Resubmissions
31-03-2023 14:59
230331-scyprscb61 7Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 14:59
Static task
static1
Behavioral task
behavioral1
Sample
MEMZ 3.0/MEMZ.bat
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MEMZ 3.0/MEMZ.bat
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
MEMZ 3.0/MEMZ.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
MEMZ 3.0/MEMZ.exe
Resource
win10v2004-20230220-en
General
-
Target
MEMZ 3.0/MEMZ.bat
-
Size
12KB
-
MD5
13a43c26bb98449fd82d2a552877013a
-
SHA1
71eb7dc393ac1f204488e11f5c1eef56f1e746af
-
SHA256
5f52365accb76d679b2b3946870439a62eb8936b9a0595f0fb0198138106b513
-
SHA512
602518b238d80010fa88c2c88699f70645513963ef4f148a0345675738cf9b0c23b9aeb899d9f7830cc1e5c7e9c7147b2dc4a9222770b4a052ee0c879062cd5a
-
SSDEEP
384:nnLhRNiqt0kCH2LR0GPXxGiZgCz+KG/yKhLdW79HOli+lz3:nLhRN9t0SR4iZtzlREBWhuF
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
Processes:
MEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 812 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 808 MEMZ.exe -
Loads dropped DLL 1 IoCs
Processes:
MEMZ.exepid process 812 MEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MEMZ.exedescription ioc process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d1a0b4e163d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c0000000002000000000010660000000100002000000017860b5c63de3dfe63cddd5289a31d9547691624849246a8c3b3eaed850a5803000000000e80000000020000200000001bfb12ec57dfbdc54234eda19ba2a87b2cf893f0f1d81ec71e92fefae6ecf05d900000009b924606721c0d42e75589e57c4bccf00f4c61e085967b3abc496fbc1e86dd837272caa3ed15e5192363e8cab2baff721cc6518155a438af90a68ef118ec03d8f5d720162c0941b6195e20a007a07d215f3e78964a702ad683af105bbac8d5b281597d7f71457f04e0419c03cbaa585d881f1b2821b4d56a6a2372c71b92183a2cc8f02ce0f13fa04e35013b99b456cc40000000ed703bdace6286000af0b2ccb3abcccb390aff8e794e0c614c23415102dd275377fc9c567887cac2669be95abf7b0212401ebf49954d3b29e612ad85cb8b25ed iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D44EB611-CFD4-11ED-A320-F2A4F945A9C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "25" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c00000000020000000000106600000001000020000000ee94bb7228285a882b7f9902f319ba044a50abd385f1cb421bd07da2f5da2053000000000e800000000200002000000075b61a37848d98fdc2c7c5eb5a7015114320c49d1986963e5d8beb06638757882000000069cb90c7d1e04798338299463eea4695b5802c4b0b80f30505800e73907afca6400000007acb8aa7901974863cd4b31f53b9ec3c9312f52ad0a78aaf262f8443b5352a2c8bb948830a7753a125669cef919303e4d4c21ca6a917c22536c33fd54cc685d1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "387039845" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "25" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
MEMZ.exepid process 812 MEMZ.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe 1556 MEMZ.exe 644 MEMZ.exe 884 MEMZ.exe 1380 MEMZ.exe 1672 MEMZ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1600 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1600 AUDIODG.EXE Token: 33 1600 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1600 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
cscript.exeiexplore.exepid process 2024 cscript.exe 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1292 iexplore.exe 1292 iexplore.exe 932 IEXPLORE.EXE 932 IEXPLORE.EXE 932 IEXPLORE.EXE 932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
cmd.exeMEMZ.exeMEMZ.exeiexplore.exedescription pid process target process PID 924 wrote to memory of 2024 924 cmd.exe cscript.exe PID 924 wrote to memory of 2024 924 cmd.exe cscript.exe PID 924 wrote to memory of 2024 924 cmd.exe cscript.exe PID 924 wrote to memory of 812 924 cmd.exe MEMZ.exe PID 924 wrote to memory of 812 924 cmd.exe MEMZ.exe PID 924 wrote to memory of 812 924 cmd.exe MEMZ.exe PID 924 wrote to memory of 812 924 cmd.exe MEMZ.exe PID 812 wrote to memory of 644 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 644 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 644 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 644 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 884 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 884 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 884 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 884 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1380 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1380 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1380 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1380 