Resubmissions
31-03-2023 20:37
230331-zedkyadc34 731-03-2023 20:34
230331-zcqgqaee9t 731-03-2023 20:32
230331-zbentsdb88 731-03-2023 20:28
230331-y8zvladb76 7Analysis
-
max time kernel
300s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31-03-2023 20:32
Static task
static1
Behavioral task
behavioral1
Sample
MEMZ.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MEMZ.exe
Resource
win10v2004-20230220-en
General
-
Target
MEMZ.exe
-
Size
12KB
-
MD5
a7bcf7ea8e9f3f36ebfb85b823e39d91
-
SHA1
761168201520c199dba68add3a607922d8d4a86e
-
SHA256
3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42
-
SHA512
89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523
-
SSDEEP
192:HMDLTxWDf/pl3cIEiwqZKBktLe3P+qf2jhP6B5b2yL3:H4IDH3cIqqvUWq+jhyT2yL
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MEMZ.exedescription ioc process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f35fd4ec1ca1494aa57fdd0dc6b810a400000000020000000000106600000001000020000000e77ce2ec693122d0df386ed880c89326e4fa8b0e843d94f6e605bb4aa309020e000000000e8000000002000020000000bd7d4cc3d04ad4d759c649d675bed8ce1a495526c67769a29676c0b5f3926a442000000050a3fd0c895af6f992be5d2434f4965d5eba79d1b45484672e7eb821d63b05d04000000027e6fb4717a2f84c7bc1554db716ec95794db053123f1505279bd7c017226f23b7fc1e26a631dac5fe2559a21b1dfedb54062ca42bd15c89335c84b1b1353856 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f35fd4ec1ca1494aa57fdd0dc6b810a400000000020000000000106600000001000020000000bd3f6f074ef44624c4ba346bacda2e8843d5a50b07b42b935e70967386eedea7000000000e80000000020000200000000811e90434539caddaef5246311964fbf71683a926b7b71da6cb892004d55e46900000005ffc7b0c11623877b6ba9e96ddb8ad7731bcd7b317d281f17b84fea7270ff2d0bf0e0aa0eb3b8dcd719dbcce29974b943344412e3620494beb45f52cb5b70262d0784b1af065dbd43805e8c567616d830b34565218efff29062100be77d8bfc6c4e58d8543a7cd56b58ae620e1a7889acca4c4fabc4526f6452f1d8b351403813c986517bd121483556ed46941e7f978400000006ef2deb268aa08982b468c425336c2f237a6d06b5c6911b0f5afa3fa26802e0993f3f13ef11bea365b1d13b3fc34ecc312baf5ef48b676874d961759c74bb9f5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "387066965" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03B61F81-D014-11ED-9AA0-7E8ED113D2E8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60438de22064d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe 1952 MEMZ.exe 1992 MEMZ.exe 2004 MEMZ.exe 1252 MEMZ.exe 1968 MEMZ.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 2036 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2036 AUDIODG.EXE Token: 33 2036 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2036 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEMEMZ.exepid process 1240 iexplore.exe 1240 iexplore.exe 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 2044 IEXPLORE.EXE 524 MEMZ.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
MEMZ.exeMEMZ.exeiexplore.exedescription pid process target process PID 2024 wrote to memory of 1992 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1992 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1992 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1992 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 2004 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 2004 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 2004 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 2004 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1252 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1252 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1252 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1252 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1968 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1968 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1968 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1968 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1952 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1952 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1952 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 1952 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 524 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 524 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 524 2024 MEMZ.exe MEMZ.exe PID 2024 wrote to memory of 524 2024 MEMZ.exe MEMZ.exe PID 524 wrote to memory of 560 524 MEMZ.exe notepad.exe PID 524 wrote to memory of 560 524 MEMZ.exe notepad.exe PID 524 wrote to memory of 560 524 MEMZ.exe notepad.exe PID 524 wrote to memory of 560 524 MEMZ.exe notepad.exe PID 524 wrote to memory of 1240 524 MEMZ.exe iexplore.exe PID 524 wrote to memory of 1240 524 MEMZ.exe iexplore.exe PID 524 wrote to memory of 1240 524 MEMZ.exe iexplore.exe PID 524 wrote to memory of 1240 524 MEMZ.exe iexplore.exe PID 1240 wrote to memory of 2044 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2044 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2044 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 2044 1240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /main2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://google.co.ck/search?q=my+computer+is+doing+weird+things+wtf+is+happenin+plz+halp3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e72774e0365d84b6b42063f21e86877e
