Automated Malware Analysis Report For

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report For ID: 376922 Sample Name: FreeFileSync_11.8_Windows_Setup.exe Cookbook: default.jbs Time: 22:44:49 Date: 27/03/2021 Version: 31.0.0 Emerald Table of Contents Table of Contents 2 Analysis Report FreeFileSync_11.8_Windows_Setup.exe 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Analysis Advice 4 Startup 4 Malware Configuration 4 Yara Overview 4 Sigma Overview 4 Signature Overview 5 Mitre Att&ck Matrix 5 Behavior Graph 5 Screenshots 6 Thumbnails 6 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 8 Domains and IPs 8 Contacted Domains 8 URLs from Memory and Binaries 8 Contacted IPs 10 General Information 10 Simulations 11 Behavior and APIs 11 Joe Sandbox View / Context 11 IPs 11 Domains 11 ASN 11 JA3 Fingerprints 11 Dropped Files 11 Created / dropped Files 11 Static File Info 14 General 14 File Icon 14 Static PE Info 14 General 14 Authenticode Signature 14 Entrypoint Preview 15 Data Directories 16 Sections 16 Resources 16 Imports 17 Exports 17 Version Infos 17 Possible Origin 17 Network Behavior 18 Code Manipulations 18 Statistics 18 Behavior 18 System Behavior 18 Copyright Joe Security LLC 2021 Page 2 of 22 Analysis Process: FreeFileSync_11.8_Windows_Setup.exe PID: 620 Parent PID: 5568 18 General 18 File Activities 18 File Created 18 File Written 19 File Read 19 Analysis Process: FreeFileSync_11.8_Windows_Setup.tmp PID: 3348 Parent PID: 620 19 General 19 File Activities 20 File Created 20 File Written 20 File Read 21 Analysis Process: FreeFileSync.exe PID: 3016 Parent PID: 3348 22 General 22 File Activities 22 Disassembly 22 Code Analysis 22 Copyright Joe Security LLC 2021 Page 3 of 22 Analysis Report FreeFileSync_11.8_Windows_Setup.exe Overview General Information Detection Signatures Classification Sample FreeFileSync_11.8_Windo Name: ws_Setup.exe CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo ccaallllll nnaatttiiivvee fff… Analysis ID: 376922 CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo cchahelel ccnkka itiiffif v aae d df… MD5: af257f1cb06a063… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo cchheecckk iiifff aa wdw… SHA1: d53c807d6cb12b… Ransomware CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo dcdyhynenacamk iiifcc aal llllwlyy… Miner Spreading SHA256: cee65d56e0f6cd2… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo ldlaayuunnnaccmhh i aca a ppllrry CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo lllaauunncchh aa pprrr… mmaallliiiccciiioouusss Infos: malicious Evader Phishing sssuusssppiiiccciiioouusss CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo oloappueennnc haa app ooprrrrttt… suspicious Most interesting Screenshot: cccllleeaann clean CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo qoqupueerrnryy a CC pPPoUUrt … Exploiter Banker CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo qquueerrryy llCloocPcaaUllle e… CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo rrqreeuaaeddr y ttth hloeec PPaElEeBB Spyware Trojan / Bot Adware CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy tttoo srsehhauudtttdd toohwwen nP //E/ …B Score: 9 Range: 0 - 100 CCoonntttaaiiinnss fffuunncctttiiioonnaallliiitttyy wtwohh siiicchhhu tmdoaawyy nbb ee/ … Whitelisted: false DCDeoettnteetcacttitenedsd pfpuoontttecetnniotttiiinaaalll clcitrrryy ppwtttoho i fcffuuhnn mcctttiaiiooynn be Confidence: 60% DDrrerootpepscs t PePdEE p fffiioillleetessntial crypto function EDExrxottteepnnsss PiiivvEee ufuilsseees oofff GeetttPPrrrooccAAddddrrreessss (((oo… FEFoxoutuennndds didvrrreoo puppspeed do PfP GEE e fffiitillPlee r wowchhAiiiccdhhd hrheaassss n n(oo… Analysis Advice FFoouunndd edevrvoaapsspiiivveeed A APPPEIII cfcihlheaa iwiinnh ccichhhee cchkkaiiinsng gn foff… Sample drops PE files which have not been started, submit dropped PE samples for a secondFFaooruyun naddn llelaavlrrrygagseseii svaae mt oAoo PuJunoIn tetct oh oSfaff aninnoo dcnnh-b--eeoxcxxekecicnuugttte efdd… Sample may offer command line options, please run it with the 'Execute binary with argumenFtFsoo' uucnnoddo