    318bb22a79f511421f209f0ee1a8367addfa4c7355f4000bce80b2d18beab450d927c2910eb3f4f2e6f7b5924c623f531eb9c46c80e11123298af721054c4ba1

  • SSDEEP

    12288:liIAA+MX6Cy84Yw54I1/MASK0k1sLYslK0ijkbHi/58P8agY56MJUG2:lpBU8nwN1/MASK0xLYHjAtP8aouUG

Malware Config

Extracted

Family

djvu

C2

http://habrafa.com/test1/get.php

Attributes
  • extension

    .cdcc

  • offline_id

    LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1

  • payload_url

    http://brusuax.com/dl/build2.exe

    http://habrafa.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw

rsa_pubkey.plain

Extracted

Family

vidar

Version

7.6

Botnet

1b9d7ec5a25ab9d78c31777a0016a097

C2

https://t.me/tvrugrats

https://steamcommunity.com/profiles/76561199627279110

Attributes
  • profile_id_v2

    1b9d7ec5a25ab9d78c31777a0016a097

Signatures

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 14 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 11 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
    "C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
      "C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\6e3f72cb-6eab-4407-ae42-444b512d2309" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1100
      • C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
        "C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2480
        • C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
          "C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1180
          • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
            "C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2004
          • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe
            "C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:556
            • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe
              "C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1860
  • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
    "C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe"
    1⤵
    • Executes dropped EXE
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 1424
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:1824
  • C:\Windows\SysWOW64\schtasks.exe
    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
    1⤵
    • Creates scheduled task(s)
    PID:1052
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5D9FCA54-310A-4F80-8F54-90D6A70F605B} S-1-5-21-3470981204-343661084-3367201002-1000:GLTGRJAG\Admin:Interactive:[1]
    1⤵
      PID:1404
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:1916
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2680
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2800
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:1892
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2992
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:2388
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2428
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:1600
      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:3056
        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
          3⤵
          • Executes dropped EXE
          PID:1100
    • C:\Windows\SysWOW64\schtasks.exe
      /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
      1⤵
      • Creates scheduled task(s)
      PID:2684

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Defense Evasion

    File and Directory Permissions Modification

    1
    T1222

    Modify Registry

    2
    T1112

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      1KB

      MD5

      c59708a86e78530488f2356251e775a2

      SHA1

      17e33e077261cdd9e54d4e58dfb168f15ee93efb

      SHA256

      71719971666e64a4f767e8f9d0b52e822189c4bfb1fe449a0e7c8066c82813c2

      SHA512

      42afd4d2c791ea8cb239130cf4f4d43da0ec39c63049c56796e082282e2ba2f0cd0fd8934b7de3b359ca433b0609ad159fda6f92168168f2d4517f13fbbb3fbf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      46KB

      MD5

      25f3c93540472dd64103ff42a465f0a8

      SHA1

      a35951973c356d93f646db84051d176aac0daa61

      SHA256

      4458c879edc6a390614fd089d919dfc8bc9a08d76c5b8e41b881da45a95655ed

      SHA512

      535a74289ee385e4fdc3f6c77678cd00f1957a78f77c9359f7fb388b556ace09c05cbf309eb3c2b1c6e4e000d56d62f0f60d8afc5908c411e560c5d6211ca7fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      45KB

      MD5

      dc38d629e51926a750b443772d7c8c65

      SHA1

      2868765523e76b2e6706f18ecb665f4631a00d00

      SHA256

      21a98ea45d4ca76fc03cd769b01345da379395b41295e1506644149d0a378883

      SHA512

      beb8198332e8771a0475a925a4b31a8a80df9a04dc889442d1a4e024b1b66709acc3e347d50af1868d5d0c351d489cd454fc2523f752ea9dec56b9a9d6048ef4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
      Filesize

      410B

      MD5

      1209303117c014b81bd3e0ededb64198

      SHA1

      41d793f1dd1a65b94543ff10de655674f98c1d9f

      SHA256

      0b66fe09114d2c6592bfced15f70af2b0fcfbec2d47bb5126c656c4fd80f576b

      SHA512

      fbde4018dfe6cc22e0593de758a834ae69823f30aab3b3eff0468b1ab394c024f4c24afac25442d3998d32cba7fecb7d90f63b81b52dbd18332ebcafa1dc3718

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      14bd88196997288ce7978311d8d9d4df

      SHA1

      83d9ff649e8a138767270829a8cf6fe6fb251b97

      SHA256

      352fba04bd92521b70c25ff8499b6715ed541995918efc5d5d1b2f64c72ad1fe

      SHA512

      a31377d9a5811988861d07faa6c73fde40f1df6bda6cb0e5736bf4ed304384a0f0d3295f7123317dff04738d509b34b80181ef268fd04f4d487c845eb34d7064

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      a7bd8fe83e2246b9ec6f3bf3aee1f016

      SHA1

      e959e909239151382e53bb39bd8fee3436682bd9

      SHA256

      3eed7c876b75851a89c72ece2dd414f331d8ca8e921d6d4a5b9eb632a17b50c2

      SHA512

      8632d8ff3d76d5f5a4afd6a822e251b84b53e57196f62747aac3858ae16e1d42df15b73b22d71d398888fef219afff4a75f05a911d512b3dff3b207ed5160b05

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
      Filesize

      392B

      MD5

      7fac92811b08af0f02cc3fcc80f8a07e

      SHA1

      f3e1770b94ced77236ffcb5d2cedaa477ecea12b

      SHA256

      0e0c851946b1781a2f5498a41d21a71b0bb9a895cf500f3d0de1051ff2500857

      SHA512

      78a32da0a40c8959ff7a5e97c8e8165909561d1d71e01373442284c3ba7a6172ed65adb3ee32a9774d56ec7fa66708dadfd09f733746d6e11f79f7c35ecede2b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
      Filesize

      242B

      MD5

      fb8ca88bfcc554edf7cc58c7d17df807

      SHA1

      2001eb4a9c211b493be917370b8b78292c9ed582

      SHA256

      9b8f85851ee30cc06489483d16818646461ba2c1843c48c2bb4538ff56f68860

      SHA512

      06d6b14dd0ace2853e0acf0b4cf37f3728e6f262c8697a467604db7db9cf9b4b2c4ab69353f898e923a871ec89351d1aeecc78a9ef810601a625b2917b13bf36

    • C:\Users\Admin\AppData\Local\6e3f72cb-6eab-4407-ae42-444b512d2309\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
      Filesize

      15KB

      MD5

      2e1672227af96a54dc8097cbf6891ae2

      SHA1

      62a0e5b0e010efd8c7943967ab32e07d61992668

      SHA256

      606c4b5497c624b2c9f05bc6a2eef23c65cdaaa69f23b8b46debbcbd012aa3c1

      SHA512

      b828fcf209711f12bca5adf541cc7b4d8141488cb003b85a357fba08c0c4da322ba0985dc23addc00167b9842af78f2de5782b3d87e231f681622b8e0d7ae758

    • C:\Users\Admin\AppData\Local\Temp\Tar201F.tmp
      Filesize

      25KB

      MD5

      b33a23bb67350d817afe560fc4a6c66f

      SHA1

      bcd0e7644c48303008c906a3b0205543db40b925

      SHA256

      c738fe170c2da8add2952042765b6e49fcbb6ac5663057a33e1055e664d36204

      SHA512

      0f5a3c859e0591d2859176348b72e23f75eb847798ba1c78d81e7cb2c5bd8f02b3a22a24a8441c50968d6f67f2d9b6a7f5af96763bcdb897874df184b71cc53b

    • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      207KB

      MD5

      e48605166a8b9d8f9a70534f40109b22

      SHA1

      932489bad08f2d15f4c47555cd39459809019183

      SHA256

      d34e234bb24d37f210a31ec24fd1938d4fe574e6fd842c8c11dd198013965686

      SHA512

      5bd230db89668001049662794964bd620565e72782b168b7d5c7a126c3a50d3afeaa3ceceb916dbb01eac284ec9842242429be66703f0167d64ef04518afbed5

    • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      217KB

      MD5

      3f30a4800744ded7646329ce626d15bd

      SHA1

      23548956cd148069140befb954009556e2057a2a

      SHA256

      c4b5dd9757aa4e5bc3737b85514f2f116b6ca53863cbe53c4d053b5cf0c9d4d3

      SHA512

      f4e8900c6fb69ef3ef9bdb13a4b81b486d890c3ad3c7a22d67fe4ef35f910bc67cc2f40190168bf3bc03d8386400784759451ea9cd1bd55580bfdaab3d5e1e27

    • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      233KB

      MD5

      7f02046d434656db0eab66a004e49eb5

      SHA1

      4aed7f26d485229c129345aa2518173b907c75df

      SHA256

      88cf9e5e676e49c18d1904e04cccbb229e1c5c5045667f45a4fc67ec107a675c

      SHA512

      55352ad94645780af7c62f16e2d565b22bbd20294dfb59c64058ff407200a665efaeed10587f0a1ec9693707bc57248588074ff4e685cd8df128ef6cf37efe2e

    • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      161KB

      MD5

      dc28719427de04331aa99456a925d7ec

      SHA1

      83f1fe61c48ee590bfbc829a6120819d8fc86101

      SHA256

      049e1a613e25695ed4563741afb18057936b9108bf907c899e3edbf28d4fe099

      SHA512

      abd5e774eea998a5dfa89db61ad1bbc560584c7e9d19d92d4ca268bfc9e0b3f2f9043e62d89d288aea3173e038d1cf6260cde9873fcd1d58b0aea52835c51bb6

    • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe
      Filesize

      159KB

      MD5

      7254c8dca9901c908ee332d507eda3f7

      SHA1

      33f67b93b0cc122bea691aa3e60f9d4e808d43ed

      SHA256

      6eef366085f4562af9d62844dba917cdbe3897a27f52f8c70eedc7f45da7650c

      SHA512

      675236a1725dc9405fc252ef94c0bceb43c3f2d67a3e83843a042ff8412c6b4ec20ddc0d6964dfdadd965400e375e012faadb85797219585fbad6ad6064fc381

    • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe
      Filesize

      143KB

      MD5

      fa2d4bda3b3741c6c2c45feebdbf1168

      SHA1

      f090b8700490dd38dc09e3e9d991f412e03b12a8

      SHA256

      0222ddf92d422b6dd8a4f96bb7ab3e3bc6d41026eda6f6fdb1ba3d9d3825d84a

      SHA512

      403205d5555b6d28276c68f392e329d0be2c581e09783cdf3e21edae02aaa6f0f0b6d2ceef1358581db4719d28a8fe01f364177c76cdd16a7e431b405d05447c

    • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe
      Filesize

      283KB

      MD5

      5f4e9ef2e6c1fd3097b51990356a15bd

      SHA1

      b4f596ebe27a0411a070e83fb5bb633c5bc5b17c

      SHA256

      d208398cfc2e400aa983bbbef78e56976a2098f5fb282b71889398b71bdd18e9

      SHA512

      6402871a6ee5d57e0293230830f1289e39b2542090aae5bdec1c63a52a412035c92ad5a53e87c5bc4a2c1a6aecbd5dd5186d26de6cc1e74147bde27b41daec84