SHA102132b10e671653d768957f14383afaa20e67e4b
SHA256cd5411668d5ff7823ab08b53adfacf00b9e6b5fcac42e615898ff66bb2721694
SHA512bf2fd02e76250324c7351365e131d2312404be0ce54d86a1e1f20a1c25cfe0dc87dab13713523f464ce9daec39b866c380536dd2552c733fdf1281dc01b5ea48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a6313960b159b548b4845335b9b5bae4
SHA19c48f9e90b5b800674e49f3439376337f00ba8da
SHA2567080aa3a61d88b61c7017dcbcffff870c5fe70b335fc28dbe9918e20379608b3
SHA512ee1d9e7b63d3f0ef6bdfc709f589751bbd540634e24861f4b1d71958bd5d34d3cfd9ea3f4a1452a4ce9eb64885f19ddc76b273c4860ad1bbb30ecd8c60a44936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5337104c5c37bd485b8cd55558b46f77e
SHA1a9ccbd76ebc288e636752912d560c328d253bcf0
SHA2564650ac289335fc347ef36d72c457b6a820da641cd390415a8e4352b6f96b6ea3
SHA512e2820a0cc1c1bb4f6da498caa71cccbd5907c62ae7fa990ee8593725e9fa0762b0002963135ef8e6f5dc2fe6755f7fc808b5d29b15140505473179211ee57701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD593b22b50364287d5ac113b41974c7918
SHA188acfe793328ccf6e61bdb7f266db5e2bc7d7854
SHA25692f8f3098a50124fe9df175485145ca7878b57711c4ea59b41de3cb981853322
SHA51248fc6dde7bc465329d4db0468966175da82958e85f61b235d47d71d9e63cf884e0cee6e6126a1205b01039aa13e521a2dbb272ab67e97d024469f99812098ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56ff39a50d9ee7d0b09bb30a91e164a8b
SHA176971e794a85f05781108e591ab5d90a99bd253e
SHA2562d5dff434a24b952d47fd53e0855456281101f5322aeba2b6cd049f479546609
SHA5125ebea135e450c812f0e460efa5395325f92b12e5ea125493494d4eb3ea2b2bd468c7b5267646fe23d6090848bc8ab1a958f58ca25cbd25207d5b88ae5c90604b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD599a1c1030a3938e3f0813742cbf4d194
SHA1159d5f3a9ba24aff608946085a8ffedcc0b93772
SHA25670d6ea72d3beb332616a8243953053d6aade55407a077c240b5b7bf5d3a8af94
SHA512b19e3c0b27603686af7463bfaa0961d8c0aaf8b48df9258645dfff03b82183c9809144cceec59dd149a9dd0b4e9836dcf4b29358da2bf7b851dafae4c778b69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ca1f6f8e4bb5e1fb1c02de9fe0ed9743
SHA17d1a137f72ebd7c31812ae94b3bec1269e2f2f1e
SHA2565c66498501b610c62823a00569ee47b275ed1557a74e9e62decb8ce390c29fac
SHA512aa82b1e26f7ce660fb47440bf4733072fcfaf0f5558b6a3b4af49e3946fe1d539294dd1a97e6c541b99da8cc0e2cfba3842ff0776958f72732d6126ac11f9607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD558d1510a25a5577034715abfbc5bc42f
SHA135e29ab5bf9e24d838bc1b9da12abd0830618cfa
SHA256cc0ae9be395d3ca5e1c1675b234a7845cdc789e626fcd811281baa993709eb98
SHA512a49ec67791a2011a79b4eea9e22596131ff60daba274d563732bba307bf78a3cf1ae0096fd9920f5dbb18356d1ce7801906b74dd9e523c873f1feb52c1a9864e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ac7334dcc2e28d657b38c234cc7a306d
SHA1498c2fe7873da419c6a388094ec4b52687bab9d8
SHA25628b239acbd9bf2e6dc221f0520adf1165181c6ccd52b3133e6c4f35e706f8bac
SHA512c0bb97e5c730aa9c91f369c0d752429c60cfb83350fee2976fc00414fb69466b2e61f84e24b04ec525dc0abe33e724d10396c6ffd1c74e0dfe63a048a0d0454c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\x4s3ygl\imagestore.datFilesize
9KB
MD517d3e387f3de920d46af7aba415c5af7
SHA110084f292c85e10f1431140532723afa56db58c6
SHA2569c0b130b459bb4c652e660ad5afcb80fa73edd6cbe2fb07d0c252ad74593302a
SHA512b5d92475380a5ee109e90735c4859b2030af52ce211d30698d47717ef5c2e6aaf08cadfe3752597997b1a26e0ba6e47e9206707ccb28b1274afcec75c88e5ed3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYTOKVEV\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R2EIRHNV\favicon[2].icoFilesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Temp\Cab348B.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\Tar349D.tmpFilesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
C:\Users\Admin\AppData\Local\Temp\Tar3935.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TIG1UU4C.txtFilesize
608B
MD5415b4a4ca0ec2fe4ff2fc9a9b91246b0
SHA145ddf5c2d75d7ef56d70fea1da805e3475a02046
SHA256364c923783e5ae67762c5bc1033d0a94f79dfe97e8b11e67f34f40c0dc3ee80a
SHA51285e125d5207593e9c5eaaf1dc4918c914a3363ed695db7d68a2939c33f9cb3fd17f73d3d43fe6f8dcd20b0d1145584114c0d866d111a021852c1c7896a5ae8ea
-
C:\note.txtFilesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf