Analysis
-
max time kernel
297s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05-02-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
Resource
win10-20231215-en
General
-
Target
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe
-
Size
774KB
-
MD5
faf9bf89fd060a85d2fcc98e9d511a8b
-
SHA1
08d256665c3aa89eafa123cfb965c8c1b4b5f5d0
-
SHA256
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98
-
SHA512
318bb22a79f511421f209f0ee1a8367addfa4c7355f4000bce80b2d18beab450d927c2910eb3f4f2e6f7b5924c623f531eb9c46c80e11123298af721054c4ba1
-
SSDEEP
12288:liIAA+MX6Cy84Yw54I1/MASK0k1sLYslK0ijkbHi/58P8agY56MJUG2:lpBU8nwN1/MASK0xLYHjAtP8aouUG
Malware Config
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Extracted
vidar
7.6
1b9d7ec5a25ab9d78c31777a0016a097
https://t.me/tvrugrats
https://steamcommunity.com/profiles/76561199627279110
-
profile_id_v2
1b9d7ec5a25ab9d78c31777a0016a097
Signatures
-
Detect Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2836-95-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2004-99-0x0000000000230000-0x0000000000260000-memory.dmp family_vidar_v7 behavioral1/memory/2836-101-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2836-100-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2836-252-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Detected Djvu ransomware 14 IoCs
Processes:
resource yara_rule behavioral1/memory/2216-9-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2216-8-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2216-5-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2380-2-0x0000000001E10000-0x0000000001F2B000-memory.dmp family_djvu behavioral1/memory/2216-45-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-53-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-54-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-71-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-70-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-78-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-77-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-75-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-79-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/1180-173-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
build2.exebuild2.exebuild3.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exepid process 2004 build2.exe 2836 build2.exe 556 build3.exe 1860 build3.exe 1916 mstsca.exe 2680 mstsca.exe 2800 mstsca.exe 1892 mstsca.exe 2992 mstsca.exe 2388 mstsca.exe 2428 mstsca.exe 1600 mstsca.exe 3056 mstsca.exe 1100 mstsca.exe -
Loads dropped DLL 11 IoCs
Processes:
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exeWerFault.exepid process 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 1824 WerFault.exe 1824 WerFault.exe 1824 WerFault.exe 1824 WerFault.exe 1824 WerFault.exe 1824 WerFault.exe 1824 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\6e3f72cb-6eab-4407-ae42-444b512d2309\\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe\" --AutoStart" 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.2ip.ua 4 api.2ip.ua 16 api.2ip.ua -
Suspicious use of SetThreadContext 9 IoCs
Processes:
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exedescription pid process target process PID 2380 set thread context of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 set thread context of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2004 set thread context of 2836 2004 build2.exe build2.exe PID 556 set thread context of 1860 556 build3.exe build3.exe PID 1916 set thread context of 2680 1916 mstsca.exe mstsca.exe PID 2800 set thread context of 1892 2800 mstsca.exe mstsca.exe PID 2992 set thread context of 2388 2992 mstsca.exe mstsca.exe PID 2428 set thread context of 1600 2428 mstsca.exe mstsca.exe PID 3056 set thread context of 1100 3056 mstsca.exe mstsca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1824 2836 WerFault.exe build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1052 schtasks.exe 2684 schtasks.exe -
