Analysis Overview
SHA256
66d68d69e8d3911c571276d89698732c17f35544c5884d548c9260adf01b9839
Threat Level: Known bad
The file 5ca3f45557b4e9c5b9c2ace9ae1a4752 was found to be: Known bad.
Malicious Activity Summary
Detected Djvu ransomware
Djvu Ransomware
Checks computer location settings
Modifies file permissions
Looks up external IP address via web service
Adds Run key to start application
Suspicious use of SetThreadContext
Enumerates physical storage devices
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Modifies system certificate store
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-15 08:50
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-15 08:50
Reported
2024-01-15 08:53
Platform
win10v2004-20231215-en
Max time kernel
145s
Max time network
149s
Command Line
Signatures
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\05eca6e0-e5ff-48c0-8c05-37cbb624f885\\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1332 set thread context of 4092 | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe |
| PID 4180 set thread context of 860 | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
"C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe"
C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
"C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\05eca6e0-e5ff-48c0-8c05-37cbb624f885" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
"C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
"C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe" --Admin IsNotAutoStart IsNotTask
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| US | 104.21.65.24:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | 24.65.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.177.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 94.193.125.74.in-addr.arpa | udp |
| US | 104.21.65.24:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | securebiz.org | udp |
| US | 8.8.8.8:53 | astdg.top | udp |
| US | 8.8.8.8:53 | astdg.top | udp |
| US | 8.8.8.8:53 | 2.136.104.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | astdg.top | udp |
| NL | 52.142.223.178:80 | tcp | |
| US | 8.8.8.8:53 | astdg.top | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.134.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
Files
memory/1332-1-0x0000000002FA0000-0x0000000003042000-memory.dmp
memory/1332-2-0x0000000004A10000-0x0000000004B2B000-memory.dmp
memory/4092-4-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4092-3-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4092-5-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4092-6-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\Local\05eca6e0-e5ff-48c0-8c05-37cbb624f885\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
| MD5 | 5ca3f45557b4e9c5b9c2ace9ae1a4752 |
| SHA1 | 8497aae4a8f26c94bdbd9478db8fd0a5479e81d2 |
| SHA256 | 66d68d69e8d3911c571276d89698732c17f35544c5884d548c9260adf01b9839 |
| SHA512 | 723171a94fdbbdb3f921ad8d6e63782b8fcebe3db88e1e6557c8ab2c8e897a90c6a673b32a64c2a32f81b472ff32483a7ac64e40c63f940c784cb423bac6b563 |
memory/4092-16-0x0000000000400000-0x0000000000537000-memory.dmp
memory/4180-18-0x00000000048F0000-0x0000000004991000-memory.dmp
memory/860-21-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-22-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-20-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
| MD5 | 8202a1cd02e7d69597995cabbe881a12 |
| SHA1 | 8858d9d934b7aa9330ee73de6c476acf19929ff6 |
| SHA256 | 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5 |
| SHA512 | 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
| MD5 | adffb09b28da4972e42784a110a7d109 |
| SHA1 | a6b5a1803e6cd823be0f5509d2993bbcc2fa012d |
| SHA256 | d938dec63ace855025e8dbaf47b661e413d6a588d76df4333519c0b303b17187 |
| SHA512 | a7a132778bb9b404e44b9dee686c49ba35cf775bff18ee58bbe2d993442feb62b5c03370a75bf8f42334942787ae3124c4a8693da8bab0817d6846379b5408c7 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
| MD5 | b7470a9aa569b259d4c2bb3b80ae3aa3 |
| SHA1 | 093290296b7f1e402ef96e4b33a88f064aa401eb |
| SHA256 | ee8aeed77dd9f1631fa75845214d75bfe04951a61892410ee369035e13fd14c6 |
| SHA512 | 4da3fc09260692f159c37b068664852931b712c8173de5e4b294799ac33ecf179055aaeb016fd0afad88cbfc50a571c4c88033dca56a573431af7462ea7979be |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
| MD5 | a6b9bf291eb2fba6054942b19caf34a6 |
| SHA1 | 8907687ca7d66c8518f50df2695de5966f60e69d |
| SHA256 | d3ac5e897b373c3b74cefeb7f0c7f4798a472a53883fe073443db3630f7777a9 |
| SHA512 | 1043772a0cac5ed2fc382abe373a2d667a86974cd082319cf486608f064ee643c53e9349bbacc49d759932ba84c08644dd82f9468962533426a18cfee9e92247 |
memory/860-28-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-27-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-29-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-31-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-34-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-33-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-35-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-36-0x0000000000400000-0x0000000000537000-memory.dmp
memory/860-38-0x0000000000400000-0x0000000000537000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-15 08:50
Reported
2024-01-15 08:53
Platform
win7-20231129-en
Max time kernel
117s
Max time network
125s
Command Line
Signatures
Detected Djvu ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Djvu Ransomware
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\7eee19ef-7e0f-4ddf-aa5e-8dfe7a526ad8\\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe\" --AutoStart" | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
| N/A | api.2ip.ua | N/A | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2880 set thread context of 2960 | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe |
| PID 2672 set thread context of 2524 | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe |
Enumerates physical storage devices
Modifies system certificate store
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| Set value (data) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
"C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe"
C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
"C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe"
C:\Windows\SysWOW64\icacls.exe
icacls "C:\Users\Admin\AppData\Local\7eee19ef-7e0f-4ddf-aa5e-8dfe7a526ad8" /deny *S-1-1-0:(OI)(CI)(DE,DC)
C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
"C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe" --Admin IsNotAutoStart IsNotTask
C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
"C:\Users\Admin\AppData\Local\Temp\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe" --Admin IsNotAutoStart IsNotTask
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | api.2ip.ua | udp |
| US | 104.21.65.24:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | pki.goog | udp |
| US | 216.239.32.29:80 | pki.goog | tcp |
| US | 8.8.8.8:53 | www.microsoft.com | udp |
| US | 104.21.65.24:443 | api.2ip.ua | tcp |
| US | 8.8.8.8:53 | securebiz.org | udp |
| US | 8.8.8.8:53 | astdg.top | udp |
Files
memory/2880-0-0x0000000000330000-0x00000000003C2000-memory.dmp
memory/2880-2-0x00000000045F0000-0x000000000470B000-memory.dmp
memory/2880-1-0x0000000000330000-0x00000000003C2000-memory.dmp
memory/2960-5-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2960-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
memory/2960-7-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2960-8-0x0000000000400000-0x0000000000537000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
| MD5 | ac05d27423a85adc1622c714f2cb6184 |
| SHA1 | b0fe2b1abddb97837ea0195be70ab2ff14d43198 |
| SHA256 | c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d |
| SHA512 | 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d |
C:\Users\Admin\AppData\Local\7eee19ef-7e0f-4ddf-aa5e-8dfe7a526ad8\5ca3f45557b4e9c5b9c2ace9ae1a4752.exe
| MD5 | 01856db7e82dd0998c6e7a9b8040cec2 |
| SHA1 | 41f43d6271d67470c5b77e0acc86fb4df9f91a9b |
| SHA256 | cceb86228202eda0e79236d66031ae9cb212e3df5bf3d3242369d0b873935931 |
| SHA512 | 581a6fa3ae8ceca0847e016c54c7895bc9a03025214b2a1d94bee9a9ec119e02f1160f74d3976c697ac34825280e484a05faf3523650ba49d7b5aaee9b2a6243 |
memory/2672-45-0x0000000000220000-0x00000000002B2000-memory.dmp
memory/2960-44-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2672-47-0x0000000000220000-0x00000000002B2000-memory.dmp
memory/2524-54-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2672-53-0x0000000000220000-0x00000000002B2000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
| MD5 | a266bb7dcc38a562631361bbf61dd11b |
| SHA1 | 3b1efd3a66ea28b16697394703a72ca340a05bd5 |
| SHA256 | df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e |
| SHA512 | 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
| MD5 | 5565be3b9bec325b93a67cf022bf61e6 |
| SHA1 | beacf7ab3bfc298e08b39cc224c0fe7f0b39282c |
| SHA256 | d896cd84a73e972cdb07d1cc630803a59ec5f2c90d0774d053ecc089d5d76db5 |
| SHA512 | 5df481baad27741b67793f11a197a72b3e16ce223423f0d27276b668bc8c25f61d7e799870770149c6bdccb6e72efe7d9d58c582adc32efbc4b708b47ac1f9f9 |
C:\Users\Admin\AppData\Local\Temp\Tar479C.tmp
| MD5 | 9c0c641c06238516f27941aa1166d427 |
| SHA1 | 64cd549fb8cf014fcd9312aa7a5b023847b6c977 |
| SHA256 | 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f |
| SHA512 | 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | af9291cfad5ae5a54e8b919534704031 |
| SHA1 | 2275f912bb7c9f9cfb43b4660bc4e83909caf7ee |
| SHA256 | 41c0ea7f87d41f2a4e7838bebbaa6fdb6ffcf63ed94d09288ea732e6e7fcf3ab |
| SHA512 | a0fea97c708b81dfd9fa184d3fd9ead4357cf89acac2616fef0297408a37640c3831c37450fb26aed189c555e8b182fae10a342984626df57b7b96920e6ff21a |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
| MD5 | 8202a1cd02e7d69597995cabbe881a12 |
| SHA1 | 8858d9d934b7aa9330ee73de6c476acf19929ff6 |
| SHA256 | 58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5 |
| SHA512 | 97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
| MD5 | d96062733250f7c17cc4bb9b3230eaaf |
| SHA1 | d9048227c8e732891c7cb53c99e8a18e6c84339c |
| SHA256 | 810f917d3af7e1556fa27857d57e8b6f6dd3c1c3317b6cf2a202f72c2ed0a754 |
| SHA512 | 6377d16a3fc146107e46f7539c500c69f94fae772e569c11aea15962b9ad69d99f309750c9be2e9acbe7f03f7b63c21a0b66d286e146af51924bda3f88bf23b4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
| MD5 | b7470a9aa569b259d4c2bb3b80ae3aa3 |
| SHA1 | 093290296b7f1e402ef96e4b33a88f064aa401eb |
| SHA256 | ee8aeed77dd9f1631fa75845214d75bfe04951a61892410ee369035e13fd14c6 |
| SHA512 | 4da3fc09260692f159c37b068664852931b712c8173de5e4b294799ac33ecf179055aaeb016fd0afad88cbfc50a571c4c88033dca56a573431af7462ea7979be |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
| MD5 | 02f4eb0e3ec3d0578df771754e747270 |
| SHA1 | 015036c597ca23e9f5e8602c28482b335ec2cf88 |
| SHA256 | 50b8b8455a5af7eebbec9ba5dd429a8d2befb0157111a90fd1f9c96b8b4c583a |
| SHA512 | 6535b9dc7e2f55223ce5ee793bb43bb2b1e816a80dfccb347fd31fe8fc7ac32835084a66a50a9483e8b19b936602e46cb6009bc4a5028d46a7c8be7791bf8e57 |
memory/2524-71-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2524-70-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2524-72-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2524-73-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2524-75-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2524-76-0x0000000000400000-0x0000000000537000-memory.dmp
memory/2524-77-0x0000000000400000-0x0000000000537000-memory.dmp