plkpaobortgtoteeeonn kttatiiia ma(llil t oss'sutttrrr niiipnnt oggo s fdd sneeiocbcrnrrlyey-pep tttxthiiioeoancnt u //t/ t haeae…d command line switches require additional characters like: "-", "/", "--") PFPEoEu fffniiilllede cpcoontnetttanaiitininassl asantnr i iniinngvv adalleliiiddc rccyhhpeeticcokknss u/u ma PPEE fffiiilllee ccoonntttaaiiinnss eaexnxe eicncuvutattaalbibdllle ec hrrreesscookusurrurccmee… PPEE fffiiilllee ccoonntttaaiiinnss sesexececttctiiiouontnassb wwleiiit tthrhe nsnoonun-r--scse… PPEE fffiiilllee ccoonntttaaiiinnss ssttetrrracatnnioggnees rr rewessitoohuu nrrrccoeenss-s Startup QPEuue efrrirliiiee ssc ottthhneeta vvinoosllluu smtreea niiinngfffoeor rrrmeasaotttiiiouonrnc (e((nnsaam… SQSaaumerppielllees ffftiiihllleee i iisvs o ddliuiifffffmfeerreree nintttf ottthhramanna otoiorrriiingg iiin(nnaaalll m … System is w10x64 USUsasemessp 3l3e22 bfbiiliitett P PisEE d fffiiiflllefeessrent than original FreeFileSync_11.8_Windows_Setup.exe (PID: 620 cmdline: 'C:\Users\user\Desktop\FreeFileSync_11.8_Windows_Setup.exe' MD5: AF257F1CB06A063644B2B3CBC14A5E1D) FreeFileSync_11.8_Windows_Setup.tmp (PID: 3348 cmdline: 'C:\Users\user\AppData\UULsosecesas l c\3cTo2oedbdmeiet p oPo\bibEsfffu- uf5sisl3eccEasat4ttiiio9on.nt m ttteepcc\hFhnnreiiiqqeuuFeeislse (S((…ync_11.8_Windows_Setup.tmp' /SL5='$110078,17 282871,899584,C:\Users\user\Desktop\FreeFileSync_11.8_Windows_Setup.exe' MD5: 90FFCDDC7F1ABC7A2BC2E54E2F9A8851) Uses code obfuscation techniques ( FreeFileSync.exe (PID: 3016 cmdline: 'C:\Users\user\AppData\Local\Temp\is-A3LFO.tmp\FreeFileSync.exe' ffs_setup_convert_jpg_to_bmp 'C:\Users\user\AppData\Loc al\Temp\is-A3LFO.tmp\img_15.jpg' MD5: EF608BE990DCCA691944F1A702E2C074) cleanup Malware Configuration No configs have been found Yara Overview No yara matches Sigma Overview No Sigma rule has matched Copyright Joe Security LLC 2021 Page 4 of 22 Signature Overview • Compliance • Spreading • Networking • System Summary • Data Obfuscation • Persistence and Installation Behavior • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • Anti Debugging • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection • Remote Access Functionality Click to jump to signature section There are no malicious signatures, click here to show all signatures . Mitre Att&ck Matrix Remote Initial Privilege Credential Lateral Command Network Service Access Execution Persistence Escalation Defense Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Valid Command Application Exploitation for Masquerading 1 OS System Time Remote Archive Exfiltration Encrypted Eavesdrop on Remotely Accounts and Scripting Shimming 1 Privilege Credential Discovery 1 Services Collected Over Other Channel 1 Insecure Track Device Interpreter 3 Escalation 1 Dumping Data 1 Network Network Without Medium Communication Authorization Default Native Boot or Access Token Access Token LSASS Security Remote Data from Exfiltration Junk Data Exploit SS7 to Remotely Accounts API 2 Logon Manipulation 1 Manipulation 1 Memory Software Desktop Removable Over Redirect Phone Wipe Data Initialization Discovery 2 1 Protocol Media Bluetooth Calls/SMS Without Scripts Authorization Domain At (Linux) Logon Script Process Process Injection 3 Security Process SMB/Windows Data from Automated Steganography Exploit SS7 to Obtain Accounts (Windows) Injection 3 Account Discovery 1 Admin Shares Network Exfiltration Track Device Device Manager Shared Location Cloud Drive Backups Local At (Windows) Logon Script Application Deobfuscate/Decode NTDS Application Distributed Input Scheduled Protocol SIM Card Accounts (Mac) Shimming 1 Files or Window Component Capture Transfer Impersonation Swap Information 1 Discovery 1 Object Model Cloud Cron Network Network Logon Obfuscated Files or LSA System SSH Keylogging Data Fallback Manipulate Accounts Logon Script Script Information 2 Secrets Owner/User Transfer Channels Device Discovery 2 Size Limits Communication Replication Launchd Rc.common Rc.common Steganography Cached File and VNC GUI Input Exfiltration Multiband Jamming or Through Domain Directory Capture Over C2 Communication Denial of Removable Credentials Discovery 2 Channel Service Media External Scheduled Startup Startup Items Compile After DCSync System Windows Web Portal Exfiltration Commonly Rogue Wi-Fi Remote Task Items Delivery Information Remote Capture Over Used Port Access Points Services Discovery 3 5 Management Alternative Protocol Behavior Graph Copyright Joe Security LLC 2021 Page 5 of 22 Hide Legend Behavior Graph Legend: ID: 376922 Process Sample: FreeFileSync_11.8_Windows_S... Signature Startdate: 27/03/2021 Architecture: WINDOWS Created File Score: 9 DNS/IP Info Is Dropped started Is Windows Process FreeFileSync_11.8_Windows_Setup.exe Number of created Registry Values Number of created Files 2 Visual Basic Delphi dropped Java .Net C# or VB.NET C:\...\FreeFileSync_11.8_Windows_Setup.tmp, PE32 started C, C++ or other language Is malicious Internet FreeFileSync_11.8_Windows_Setup.tmp 14 dropped dropped C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ C:\Users\user\AppData\...\FreeFileSync.exe, PE32 started FreeFileSync.exe 1 Screenshots Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow. Copyright Joe Security LLC 2021 Page 6 of 22 Antivirus, Machine Learning and Genetic
Recommended publications
  • MX-18.3 Users Manual
    MX-18.3 Users Manual v. 20190614 manual AT mxlinux DOT org Ctrl-F = Search this Manual Ctrl+Home = Return to top Table of Contents 1 Introduction................................................................................2 2 Installation..................................................................................8 3 Configuration...........................................................................37 4 Basic use..................................................................................93 5 Software Management...........................................................126 6 Advanced use.........................................................................141 7 Under the hood.......................................................................164 8 Glossary.................................................................................178 1 Introduction 1.1 About MX Linux MX Linux is a cooperative venture between the antiX and former MEPIS communities, using the best tools and talents from each distro and including work and ideas originally created by Warren Woodford. It is a midweight OS designed to combine an elegant and efficient desktop with simple configuration, high stability, solid performance and medium-sized footprint. Relying on the excellent upstream work by Linux and the open-source community, we deploy Xfce 4.12 as Desktop Environment on top of a Debian Stable base, drawing from the core antiX system. Ongoing backports and outside additions to our Repos serve to keep components current with developments.
    [Show full text]
  • Metadefender Core V4.17.3
    MetaDefender Core v4.17.3 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of MetaDefender Core 14 1. Quick Start with MetaDefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Process Files with MetaDefender Core 21 2. Installing or Upgrading MetaDefender Core 22 2.1. Recommended System Configuration 22 Microsoft Windows Deployments 22 Unix Based Deployments 24 Data Retention 26 Custom Engines 27 Browser Requirements for the Metadefender Core Management Console 27 2.2. Installing MetaDefender 27 Installation 27 Installation notes 27 2.2.1. Installing Metadefender Core using command line 28 2.2.2. Installing Metadefender Core using the Install Wizard 31 2.3. Upgrading MetaDefender Core 31 Upgrading from MetaDefender Core 3.x 31 Upgrading from MetaDefender Core 4.x 31 2.4. MetaDefender Core Licensing 32 2.4.1. Activating Metadefender Licenses 32 2.4.2. Checking Your Metadefender Core License 37 2.5. Performance and Load Estimation 38 What to know before reading the results: Some factors that affect performance 38 How test results are calculated 39 Test Reports 39 Performance Report - Multi-Scanning On Linux 39 Performance Report - Multi-Scanning On Windows 43 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3.
    [Show full text]
  • Swiss File Knife by Chris Taylor
    Volume 34, Number 6 June 2017 PRODUCT REVIEW Swiss File Knife by Chris Taylor hen it comes to searching for files and often used to verify that a file option switches to modify the way they and manipulating files, there has not been modified in any way. operate. The functions I have men- W are a lot of utilities out there. I SFK can also manipulate the contents of tioned just scratch the surface of what recently came across an interesting free files: replace tabs with spaces, eliminate SFK can accomplish. For full details, program called Swiss File Knife (SFK). duplicate lines, sort files, insert text at the see the web site. This utility has an incredible array of beginning or end of files, replace a given The built-in help may be sufficient for capabilities built into a single, compact, string with other text, and split large files many. If you want all the built-in help command-line program. There are ver- into smaller chunks. in a single text file, SFK dumphelp > sions for Windows, Linux and MacOS. There are some more esoteric functions sfk-help.txt will produce a 320K file While there is probably not a lot about called sfk-help.txt. If you want more, SFK that is unique, it might be able to built into SFK. You can it have remove spaces from file and folder names. This you can buy a $5, 260-page PDF file replace a couple of dozen or more sepa- with complete details, including 60 rate programs. can be useful when you are doing batch processing of files where spaces in file pages of tutorials.
    [Show full text]
  • Building a PC-Based Music Server / Transport
    Building A PC-based Music Server / Transport Installation Guide for Windows 8.1 Contents References ................................................................................................. 3 Overview - The Principles of Computer Audio ............................................ 6 The Advantages of Computer Audio [from DCS guide to Computer Audio] .............................................................................................................. 6 The Disadvantages of Computer Audio [from DCS guide to Computer Audio] .................................................................................................... 7 The Computer as a Music File Transport ................................................. 8 “VerseTrasport” Hardware Components...................................................... 9 “VerseTrasport” Software Components ..................................................... 10 Digital-To-Analog Converter ................................................................... 11 VerseTrasport H/W Installation Procedure ................................................ 13 VerseTrasport S/W Installation Procedure................................................. 13 Install Windows 8.1 PRO ....................................................................... 13 Install ASUS Motherboard Drivers .......................................................... 13 Install AQUA DAC Drivers (Thesycon USB ASIO Driver Class 2.0 USB Audio drivers version 1.61b) ..........................................................................
    [Show full text]
  • Freefilesync
    FreeFileSync Escuela T´ecnicaSuperior de Ingenier´ıade Telecomunicaci´on Universidad Rey Juan Carlos gsyc-profes (arroba) gsyc.urjc.es Octubre de 2020 GSyC - 2020 FreeFileSync 1 ©2020 GSyC Algunos derechos reservados. Este trabajo se distribuye bajo la licencia Creative Commons Attribution Share-Alike 4.0 GSyC - 2020 FreeFileSync 2 Copias de Seguridad Los datos almacenados en un disco se pueden perder en cualquier momento, est´anexpuestos a Fallos hardware Errores humanos Malware (virus) etc En cualquier sistema, las copias de seguridad son de vital importancia Para uso personal, cuando tenemos pocos datos y buena conexi´ona internet, el almacenamiento en la nube con servicios freemium como Google Cloud o Dropbox es una buena soluci´on Para entornos m´asexigentes, es preferible usar nuestros propios dispositivos (pendrives o discos externos) GSyC - 2020 FreeFileSync 3 >Por qu´enecesitamos una aplicaci´onde sincronizaci´on? Supongamos que queremos respaldar nuestro directorio de trabajo en un disco externo reci´encomprado El primer d´ıa,lo copiamos todo El segundo d´ıaqueremos guardar tambi´enlas copias recientes. >Qu´ehacemos? Podemos copiarlo todo de nuevo. Pero estamos desperdiciando recursos (tiempo, acceso a la red, tiempo de vida del disco) Podemos seleccionar a mano las novedades y no copiar nada m´as.Pero es un trabajo tedioso y propenso a errores La soluci´ones una herramienta de sincronizaci´on,que se ocupa de copiar s´ololos ficheros y directorios que se hayan a~nadidoo modificado, autom´aticamente GSyC - 2020 FreeFileSync 4 FreeFileSync FreeFileSync es una aplicaci´onde sincronizaci´onde ficheros Permite comparar dos directorios, detectar las diferencias y propagarlas, de forma que ambos directorios acaben teniendo el mismo contenido Los directorios pueden estar en la m´aquinalocal o en una m´aquinaremota accesible a trav´esde FTP o SFTP.
    [Show full text]
  • MX-17.1 Users Manual
    MX-17.1 Users Manual v. 20180305 manual AT mxlinux DOT org Ctrl-F = Search this Manual Ctrl+Home = Return to top Table of Contents 1 Introduction................................................................................2 2 Installation..................................................................................7 3 Configuration...........................................................................36 4 Basic use..................................................................................89 5 Software Management...........................................................119 6 Advanced use.........................................................................133 7 Under the hood.......................................................................155 8 Glossary.................................................................................168 1 Introduction 1.1 About MX Linux MX Linux is a cooperative venture between the antiX and former MEPIS communities, using the best tools and talents from each distro and including work and ideas originally created by Warren Woodford. It is a midweight OS designed to combine an elegant and efficient desktop with simple configuration, high stability, solid performance and medium-sized footprint. Relying on the excellent upstream work by Linux and the open-source community, we deploy Xfce 4.12 as Desktop Environment on top of a Debian Stable base, drawing from the core antiX system. Ongoing backports and outside additions to our Repos serve to keep components current with developments.
    [Show full text]
  • Metadefender Core V4.18.0
    MetaDefender Core v4.18.0 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 14 Key Features of MetaDefender Core 15 1. Quick Start with MetaDefender Core 16 1.1. Installation 16 Operating system invariant initial steps 16 Basic setup 17 1.1.1. Configuration wizard 17 1.2. License Activation 22 1.3. Process Files with MetaDefender Core 22 2. Installing or Upgrading MetaDefender Core 23 2.1. Recommended System Configuration 23 Microsoft Windows Deployments 23 Unix Based Deployments 25 Data Retention 27 Custom Engines 28 Browser Requirements for the Metadefender Core Management Console 28 2.2. Installing MetaDefender 28 Installation 28 Installation notes 28 2.2.1. Installing Metadefender Core using command line 29 2.2.2. Installing Metadefender Core using the Install Wizard 32 2.3. Upgrading MetaDefender Core 32 Upgrading from MetaDefender Core 3.x 32 Upgrading from MetaDefender Core 4.x 32 2.4. MetaDefender Core Licensing 33 2.4.1. Activating Metadefender Licenses 33 2.4.2. Checking Your Metadefender Core License 38 2.5. Performance and Load Estimation 39 What to know before reading the results: Some factors that affect performance 39 How test results are calculated 40 Test Reports 40 Performance Report - Multi-Scanning On Linux 40 Performance Report - Multi-Scanning On Windows 44 2.6. Special installation options 47 Use RAMDISK for the tempdirectory 47 3.
    [Show full text]
  • Computer Science Department
    Computer Science Department Technical Report Number: NU-CS-2021-01 June, 2021 Intrusion Response via Graph-based Low-level System Event Analysis Authors Xutong Chen Abstract This report presents the evolution of the endpoint security system and discusses novel challenges in the state-of-the-art endpoint security system, i.e., endpoint detection response (EDR) based on graph-based low-level system event analysis, when its deployment is required under different platform/environment/task setups. To elaborate and answer this problem, two research projects will be introduced, i.e., RATScope for Windows/Operating System/Detection and CLARION Linux/Container/Forensics. Keywords System security, Malicious behavior analysis, Forensics, Provenance tracking, Microservice and container NORTHWESTERN UNIVERSITY Intrusion Response via Graph-based Low-level System Event Analysis A DISSERTATION SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS for the degree DOCTOR OF PHILOSOPHY Field of Computer Science By Xutong Chen EVANSTON, ILLINOIS June 2021 2 © Copyright by Xutong Chen 2021 All Rights Reserved 3 ABSTRACT Intrusion Response via Graph-based Low-level System Event Analysis Xutong Chen From cyber theft of personal financial information to Advanced Persistent Threat (APT) attacks, nowadays endpoint devices suffer from various intrusions which cause inestimable property and privacy loss. To protect the security on endpoints, endpoint detection and response (EDR) systems have been developed to serve as the powerful solu- tion against those intrusions. Among numerous EDR systems, those based on graph-based low-level system event analysis generally benefit from their higher detection accuracy and they are also less likely to be compromised or evaded.