    • C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe
      Filesize

      187KB

      MD5

      82a696712da90493d518bde0992f49dd

      SHA1

      d2015bbea121786fab8745ec1d30d42cde4f1003

      SHA256

      557db16ede8d21a48f651868ead28a156889f9ee1923446fe738fe0a4411a639

      SHA512

      9a558088d95fc51e7fa203f5dc1a2ddfea0e75d463916bba5d92f472c431ea80e7b7c81a25c92f7fe0e0e5df41310cf288ff0bb6db2e3e806e38a2784f826061

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      299KB

      MD5

      41b883a061c95e9b9cb17d4ca50de770

      SHA1

      1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

      SHA256

      fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

      SHA512

      cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      108KB

      MD5

      887ee1ee20d5dd6ec00580c9afcae91f

      SHA1

      38284a4725f4df2384225897609deffc21b6f650

      SHA256

      cff77adb3b04e3fad43553e309623aa9d66e22d61a04aafd9b937de40c35c0fa

      SHA512

      9ba178e335fb1c1ec8f662c20af20e0a79dfb26ccd3c50021fd33a17c60cbe41761027d481f3cec5ea20894525bc37a3f5e2d6ab9098d2d713e65a994dd4e157

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      9KB

      MD5

      b6cee59b36be4674e62a903e62eda8e5

      SHA1

      067140fb82cbc41431b93238da11e88c06a37026

      SHA256

      274a649aab554425d325c7f5a5c46d1d4267ca97c81fbf35678e78d8a4ec93ce

      SHA512

      5ec3718464a95c7dd128bc2a7fafdfe5ae52b4bd3f4905123cc041520b65f6a3304c5b6f79bf8d018f1747149e386c4cc02160108f380916a6dcabb8b963bfcb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      7KB

      MD5

      1c215645ddefc22846facf039b0bc0b6

      SHA1

      c4a4832f92e008f0ee102fbeea17ce6bdecb6654

      SHA256

      33de7fba73f590f550b5f0d20becf921d382522fa4befe5fc26a876862e36169

      SHA512

      d06f55f4a545806b26eaeede7527c5fe12d472a06214f71677500cdb8d18854c35669caccf9d9fcc6be71c8df24dbc1cd1d89b5505ed56acb816fb0d7f7cb7c4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      27KB

      MD5

      190e55b6560451825226767034e6f04c

      SHA1

      cbf140448896273177569dcbde8af007fb931ce2

      SHA256

      a412146f0963fffb6b7e11ac7d110b08e71d1e99abab8477baf34bc48f9639e5

      SHA512

      d469d44144996b981b54df98844297859eab982796c64de50bc670c5a440168a288ab7cdd14bec732044c19638a200361db59292980c7b2e7e244efcdb80a6e4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
      Filesize

      20KB

      MD5

      c1f2cab4704a532f83456549092bd463

      SHA1

      be1d9c75dd63c976c69b691fd11c866511699dc6

      SHA256

      e89963e5cc3195b3f69a6a18aecf2da2d907cb84daa258070324572b333245af

      SHA512

      5f101e04a4ee103307e1b105ff9b2f57ea40105361b745fa07f7cb638797a70c6f5e1107639c54774fee4244b849e7aeaad74f89d35c34570bf4f4fe2aa54da3

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      256KB

      MD5

      852ad3e5afe6d0d6d89784dc1a4d9980

      SHA1

      fb9a7423f7720ea431f203ee319bd0c3301c1fdd

      SHA256

      05fff2aa986ad08ccc068cc6b79062e3728ad27027e84e567841d1d9601fa2e9

      SHA512

      25dcfb0f2a5411f8496b9f6572eb00f16e3a7cf45b88ae2c4ae301df8331bbd56affa32b434ccb8a0f0feca6b1ee88a1410eb3914c6eac4b839a111d98233763

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      236KB

      MD5

      7d46c28f19fba948d5a4de191c5d5592

      SHA1

      eeb05cc0544cbac076823f3bdd4b971d3e471a71

      SHA256

      643f138aff2b390890c85ab89bb67032c064b9f9aa29424f9443609fe1be9158

      SHA512

      8114ce9c0bf0f955cff04fd852edbf7ed85eba6b5dbf522b3b67ea600ed60f12f1ad208c505c9b145542721c7783b2df5dc9bdadedb5ca16ed0bb38aea1bc700

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      261KB

      MD5

      0e2ec16b601d64a41cf4ec01442ffb9c

      SHA1

      ff0f240eade87e9de34b48ce2bc92721248478aa

      SHA256

      24db8e5679ba0eaf5a3aac0254c27265add0e9034295e5d64f08f8cedf1d5058

      SHA512

      2d703c2229a970fa67754e8ff4d630a36db27febf5b63a8237c0662cd2512ef964fe77c7f9741aceef682838e7b07045b3e9df76621c0a0ccbde58149378d3d2

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      261KB

      MD5

      61949a0a8b520a029f8b275d4accf96a

      SHA1

      98ce99f4b89b4b73b54b0ca0ea018f2fed3d3128

      SHA256

      f005787606a49535aa4a4d2fcf6427afe259238cc26fc2824a918e160fc2afe9

      SHA512

      d39e47021c3711913f4b6b0147c3e61d970d2dd3869524389be5790b2b32a13b2b9f5af0f941fa7b1dc0dacbfea9986e91f57793cad73a57e71622d49cb2aa26

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      226KB

      MD5

      70f47155fd48e6e19d2ef9407553157f

      SHA1

      9617c8aba68eead152cd3325586ca59ccc8dfa34

      SHA256

      bbf4969d03dd470fcb388fee747626a33e452575f1524214b56434d0c9deb181

      SHA512

      c1930042eee43eb562a3e234cee5eeae16e69707a17452954b91ffe0598a96eb578495bd65f95956fec5575c9195474e06b8ff61523617f8bcd71809bb83a7bd

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      93KB

      MD5

      777894d87b7e6311c81f9842b02ecace

      SHA1

      eb60b0be91988128fea0e9ff6c49150f543add34

      SHA256

      b27c8dd833b3bce556b437767cf2a3a1589aac7e48a490cdb317b0c3797a9539

      SHA512

      30d0a391f9af3201d7037ad8562f9afc6a1e52c3a7cacf8618926f3f18fc8fd87ca8cc39ebe86f280c95cdc6649031689984724bf0719bad340c66a5f62e4f01

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      115KB

      MD5

      a476341fef39c9790006cf0b3a6929a4

      SHA1

      7356f8767ab56d65192e32db92227b577ff0abd4

      SHA256

      ca4ad4fee14aad9e55c1ac7ef19ab0052a5466c5295da81113a2dc9fa5e7b9ba

      SHA512

      f3eeec84909dbb551ba9264dd1d6dd454b24258a4a0ab2606caac8e93a175109bc05d375ac7aa73fbb1643d92e2d3ea865785b995d2f5ed9897bae455dc8e0cc

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      172KB

      MD5

      9dda32bcc00d9773d12adb938740ed14

      SHA1

      e0ee6754302423af243bdf894fbe510bbf46cd8a

      SHA256

      df61d6207096a1870427a1e328ba0530784ee443450de94a40417ea957c632e0

      SHA512

      ce9ec71682b637bafae1f9f30b9ff5946deee7e3e3085342ececec934ad7cda67ac9c7c0335f967a8faf358aabd17c2edbbb0671a0eb880c209e21801d386fed

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe
      Filesize

      123KB

      MD5

      fceddfa18437078cc6e5054414409c02

      SHA1

      d96acb37a5ce74b568f095c2b35c49245327ac69

      SHA256

      c272d33b49bf8be223e990b9c4f9468bd4213e2507e2beefb59fcf3ce8f8ba5c

      SHA512

      e04140c7dc3369e30823ae4aa3c2af10a29e2c4b1dd6599071e1cd1189529fb5271a1b905c9388d62973f1aa76529b23619c769fefb696712374e38baee44f82

