Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
24/12/2023, 18:24
231224-w112ksffdr 1024/12/2023, 18:21
231224-wzcycsfchm 1007/11/2023, 17:16
231107-vs31jadh73 10Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
Resource
win10v2004-20231215-en
General
-
Target
95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
-
Size
765KB
-
MD5
52f22c2a5b2c339e75f176bf5bfcb3f3
-
SHA1
0a3b96aa59d5eda04c731bfb9c2ba7fef997d1b9
-
SHA256
95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4
-
SHA512
ec5f24367c46ff558110022ad8e1106fe5d1d9b9f94cf423b0cd1e1cd7d5ee3111e16cc12ccf3d6e65c5a5d5358691726172e33fb6338e1b7291be9566766da8
-
SSDEEP
12288:mokzmesNcOJCG4jm2E2SLZJsiXlg8XGB2P3yo1jaUPC4t56ha6DJof5:izk/QDo2SVJsylBXjVNPyvu
Malware Config
Extracted
djvu
http://zexeq.com/test1/get.php
-
extension
.jzeq
-
offline_id
4FMaMDK6uqPZOxJj64677pqiSGF54A1Dam9zfUt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-TAbs6oTGSU Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0821ASdw
Signatures
-
Detected Djvu ransomware 15 IoCs
resource yara_rule behavioral1/memory/1688-6-0x00000000020D0000-0x00000000021EB000-memory.dmp family_djvu behavioral1/memory/2124-8-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2124-7-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2124-3-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2124-44-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-53-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-52-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-70-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-69-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-81-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-99-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-102-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-101-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-103-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/644-104-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2856 build3.exe 2704 build3.exe 564 mstsca.exe 704 mstsca.exe 2428 mstsca.exe 2052 mstsca.exe -
Loads dropped DLL 2 IoCs
pid Process 644 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 644 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2488 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\9baeba8c-8ec4-4063-8af2-371e3b47c381\\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe\" --AutoStart" 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.2ip.ua 4 api.2ip.ua 16 api.2ip.ua -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1688 set thread context of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 2544 set thread context of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2856 set thread context of 2704 2856 build3.exe 36 PID 564 set thread context of 704 564 mstsca.exe 44 PID 2428 set thread context of 2052 2428 mstsca.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1464 schtasks.exe 1720 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 644 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 644 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 1688 wrote to memory of 2124 1688 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 28 PID 2124 wrote to memory of 2488 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 30 PID 2124 wrote to memory of 2488 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 30 PID 2124 wrote to memory of 2488 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 30 PID 2124 wrote to memory of 2488 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 30 PID 2124 wrote to memory of 2544 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 31 PID 2124 