Processes:
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exebuild2.exe97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exepid process 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exebuild2.exebuild3.exebuild3.exebuild2.exedescription pid process target process PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2380 wrote to memory of 2216 2380 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2216 wrote to memory of 1100 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe icacls.exe PID 2216 wrote to memory of 1100 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe icacls.exe PID 2216 wrote to memory of 1100 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe icacls.exe PID 2216 wrote to memory of 1100 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe icacls.exe PID 2216 wrote to memory of 2480 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2216 wrote to memory of 2480 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2216 wrote to memory of 2480 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2216 wrote to memory of 2480 2216 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 2480 wrote to memory of 1180 2480 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe PID 1180 wrote to memory of 2004 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe build2.exe PID 1180 wrote to memory of 2004 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe build2.exe PID 1180 wrote to memory of 2004 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe build2.exe PID 1180 wrote to memory of 2004 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 2004 wrote to memory of 2836 2004 build2.exe build2.exe PID 1180 wrote to memory of 556 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe build3.exe PID 1180 wrote to memory of 556 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe build3.exe PID 1180 wrote to memory of 556 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe build3.exe PID 1180 wrote to memory of 556 1180 97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 556 wrote to memory of 1860 556 build3.exe build3.exe PID 1860 wrote to memory of 1052 1860 build3.exe schtasks.exe PID 1860 wrote to memory of 1052 1860 build3.exe schtasks.exe PID 1860 wrote to memory of 1052 1860 build3.exe schtasks.exe PID 1860 wrote to memory of 1052 1860 build3.exe schtasks.exe PID 2836 wrote to memory of 1824 2836 build2.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\6e3f72cb-6eab-4407-ae42-444b512d2309" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe"C:\Users\Admin\AppData\Local\Temp\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe"C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe"C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe"C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe"C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exe"1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 14242⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {5D9FCA54-310A-4F80-8F54-90D6A70F605B} S-1-5-21-3470981204-343661084-3367201002-1000:GLTGRJAG\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD5c59708a86e78530488f2356251e775a2
SHA117e33e077261cdd9e54d4e58dfb168f15ee93efb
SHA25671719971666e64a4f767e8f9d0b52e822189c4bfb1fe449a0e7c8066c82813c2