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe
      Filesize

      181KB

      MD5

      edf68d8aa08dc556a6aa45188f52bb8b

      SHA1

      b59f1907413f8006dcb94f16ddd9916559d2e1b8

      SHA256

      6088d23a68f394569cd412ec30c1d7827acd19a0cad69f76bb6f8b0eb3eb121b

      SHA512

      6bbe5c0b197861b1ed0d36badb12fa79e0605a3ba7d6b38c3352bb6572830d62df520f5ede59dc30321a1b44db924cabe63ab8e7f13fbbc3bf89e5d80391f901

    • \Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe
      Filesize

      191KB

      MD5

      83b28f41678bd34fa776b536bed3499a

      SHA1

      0b5bdaa11c31e81a7680b3ecead06fa5e93c773d

      SHA256

      a97cbc63e1cc4640ab12ff4eb63dd499347f70a58eceb6790b3a71072839b20e

      SHA512

      2ec3b816128e9fa1815dc9e3350760c440b001ed3a5780373d44d8bb84b67d0af01ddef7d1a9fcbbfdfeffea1f6a7793c4be767d4628790e3240fb52d82bb51e

    • memory/556-219-0x0000000000230000-0x0000000000330000-memory.dmp
      Filesize

      1024KB

    • memory/556-220-0x00000000003A0000-0x00000000003A4000-memory.dmp
      Filesize

      16KB

    • memory/1180-71-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1180-54-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1180-53-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1180-70-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1180-78-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1180-77-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1180-173-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1180-75-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1180-79-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/1600-349-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/1860-216-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/1860-214-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1860-224-0x0000000000410000-0x0000000000477000-memory.dmp
      Filesize

      412KB

    • memory/1860-223-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/1860-221-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/1916-261-0x00000000002B2000-0x00000000002C2000-memory.dmp
      Filesize

      64KB

    • memory/2004-98-0x0000000000560000-0x0000000000660000-memory.dmp
      Filesize

      1024KB

    • memory/2004-99-0x0000000000230000-0x0000000000260000-memory.dmp
      Filesize

      192KB

    • memory/2216-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2216-5-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2216-8-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2216-45-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2216-9-0x0000000000400000-0x0000000000537000-memory.dmp
      Filesize

      1.2MB

    • memory/2380-0-0x0000000000730000-0x00000000007C2000-memory.dmp
      Filesize

      584KB

    • memory/2380-2-0x0000000001E10000-0x0000000001F2B000-memory.dmp
      Filesize

      1.1MB

    • memory/2380-7-0x0000000000730000-0x00000000007C2000-memory.dmp
      Filesize

      584KB

    • memory/2380-1-0x0000000000730000-0x00000000007C2000-memory.dmp
      Filesize

      584KB

    • memory/2428-347-0x00000000009F2000-0x0000000000A02000-memory.dmp
      Filesize

      64KB

    • memory/2480-48-0x00000000004D0000-0x0000000000562000-memory.dmp
      Filesize

      584KB

    • memory/2480-251-0x00000000004D0000-0x0000000000562000-memory.dmp
      Filesize

      584KB

    • memory/2480-46-0x00000000004D0000-0x0000000000562000-memory.dmp
      Filesize

      584KB

    • memory/2800-291-0x00000000009A2000-0x00000000009B2000-memory.dmp
      Filesize

      64KB

    • memory/2836-252-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/2836-100-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/2836-101-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/2836-95-0x0000000000400000-0x0000000000643000-memory.dmp
      Filesize

      2.3MB

    • memory/2836-93-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2992-318-0x0000000000922000-0x0000000000932000-memory.dmp
      Filesize

      64KB

    • memory/3056-377-0x00000000009C2000-0x00000000009D2000-memory.dmp
      Filesize

      64KB