wrote to memory of 2544 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 31 PID 2124 wrote to memory of 2544 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 31 PID 2124 wrote to memory of 2544 2124 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 31 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 2544 wrote to memory of 644 2544 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 32 PID 644 wrote to memory of 2856 644 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 37 PID 644 wrote to memory of 2856 644 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 37 PID 644 wrote to memory of 2856 644 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 37 PID 644 wrote to memory of 2856 644 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 37 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2856 wrote to memory of 2704 2856 build3.exe 36 PID 2704 wrote to memory of 1720 2704 build3.exe 35 PID 2704 wrote to memory of 1720 2704 build3.exe 35 PID 2704 wrote to memory of 1720 2704 build3.exe 35 PID 2704 wrote to memory of 1720 2704 build3.exe 35 PID 384 wrote to memory of 564 384 taskeng.exe 41 PID 384 wrote to memory of 564 384 taskeng.exe 41 PID 384 wrote to memory of 564 384 taskeng.exe 41 PID 384 wrote to memory of 564 384 taskeng.exe 41 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 564 wrote to memory of 704 564 mstsca.exe 44 PID 704 wrote to memory of 1464 704 mstsca.exe 42 PID 704 wrote to memory of 1464 704 mstsca.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exeC:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 0821ASdw3sjR7F8QCGeG3mmJ8Ydub1mGOIlnllHAObOY51⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exeC:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 0821ASdw3sjR7F8QCGeG3mmJ8Ydub1mGOIlnllHAObOY52⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\9baeba8c-8ec4-4063-8af2-371e3b47c381" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe"C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe"C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe"C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2856
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:1720
-
C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe"C:\Users\Admin\AppData\Local\b1bf6144-6a8f-4771-be15-31923fea6f80\build3.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704
-
C:\Windows\system32\taskeng.exetaskeng.exe {2AB6DA9F-DEF2-4E53-94F7-2B9522F8380F} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:704
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2428 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
PID:2052
-
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:1464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5ad1b831e6b39763c118dd6bf34d8641a
SHA143e23a3d91315736f59751521ade3224f45ece86
SHA256fe673f5da906667a2f5b08f086d292da711c854fce0268f8e4ed7d4d6e62d58a
SHA512cabe0d43a8bc792b9725af5bdb918a7edfe4e7542771cceb57d8686fab0c2c1a5201346f8e960ee31cfa46c1c291d59bcee04b867ff43dfea2520066c8da3fc1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD59ba428eb4f55a9269ba33ba422304f38
SHA1029a2fc3683b1f7ef3f79c819fb599793234665e
SHA2562719c5bb31c171d47115f850fbe2beede1e073118be42c745d4b1cc972c334e4
SHA51227f17e0349d3a74aee09b19d548471167c33f829835406456c74b1ccce6fd22faf1aa4ff6b6338c053da5e2f54cbf0a9a4d87b0c323c64c13b08cd977dcc3f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5358aa39dd53f64ed52c584230cbdc9c3
SHA1f5a0fa92a8f077d13f2513c882353502dab2544c
SHA256047498e1b4984afde31e217d6de12e01cfe558d5634fafc8bb51e3e1b2e134f5
SHA5125fa8f2e3fa6540b4abac93f303b305d7e07c46b26ea5cd64b5f2fd9a9d5fd68acd38e8e2ebb2543f4246a0727e018ce551c9df75a49f210d7aa6eab91f856182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD50fc0d097fd0ccf9a8d9f3e508798e2c0
SHA1b830995e5f4a42af523805d567da4240b4739adc
SHA2561cef0baf000c409ba1645de0231ded9fe9c109cb03de99ab733f648e3bb9605f
SHA5127a647036c79458b187fd5fa7118c1915ff24f2341d3b0a0a0643bc4faacdb62cc2b0e36397e43b02f7f470ca9d6d91f71808ebcd62b7580a21c7a9014b0cdc76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54db2c9ae9cec5288c1338ff7f085c9ed
SHA13dcfbdf48d6b18186ae9bd868efec9e94733383f
SHA2561e8fe8d51a465e5ce3e990f774bc660ffeec3af966d1bfd9d65e7745efc490f4
SHA5123271ce3c51753f9c37d99b45c718cf1f3c8ea4bc73c52df22254b2c4fc164a0fe42a158feda352b43f4ecafcdc2d82139032b031434926aade14be742c518431
-
C:\Users\Admin\AppData\Local\9baeba8c-8ec4-4063-8af2-371e3b47c381\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
Filesize474KB
MD569eee9dc4b99e6fb2da1e5f257dc0bd2
SHA17cf21aef81d2f114fc276302f270dbfed310cf8c
SHA256d0adeedcf4186892335286e24317a9015466f3c1e993245693aa0b15009d1c7e
SHA51282563880010d13b7a0f15a2a47d44c4f6502c26ca5ded3dc3bdcb2e6bd460c4fe8099ec11cb28328544a585f206b19c3b46e60a8307df61d2df2a968b112a561
-
Filesize
9KB
MD5547ce3d6338e05de0a5865ed68ff64cf
SHA148d8c391a238c3a20e6ac0e3b7df0712976c9add
SHA256c2fecd54ad6d58b39f4950808ac49261bc879317f05c714867cd9fcad412d9d0
SHA512ebfd670ea9433b2b39d4f8a3138f84d183f308991200c284e0a3f35274efa438a518922d851cb64c244dcbaddc64fdead3ed89b6f8980857f35510b871545fb1
-
Filesize
128KB
MD56d971c2e5c625a37033034e705f626c6
SHA1c0148fa8412616e98dd37a0e4dd474fb4dcc9874
SHA256a4e3c8ff336f180467f4a0ee49c9ad5877d46450a2a87db12bf5d25a5767e739
SHA5125165c1e2d827a13922e8b4a9b102acaf408161a1149fd74064b9daf41a9438acd4737f9f54a11f90cb3c42eaf6e1b66bb3857e8683c112a4c69a20191d230cc7
-
Filesize
76KB
MD50f2ffdb74eae0ef39f31d82f7757d0c9
SHA1216ba830abd765a1db6cd19963b773f3d283415b
SHA2568e6144145f3484f1a117948f0a08be9d8689f1bca5dc2ae7c9d6c22eb74290f9
SHA51201b77643a8ddfc006c0bd5c868d71e169988ff43057a3f4424e7b63ee41a3dda56ce7256bf162ba65151dac73968a163e75e81a536ee8814471b3f0b6adf2835
-
Filesize
203KB
MD585f2f4583d149ccf47d681ef27b98354
SHA1f9e221dfc962c5a9cdef578d44e504e4ca72aa3e
SHA25679f3d0706cfa6b79253ef1f1a9d8dfde042f319f9b8b224760ac6cffaf94091f
SHA5121b9005280bb8bd5ada5c01a99513008941ef83a19fe5e67fdab2f32eb263c234a7792cd233cbbfa127fe3125f29477ccb163419b53c1e0551ca01b9d2f3b77ce
-
Filesize
47KB
MD51de9ea3fd15e12337004d458739d9cb2
SHA1f80c972e57792b7a45647ad0d405d64485e902e1
SHA256626d00428f172ad0ce4e20b790fd2b74fce0bf4eb34c5f63b77fc07b9f4cf12b
SHA51239cc1b88d8e710c2278bb0917ae9b756a807f240d41e332a8660f9cef1be26cd55210ee6459b049327f52f6866ba2f9cc5f2ec31ae8e88161df171301f746c45
-
Filesize
241KB
MD581bb6457c59ed3ba122eab8084c25c40
SHA1fe2aac0d3fb8ce9598bfedaaef5b56782c30da7b
SHA256b0e7c9281617e3b1ae303e78f43e8849da2fcab7010706bd7319a2108b1096e4
SHA512b6273f8b8423bf38783577f564d478688d36a41de1f3fdf84be30ce482353e2b22f58dcdbb2d4ec2b2f493382a9bdcda4e20f564fbcd4f0e39d3f40ec1c684be
-
Filesize
222KB
MD5e331d8f6459604b5e4fb60583b7cb42a
SHA1edd4c8799beb138a3032139d2b371609ea663060
SHA256e7a428619c8a5f0972ffe82e1a8d59a62d9aed6d4f1e4c7ae4eeb04c79d07b5d
SHA51296c4abdf701b1c859c07a3a29fa79e857b13f38f345420083ebfb2cf11fe64e28036b567d70fd2d2cffffb2be087f54fac11552e1c2d7bf36ea17d14eab7406a
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
278KB
MD51fa259bf1ff6b21b742f293186163bad
SHA1df0e35c5659bc0fbe302502c20399462ccda5084
SHA2569c057f90ae7d68bdd9cf42cce76c98dbde3f7f1eddc772a1cad3ffed6f5950fb
SHA51259819e315329bf55390596c695d05178da92915a42d65e21c0b95d3856854c05be98303e589c2f5e162fbfe35deaf60b995b3d9d68ad6f9000b9bef8e94427fa