SHA51242afd4d2c791ea8cb239130cf4f4d43da0ec39c63049c56796e082282e2ba2f0cd0fd8934b7de3b359ca433b0609ad159fda6f92168168f2d4517f13fbbb3fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
46KB
MD525f3c93540472dd64103ff42a465f0a8
SHA1a35951973c356d93f646db84051d176aac0daa61
SHA2564458c879edc6a390614fd089d919dfc8bc9a08d76c5b8e41b881da45a95655ed
SHA512535a74289ee385e4fdc3f6c77678cd00f1957a78f77c9359f7fb388b556ace09c05cbf309eb3c2b1c6e4e000d56d62f0f60d8afc5908c411e560c5d6211ca7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
45KB
MD5dc38d629e51926a750b443772d7c8c65
SHA12868765523e76b2e6706f18ecb665f4631a00d00
SHA25621a98ea45d4ca76fc03cd769b01345da379395b41295e1506644149d0a378883
SHA512beb8198332e8771a0475a925a4b31a8a80df9a04dc889442d1a4e024b1b66709acc3e347d50af1868d5d0c351d489cd454fc2523f752ea9dec56b9a9d6048ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD51209303117c014b81bd3e0ededb64198
SHA141d793f1dd1a65b94543ff10de655674f98c1d9f
SHA2560b66fe09114d2c6592bfced15f70af2b0fcfbec2d47bb5126c656c4fd80f576b
SHA512fbde4018dfe6cc22e0593de758a834ae69823f30aab3b3eff0468b1ab394c024f4c24afac25442d3998d32cba7fecb7d90f63b81b52dbd18332ebcafa1dc3718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD514bd88196997288ce7978311d8d9d4df
SHA183d9ff649e8a138767270829a8cf6fe6fb251b97
SHA256352fba04bd92521b70c25ff8499b6715ed541995918efc5d5d1b2f64c72ad1fe
SHA512a31377d9a5811988861d07faa6c73fde40f1df6bda6cb0e5736bf4ed304384a0f0d3295f7123317dff04738d509b34b80181ef268fd04f4d487c845eb34d7064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a7bd8fe83e2246b9ec6f3bf3aee1f016
SHA1e959e909239151382e53bb39bd8fee3436682bd9
SHA2563eed7c876b75851a89c72ece2dd414f331d8ca8e921d6d4a5b9eb632a17b50c2
SHA5128632d8ff3d76d5f5a4afd6a822e251b84b53e57196f62747aac3858ae16e1d42df15b73b22d71d398888fef219afff4a75f05a911d512b3dff3b207ed5160b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD57fac92811b08af0f02cc3fcc80f8a07e
SHA1f3e1770b94ced77236ffcb5d2cedaa477ecea12b
SHA2560e0c851946b1781a2f5498a41d21a71b0bb9a895cf500f3d0de1051ff2500857
SHA51278a32da0a40c8959ff7a5e97c8e8165909561d1d71e01373442284c3ba7a6172ed65adb3ee32a9774d56ec7fa66708dadfd09f733746d6e11f79f7c35ecede2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5fb8ca88bfcc554edf7cc58c7d17df807
SHA12001eb4a9c211b493be917370b8b78292c9ed582
SHA2569b8f85851ee30cc06489483d16818646461ba2c1843c48c2bb4538ff56f68860
SHA51206d6b14dd0ace2853e0acf0b4cf37f3728e6f262c8697a467604db7db9cf9b4b2c4ab69353f898e923a871ec89351d1aeecc78a9ef810601a625b2917b13bf36
-
C:\Users\Admin\AppData\Local\6e3f72cb-6eab-4407-ae42-444b512d2309\97cb23085479e9562332ae56eed070d3c9a001518066132ec5d24041336bcf98.exeFilesize
15KB
MD52e1672227af96a54dc8097cbf6891ae2
SHA162a0e5b0e010efd8c7943967ab32e07d61992668
SHA256606c4b5497c624b2c9f05bc6a2eef23c65cdaaa69f23b8b46debbcbd012aa3c1
SHA512b828fcf209711f12bca5adf541cc7b4d8141488cb003b85a357fba08c0c4da322ba0985dc23addc00167b9842af78f2de5782b3d87e231f681622b8e0d7ae758
-
C:\Users\Admin\AppData\Local\Temp\Tar201F.tmpFilesize
25KB
MD5b33a23bb67350d817afe560fc4a6c66f
SHA1bcd0e7644c48303008c906a3b0205543db40b925
SHA256c738fe170c2da8add2952042765b6e49fcbb6ac5663057a33e1055e664d36204
SHA5120f5a3c859e0591d2859176348b72e23f75eb847798ba1c78d81e7cb2c5bd8f02b3a22a24a8441c50968d6f67f2d9b6a7f5af96763bcdb897874df184b71cc53b
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
207KB
MD5e48605166a8b9d8f9a70534f40109b22
SHA1932489bad08f2d15f4c47555cd39459809019183
SHA256d34e234bb24d37f210a31ec24fd1938d4fe574e6fd842c8c11dd198013965686
SHA5125bd230db89668001049662794964bd620565e72782b168b7d5c7a126c3a50d3afeaa3ceceb916dbb01eac284ec9842242429be66703f0167d64ef04518afbed5