    [Show full text]
  • Microsoft Sync Software for Windows 7
    Microsoft sync software for windows 7 WindowsOfficeWeb browsersDeveloper toolsXboxWindows Phone .. TechNet · Microsoft Virtual Academy · Microsoft developer program. SyncToy is a freeware tool in Microsoft's PowerToys series that provides an easy-to-use graphical user interface for synchronizing files and folders in Windows versions XP, Vista and 7. It is written using Microsoft' framework and uses the Microsoft Sync Framework. Comparison of file synchronization software; Related Microsoft software. Microsoft released its own syncing tool called SyncToy, and today we're going to SyncToy is a freeware syncing application from Microsoft, and it was a part of . Quickly fix PC issues and prevent others from happening with this software: How to dual boot Windows 7 and Windows 10 Preview builds. If you're looking for a convenient, uncomplicated, and stable synchronization tool, you could do much, much worse than Microsoft's SyncToy. Part of the Windows XP PowerToys add-ons, this tool makes it easy to keep folder contents identical on 7. My rating. 0 stars. Write review. Reviews: Current version, All versions. Microsoft SyncToy is one of the most popular, but FreeFileSync gives it a We have SyncToy listed on our Best Windows Software page – it's. List of free file and folder sync or synchronization software for Windows 10/8/7 with review and Most of us are aware of Microsoft SyncToy. ActiveSync is the latest software release for synchronizing Windows a great synchronization experience with XP-based PCs and Microsoft. Download Microsoft OneDrive apps to sync files on a Windows PC or Mac. Download This software might also download and install its updates automatically.
    [Show full text]
  • List of Applications Updated in ARL #2575
    List of Applications Updated in ARL #2575 Application Name Publisher Studio 3T 2020.2 3T Software Labs Studio 3T 2020.4 3T Software Labs Studio 3T 2020.6 3T Software Labs Studio 3T 2020.7 3T Software Labs Studio 3T 5.7 3T Software Labs Virtual Office Desktop 5.3 8x8 Virtual Office Desktop 5.5 8x8 DriveSize 5.5 ABB MCSize ABB REF610 IED Connectivity Package 2.2 ABB Update Manager 2.4 ABB FlexiCapture 12.0 ABBYY FlexiCapture Scanning Station 12.0 ABBYY Video Studio 4.0 ACD Systems acQuire 4.2 acQuire Technology Solutions acQuire 4.5 acQuire Technology Solutions Addin for ArcGIS 1.4 acQuire Technology Solutions Neo acQuire Technology Solutions CodePeer 3.0 Ada Core Technologies GNAT Pro Ada 6.1 Ada Core Technologies GNAT Pro Ada 7.3 Ada Core Technologies GNAT Pro Ada Development Environment 6.1 Ada Core Technologies GNAT Pro Ada Development Environment 7.1 Ada Core Technologies GNAT Pro Ada Development Environment 7.3 Ada Core Technologies GNATbench for Eclipse 2.3 Ada Core Technologies GNATcoverage 17.1 Ada Core Technologies GNATcoverage 18.2 Ada Core Technologies GPS - The GNAT Programming Studio 18.1 Ada Core Technologies GPS - The GNAT Programming Studio 5.0 Ada Core Technologies GPS - The GNAT Programming Studio 5.2 Ada Core Technologies GPS - The GNAT Programming Studio 6.1 Ada Core Technologies NT Control adaptronic Add-ins Collection for Microsoft Outlook 19.1 Add-in Express Duplicate Remover for Excel 2.5 Add-in Express Acrobat 1.0 Pro Adobe Acrobat DC (2015) Standard Adobe Acrobat DC (2018) Pro Adobe Acrobat DC (2018) Standard
    [Show full text]