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1672 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1672 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1672 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1672 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1556 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1556 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1556 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 1556 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 808 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 808 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 808 812 MEMZ.exe MEMZ.exe PID 812 wrote to memory of 808 812 MEMZ.exe MEMZ.exe PID 808 wrote to memory of 852 808 MEMZ.exe notepad.exe PID 808 wrote to memory of 852 808 MEMZ.exe notepad.exe PID 808 wrote to memory of 852 808 MEMZ.exe notepad.exe PID 808 wrote to memory of 852 808 MEMZ.exe notepad.exe PID 808 wrote to memory of 1292 808 MEMZ.exe iexplore.exe PID 808 wrote to memory of 1292 808 MEMZ.exe iexplore.exe PID 808 wrote to memory of 1292 808 MEMZ.exe iexplore.exe PID 808 wrote to memory of 1292 808 MEMZ.exe iexplore.exe PID 1292 wrote to memory of 932 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 932 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 932 1292 iexplore.exe IEXPLORE.EXE PID 1292 wrote to memory of 932 1292 iexplore.exe IEXPLORE.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cscript.execscript x.js2⤵
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://google.co.ck/search?q=how+to+create+your+own+ransomware4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55f8b570823e637a916a2069b8ae5ddff
SHA1dc363d1e57deb64cffedc5743107251e019ba741
SHA256c6d983fde6399020bec0991a14a41684f6a9ef3c4b8b58a9a8dd9de3a43a135a
SHA512ecd56445a22789fb29ff8f6e62d6e6ba7d0e0253cc52448fdc487d24e1f5682d7058db752736412bbd5ea6cc7b7407d9991a9e756037fe2b584b354d15791edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a57faa0a397dd6c55f6b126bd74a5684
SHA1c45b55c56989823c92086044acf86dfd06759e01
SHA256ada023dd5c798fea6261f3fab579146a00d71d87eb26e5956e74d9e3f91b02b4
SHA5124e129895a7a6e655593dcb4fb55b61ddf9b18366a35f69a816743700438153bb43c045307a81de3ce9733d78c959586272bb07f001284b01dcba4fafb7fe0642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c020c51665ef781ddde84ceb7c521d60
SHA1671535c2dd2ba1e335f99378d112e85dd2558e2d
SHA2563a6670c58962889935101f1b8c253054c5f7bb93a40abd77cac78a87c249a973
SHA51292b4f3978dc6a8c5a6496f7a4382a1570523ececdfec9c7dd51f1fb5f36e8b6e5efde1ecb2a82d05640e9e2298fe0953c7dbcfaa499156b150314b754b819b91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c77c9a6555f4e2de707b115f25bc25af
SHA1144dec7b4a36249bab71d76de7a56d8d1f16ce84
SHA256322fec62417fa1fcd3a6c70bd41fd7df2fdbb1d5155c859164e95934f0fadfba
SHA51246f30193e6eb539b979b91065bb67a84d0c91eff2165895ecd7cab0c91068c12fc3f9312c325088771762f949128ebd8ea43366aca1474afac3620ab97f36453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD577169d9a706344172beed01e462d8a2b
SHA1905b903b8d3e75611a7d916c9b07f59b422022dd
SHA256f51f638049c816eddd71a14805dc0f0a4603251004071252625b2ec49d5589a2
SHA512fb9525dfcee7670c2d5916c129100db02e77d39531ae485dacb3d58aaa6e1d47507c7eaa8031371eec2581449cc390016ac368961f3cee5e5d03a4fe1e3fe607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a87159ccc02e4824a0d7c746b8e18dbd
SHA1815b5cf12e9a5a531b11a7f81680fadf10c21668
SHA256c43f27eed1cad8cc9fb084cf7a7836499c222a24c97ae7fdf6c602a32431678a
SHA5123ed1390819a6c1e824bf75648e5286385fd9bc72c485f1f0d619af1b4c7e39b6f3c3472f8329d7a653240a7ebe6f5b76d5d6865d89665a91f143139398425d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c9eb7cf221266c0f58643186805d3983
SHA1604dfc1814700725e42cf0268009b4dd31892ca9
SHA256dc1f214db7b100ba7e01e6b6f91db02085d104849041c78305a3fff8792c61ca
SHA5121e9c22e6d83f4943d9cb6926d30b22c866de4f3066bf027e7d724a36766fe4d7494eb091aedef3e7f0828685964f4d542c4847eba960852a9d88ddc9b9fc6928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD508ec329f4c79cc8048ee92ffee4f7a48
SHA10d93a399aecadacf5efffe5227cbee52aea89240
SHA2569183f111731414833a8860291b3bce60fb62af2a57ba01b18c2aaa6c6a346755
SHA51265ee104de55c38d3c525691e1741b36578a7ec6fb7db553d900b8dcc3e92eb519aa37cb16ed333a16c228661bb557cae6e5a3f3bc99a3eff2bfb7f5e68906329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5add6288fbb14efd8f9d06d884abe283b
SHA16927b94a8444c4e3759afc1b1a8e6195ebd4b4b5
SHA256270875900307afac7397db98fc9b1bdd9e904eb6b1d9f383248289662afcd71e