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
217KB
MD53f30a4800744ded7646329ce626d15bd
SHA123548956cd148069140befb954009556e2057a2a
SHA256c4b5dd9757aa4e5bc3737b85514f2f116b6ca53863cbe53c4d053b5cf0c9d4d3
SHA512f4e8900c6fb69ef3ef9bdb13a4b81b486d890c3ad3c7a22d67fe4ef35f910bc67cc2f40190168bf3bc03d8386400784759451ea9cd1bd55580bfdaab3d5e1e27
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
233KB
MD57f02046d434656db0eab66a004e49eb5
SHA14aed7f26d485229c129345aa2518173b907c75df
SHA25688cf9e5e676e49c18d1904e04cccbb229e1c5c5045667f45a4fc67ec107a675c
SHA51255352ad94645780af7c62f16e2d565b22bbd20294dfb59c64058ff407200a665efaeed10587f0a1ec9693707bc57248588074ff4e685cd8df128ef6cf37efe2e
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
161KB
MD5dc28719427de04331aa99456a925d7ec
SHA183f1fe61c48ee590bfbc829a6120819d8fc86101
SHA256049e1a613e25695ed4563741afb18057936b9108bf907c899e3edbf28d4fe099
SHA512abd5e774eea998a5dfa89db61ad1bbc560584c7e9d19d92d4ca268bfc9e0b3f2f9043e62d89d288aea3173e038d1cf6260cde9873fcd1d58b0aea52835c51bb6
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exeFilesize
159KB
MD57254c8dca9901c908ee332d507eda3f7
SHA133f67b93b0cc122bea691aa3e60f9d4e808d43ed
SHA2566eef366085f4562af9d62844dba917cdbe3897a27f52f8c70eedc7f45da7650c
SHA512675236a1725dc9405fc252ef94c0bceb43c3f2d67a3e83843a042ff8412c6b4ec20ddc0d6964dfdadd965400e375e012faadb85797219585fbad6ad6064fc381
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exeFilesize
143KB
MD5fa2d4bda3b3741c6c2c45feebdbf1168
SHA1f090b8700490dd38dc09e3e9d991f412e03b12a8
SHA2560222ddf92d422b6dd8a4f96bb7ab3e3bc6d41026eda6f6fdb1ba3d9d3825d84a
SHA512403205d5555b6d28276c68f392e329d0be2c581e09783cdf3e21edae02aaa6f0f0b6d2ceef1358581db4719d28a8fe01f364177c76cdd16a7e431b405d05447c
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exeFilesize
283KB
MD55f4e9ef2e6c1fd3097b51990356a15bd
SHA1b4f596ebe27a0411a070e83fb5bb633c5bc5b17c
SHA256d208398cfc2e400aa983bbbef78e56976a2098f5fb282b71889398b71bdd18e9
SHA5126402871a6ee5d57e0293230830f1289e39b2542090aae5bdec1c63a52a412035c92ad5a53e87c5bc4a2c1a6aecbd5dd5186d26de6cc1e74147bde27b41daec84
-
C:\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exeFilesize
187KB
MD582a696712da90493d518bde0992f49dd
SHA1d2015bbea121786fab8745ec1d30d42cde4f1003
SHA256557db16ede8d21a48f651868ead28a156889f9ee1923446fe738fe0a4411a639
SHA5129a558088d95fc51e7fa203f5dc1a2ddfea0e75d463916bba5d92f472c431ea80e7b7c81a25c92f7fe0e0e5df41310cf288ff0bb6db2e3e806e38a2784f826061
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
108KB
MD5887ee1ee20d5dd6ec00580c9afcae91f
SHA138284a4725f4df2384225897609deffc21b6f650
SHA256cff77adb3b04e3fad43553e309623aa9d66e22d61a04aafd9b937de40c35c0fa
SHA5129ba178e335fb1c1ec8f662c20af20e0a79dfb26ccd3c50021fd33a17c60cbe41761027d481f3cec5ea20894525bc37a3f5e2d6ab9098d2d713e65a994dd4e157
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD5b6cee59b36be4674e62a903e62eda8e5
SHA1067140fb82cbc41431b93238da11e88c06a37026
SHA256274a649aab554425d325c7f5a5c46d1d4267ca97c81fbf35678e78d8a4ec93ce
SHA5125ec3718464a95c7dd128bc2a7fafdfe5ae52b4bd3f4905123cc041520b65f6a3304c5b6f79bf8d018f1747149e386c4cc02160108f380916a6dcabb8b963bfcb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
7KB
MD51c215645ddefc22846facf039b0bc0b6
SHA1c4a4832f92e008f0ee102fbeea17ce6bdecb6654
SHA25633de7fba73f590f550b5f0d20becf921d382522fa4befe5fc26a876862e36169
SHA512d06f55f4a545806b26eaeede7527c5fe12d472a06214f71677500cdb8d18854c35669caccf9d9fcc6be71c8df24dbc1cd1d89b5505ed56acb816fb0d7f7cb7c4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
27KB
MD5190e55b6560451825226767034e6f04c
SHA1cbf140448896273177569dcbde8af007fb931ce2