SHA512c9c7be7243b7bf14a3d484b1c82e3aaf5ec6a804d17376392c9e15e3b018281450dfbc8b4e71e7bed28f70d8269e549636da1b38eb87fc639c4e9708fa5bcadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5fd012e2ab87f168a2d47ec1d2838646e
SHA133ce5e91d8c71b353ee5010c5383e2d59ac3023f
SHA2564b406340b76c349bf23daa287e898e722a9a6511b9a09942f401014f221a74e2
SHA5123675742a9c014425a3b3cc0a93f64e2d32cf38a9f7d62dab30bb4980b1bead64df831b3186501499f10eb92d39d8c5e89059389fbc24be2dcd45ad21bc09f9b1
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\62yy7f8\imagestore.datFilesize
9KB
MD56382efb44314a50babe9d1f9d201b646
SHA10e3e53225112a538230072da17e9c51d5437c938
SHA2564406d7ffc4b6dc288168c765fa6eaf6c6b1054dece317487462f105d176a9e50
SHA5122dffc880ebf4d37ae095ad8f739c122cb1284074fdd66a293c9ae6e53555399840fdcd73d9cd9247c028d6d561902e15d15960d4d205b52895ea9443d2f1c3a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BJWXLGAS\styles__ltr[1].cssFilesize
55KB
MD583f90c5a4c20afb44429fa346fbadc10
SHA17c278ec721d3880fbafaadeba9ee80bdf294b014
SHA256952833e41ba7a4b64c31a2d7b07dde81bf5bbacf5cbb967821cfe459d0c4a0d8
SHA5124f0d19678a6758e67cb82652d49ee92a3646c3b4b68b93253c3e468e88506bb8ad78942d7be244b390bdd29a0d00026ad561c040c1b557067edc7887fe7119ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T22XS5WA\favicon[2].icoFilesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UIC7WQYE\recaptcha__en[1].jsFilesize
405KB
MD5733e4a30889fa7c9947958423e21e810
SHA116a2cced6035295476141f8ac1cd928114cafebf
SHA2567d2c1727a32a92776f9a3078abb845bbeb77e6603c40a318f12ea1e1b5a040d7
SHA512b4a458c1c881be83715467db5c53826dd1a657bbfd8fc4b2b24b9350e5b80e489d6a438c88b05ba6cd139cd2bd62031ef07a40551437a1575b4b25b612baf3fe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VQ77JNZF\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Temp\Cab2889.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\xFilesize
4KB
MD5b6873c6cbfc8482c7f0e2dcb77fb7f12
SHA1844b14037e1f90973a04593785dc88dfca517673
SHA2560a0cad82d9284ccc3c07de323b76ee2d1c0b328bd2ce59073ed5ac4eb7609bd1
SHA512f3aa3d46d970db574113f40f489ff8a5f041606e79c4ab02301b283c66ff05732be4c5edc1cf4a851da9fbaaa2f296b97fc1135210966a0e2dfc3763398dfcaf
-
C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\xFilesize
10KB
MD5fc59b7d2eb1edbb9c8cb9eb08115a98e
SHA190a6479ce14f8548df54c434c0a524e25efd9d17
SHA256a05b9be9dd87492f265094146e18d628744c6b09c0e7efaabf228a9f1091a279
SHA5123392cfc0dbddb37932e76da5a49f4e010a49aaa863c882b85cccab676cd458cfc8f880d8a0e0dc7581175f447e6b0a002da1591ecd14756650bb74996eacd2b1
-
C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\x.jsFilesize
448B
MD58eec8704d2a7bc80b95b7460c06f4854
SHA11b34585c1fa7ec0bd0505478ac9dbb8b8d19f326
SHA256aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596
SHA512e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210
-
C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\z.zipFilesize
7KB
MD5cf0c19ef6909e5c1f10c8460ba9299d8
SHA1875b575c124acfc1a4a21c1e05acb9690e50b880
SHA256abb834ebd4b7d7f8ddf545976818f41b3cb51d2b895038a56457616d3a2c6776
SHA512d930a022a373c283f35d103e277487c2034a0b0814913b8f6ec695b45e20528667aa830eeab58e4483d523bd6a755a16a5379095cb137db6c91909a545a19a2f
-
C:\Users\Admin\AppData\Local\Temp\MEMZ3~1.0\z.zipFilesize
7KB
MD5cf0c19ef6909e5c1f10c8460ba9299d8
SHA1875b575c124acfc1a4a21c1e05acb9690e50b880
SHA256abb834ebd4b7d7f8ddf545976818f41b3cb51d2b895038a56457616d3a2c6776
SHA512d930a022a373c283f35d103e277487c2034a0b0814913b8f6ec695b45e20528667aa830eeab58e4483d523bd6a755a16a5379095cb137db6c91909a545a19a2f
-
C:\Users\Admin\AppData\Local\Temp\Tar2909.tmpFilesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
C:\Users\Admin\AppData\Local\Temp\Tar2FC3.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
C:\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TATE9GI2.txtFilesize
608B
MD5984109069ba0246b3d9032fd89eeb41e
SHA1637485736a24022755709be92517fb9f6143fc5d
SHA256284ccbe35ba3e83cfbeb53f33a42faa66cfe6afc3544e28d7f0b761abea178cf
SHA512cb10b693bedb43e04e0e27ecafc9574519d027ffc3fdba1ad639e78d2467007fc462a7f0275cdf680785e6ecf9b1b2889536bd2e0fa5a09bc3b956ce23b49ae1
-
C:\note.txtFilesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf
-
\Users\Admin\AppData\Roaming\MEMZ.exeFilesize
12KB
MD5a7bcf7ea8e9f3f36ebfb85b823e39d91
SHA1761168201520c199dba68add3a607922d8d4a86e
SHA2563ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
SHA51289923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
memory/2024-204-0x00000000024E0000-0x00000000024E1000-memory.dmpFilesize
4KB