SHA256a412146f0963fffb6b7e11ac7d110b08e71d1e99abab8477baf34bc48f9639e5
SHA512d469d44144996b981b54df98844297859eab982796c64de50bc670c5a440168a288ab7cdd14bec732044c19638a200361db59292980c7b2e7e244efcdb80a6e4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
20KB
MD5c1f2cab4704a532f83456549092bd463
SHA1be1d9c75dd63c976c69b691fd11c866511699dc6
SHA256e89963e5cc3195b3f69a6a18aecf2da2d907cb84daa258070324572b333245af
SHA5125f101e04a4ee103307e1b105ff9b2f57ea40105361b745fa07f7cb638797a70c6f5e1107639c54774fee4244b849e7aeaad74f89d35c34570bf4f4fe2aa54da3
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
256KB
MD5852ad3e5afe6d0d6d89784dc1a4d9980
SHA1fb9a7423f7720ea431f203ee319bd0c3301c1fdd
SHA25605fff2aa986ad08ccc068cc6b79062e3728ad27027e84e567841d1d9601fa2e9
SHA51225dcfb0f2a5411f8496b9f6572eb00f16e3a7cf45b88ae2c4ae301df8331bbd56affa32b434ccb8a0f0feca6b1ee88a1410eb3914c6eac4b839a111d98233763
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
236KB
MD57d46c28f19fba948d5a4de191c5d5592
SHA1eeb05cc0544cbac076823f3bdd4b971d3e471a71
SHA256643f138aff2b390890c85ab89bb67032c064b9f9aa29424f9443609fe1be9158
SHA5128114ce9c0bf0f955cff04fd852edbf7ed85eba6b5dbf522b3b67ea600ed60f12f1ad208c505c9b145542721c7783b2df5dc9bdadedb5ca16ed0bb38aea1bc700
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
261KB
MD50e2ec16b601d64a41cf4ec01442ffb9c
SHA1ff0f240eade87e9de34b48ce2bc92721248478aa
SHA25624db8e5679ba0eaf5a3aac0254c27265add0e9034295e5d64f08f8cedf1d5058
SHA5122d703c2229a970fa67754e8ff4d630a36db27febf5b63a8237c0662cd2512ef964fe77c7f9741aceef682838e7b07045b3e9df76621c0a0ccbde58149378d3d2
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
261KB
MD561949a0a8b520a029f8b275d4accf96a
SHA198ce99f4b89b4b73b54b0ca0ea018f2fed3d3128
SHA256f005787606a49535aa4a4d2fcf6427afe259238cc26fc2824a918e160fc2afe9
SHA512d39e47021c3711913f4b6b0147c3e61d970d2dd3869524389be5790b2b32a13b2b9f5af0f941fa7b1dc0dacbfea9986e91f57793cad73a57e71622d49cb2aa26
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
226KB
MD570f47155fd48e6e19d2ef9407553157f
SHA19617c8aba68eead152cd3325586ca59ccc8dfa34
SHA256bbf4969d03dd470fcb388fee747626a33e452575f1524214b56434d0c9deb181
SHA512c1930042eee43eb562a3e234cee5eeae16e69707a17452954b91ffe0598a96eb578495bd65f95956fec5575c9195474e06b8ff61523617f8bcd71809bb83a7bd
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
93KB
MD5777894d87b7e6311c81f9842b02ecace
SHA1eb60b0be91988128fea0e9ff6c49150f543add34
SHA256b27c8dd833b3bce556b437767cf2a3a1589aac7e48a490cdb317b0c3797a9539
SHA51230d0a391f9af3201d7037ad8562f9afc6a1e52c3a7cacf8618926f3f18fc8fd87ca8cc39ebe86f280c95cdc6649031689984724bf0719bad340c66a5f62e4f01
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
115KB
MD5a476341fef39c9790006cf0b3a6929a4
SHA17356f8767ab56d65192e32db92227b577ff0abd4
SHA256ca4ad4fee14aad9e55c1ac7ef19ab0052a5466c5295da81113a2dc9fa5e7b9ba
SHA512f3eeec84909dbb551ba9264dd1d6dd454b24258a4a0ab2606caac8e93a175109bc05d375ac7aa73fbb1643d92e2d3ea865785b995d2f5ed9897bae455dc8e0cc
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
172KB
MD59dda32bcc00d9773d12adb938740ed14
SHA1e0ee6754302423af243bdf894fbe510bbf46cd8a
SHA256df61d6207096a1870427a1e328ba0530784ee443450de94a40417ea957c632e0
SHA512ce9ec71682b637bafae1f9f30b9ff5946deee7e3e3085342ececec934ad7cda67ac9c7c0335f967a8faf358aabd17c2edbbb0671a0eb880c209e21801d386fed
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build2.exeFilesize
123KB
MD5fceddfa18437078cc6e5054414409c02
SHA1d96acb37a5ce74b568f095c2b35c49245327ac69
SHA256c272d33b49bf8be223e990b9c4f9468bd4213e2507e2beefb59fcf3ce8f8ba5c
SHA512e04140c7dc3369e30823ae4aa3c2af10a29e2c4b1dd6599071e1cd1189529fb5271a1b905c9388d62973f1aa76529b23619c769fefb696712374e38baee44f82
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exeFilesize
181KB
MD5edf68d8aa08dc556a6aa45188f52bb8b
SHA1b59f1907413f8006dcb94f16ddd9916559d2e1b8
SHA2566088d23a68f394569cd412ec30c1d7827acd19a0cad69f76bb6f8b0eb3eb121b
SHA5126bbe5c0b197861b1ed0d36badb12fa79e0605a3ba7d6b38c3352bb6572830d62df520f5ede59dc30321a1b44db924cabe63ab8e7f13fbbc3bf89e5d80391f901
-
\Users\Admin\AppData\Local\ccfaeb35-4e99-4707-8094-6d608ed843cb\build3.exeFilesize
191KB
MD583b28f41678bd34fa776b536bed3499a
SHA10b5bdaa11c31e81a7680b3ecead06fa5e93c773d
SHA256a97cbc63e1cc4640ab12ff4eb63dd499347f70a58eceb6790b3a71072839b20e
SHA5122ec3b816128e9fa1815dc9e3350760c440b001ed3a5780373d44d8bb84b67d0af01ddef7d1a9fcbbfdfeffea1f6a7793c4be767d4628790e3240fb52d82bb51e
-
memory/556-219-0x0000000000230000-0x0000000000330000-memory.dmpFilesize
1024KB
-
memory/556-220-0x00000000003A0000-0x00000000003A4000-memory.dmpFilesize
16KB
-
memory/1180-71-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1180-54-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1180-53-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1180-70-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1180-78-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1180-77-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1180-173-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1180-75-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1180-79-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1600-349-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1860-216-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1860-214-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1860-224-0x0000000000410000-0x0000000000477000-memory.dmpFilesize
412KB
-
memory/1860-223-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1860-221-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/1916-261-0x00000000002B2000-0x00000000002C2000-memory.dmpFilesize
64KB
-
memory/2004-98-0x0000000000560000-0x0000000000660000-memory.dmpFilesize
1024KB
-
memory/2004-99-0x0000000000230000-0x0000000000260000-memory.dmpFilesize
192KB
-
memory/2216-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2216-5-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2216-8-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2216-45-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2216-9-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2380-0-0x0000000000730000-0x00000000007C2000-memory.dmpFilesize
584KB
-
memory/2380-2-0x0000000001E10000-0x0000000001F2B000-memory.dmpFilesize
1.1MB
-
memory/2380-7-0x0000000000730000-0x00000000007C2000-memory.dmpFilesize
584KB
-
memory/2380-1-0x0000000000730000-0x00000000007C2000-memory.dmpFilesize
584KB
-
memory/2428-347-0x00000000009F2000-0x0000000000A02000-memory.dmpFilesize
64KB
-
memory/2480-48-0x00000000004D0000-0x0000000000562000-memory.dmpFilesize
584KB
-
memory/2480-251-0x00000000004D0000-0x0000000000562000-memory.dmpFilesize
584KB
-
memory/2480-46-0x00000000004D0000-0x0000000000562000-memory.dmpFilesize
584KB
-
memory/2800-291-0x00000000009A2000-0x00000000009B2000-memory.dmpFilesize
64KB
-
memory/2836-252-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2836-100-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2836-101-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2836-95-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2836-93-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2992-318-0x0000000000922000-0x0000000000932000-memory.dmpFilesize
64KB
-
memory/3056-377-0x00000000009C2000-0x00000000009D2000-memory.dmpFilesize
64KB