Resubmissions

05-04-2023 01:27

230405-bvfhgada5y 7

05-04-2023 01:24

230405-bsjr4sbb43 7

05-04-2023 01:18

230405-bn2gcsda3w 7

05-04-2023 01:16

230405-bnbwpsba84 7

05-04-2023 01:13

230405-blke3aba73 7

28-12-2022 04:22

221228-ezgswahd79 10

Analysis

  • max time kernel
    1799s
  • max time network
    1594s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2023 01:16

General

  • Target

    MEMZ.exe

  • Size

    16KB

  • MD5

    1d5ad9c8d3fee874d0feb8bfac220a11

  • SHA1

    ca6d3f7e6c784155f664a9179ca64e4034df9595

  • SHA256

    3872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff

  • SHA512

    c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1

  • SSDEEP

    192:M2WgyvSW8gRc6olcIEiwqZKBkDFR43xWTM3LHf26gFrcx3sNq:JWgnSmFlcIqq3agmLH+6gF23sN

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
    "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:920
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1380
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1548
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:568
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:628
    • C:\Users\Admin\AppData\Local\Temp\MEMZ.exe
      "C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /main
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:332
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\System32\notepad.exe" \note.txt
        3⤵
          PID:1656
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://google.co.ck/search?q=is+illuminati+real
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1140
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1648
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:406541 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1728
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4f8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:828

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      e552309efa7bae7f685182758fe3c76d

      SHA1

      9c152d285d6f152e2c4203165f1a51f0731e4b84

      SHA256

      fad6a5b23000e7222e442d7e15e5ea3b3b85119f09a160f445725cc6ae57e5f3

      SHA512

      3a2d76be0282ed64fccc8f6a4364aba7993480dc8814d28bc6dd61972dec1393b5931afa34addb358d6915a4ff6b843059f0dedb787ca6ba571f7c3a2a9d4ce6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      724B

      MD5

      f569e1d183b84e8078dc456192127536

      SHA1

      30c537463eed902925300dd07a87d820a713753f

      SHA256

      287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

      SHA512

      49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_3B19E079B02C6E9472149DB847F37EF9

      Filesize

      472B

      MD5

      deb421d13f4668dae17a563713dc1fa7

      SHA1

      f2084fca60b9b9d177e6ec71896b7a3ada52ba95

      SHA256

      3cbec2c90eb6e8297766891d63f3aed9c86a8f40c1c8adcdafb9ae0204e83385

      SHA512

      8d4c5435fb67756b733cf11b54f63f0ac9ec0eb8ab7d5947dc661a7e20d4f51b2bb908a2c3f222eb4b491522bf099b24065a5a0624effb16e2dc17216c8178e3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      02ed51db0a623ae151495c25e62cef06

      SHA1

      96ddfb9941948214450d69c8b3ce94508c833d8d

      SHA256

      e5705791584a55f5c65fd91fc033aa1f5d553fb1c5cdf0608f64aa75c4212ba2

      SHA512

      a9917b2bb6dbbf0dcff86dcabd620df83a5c13fe000581fc0d62ca2f7034138ab34a5c0c9ca9453887b164de36b78f0b6f2147e009824b16244471c5ca00f798

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c97b7e2f0bce0529b5c5eb8c9c3b6f6

      SHA1

      cfe9f96b5b7bfd58d4459ff30575f1ce951c74e4

      SHA256

      ee5eabb250865775a26a0eae644333cd893f1fae0be010ee744bc8626c748afd

      SHA512

      36336fdc2f8919d6c02225103a6c3531a5fe4c6f4eb4d11c9e668925b80bb5500959603a79e17617ad23b030244399de98be633780016b02109670b64c1ea2c8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1741c3713c409c63df9e3c8721bbdeea

      SHA1

      ee488112ab7cb92806ca83e8d7f3bc741e6b894b

      SHA256

      bf84b6c5134d81f8526dedc36c2ec4340d925bfd19e201ee9812ac9aa19eace5

      SHA512

      f1b2ba13c95ab066c164adf47f07b86816757cb8bc6215ac56fd58b7363e36627a90c7eaa934d63ca0c39fa09e562fb2418665ecc968e037a8ca4c76c261d8e8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b836bfddb289b5e7789853173ed4ae4d

      SHA1

      7be43e49a5ef541fc43a891caec8411b85fb4b5c

      SHA256

      0d095ebc2c04bfe488e572e92b813b7e40e15702d60595a7913ab05915378bfb

      SHA512

      9ccc59783c7f063ba07c5b08f107ddb7f6451ea43147b57b75b33b1489b3cc230327fa8874e385067e3db3a0bd5d8ddc466b4329ce72f06c996c647d136d9c87

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5c27dfbad9913041b362b4e890b73848

      SHA1

      026411d6f422575f75640dbef04f67225c848043

      SHA256

      8921b9ea865a10e0e8472bb481bafd3399c3d9dbcc5b5e4a5e2c4834bd8284a5

      SHA512

      751c42089bb4729bacbd466f6b70384ffa40500f40452a8af163f9bd8381d7c4a554824616a5d9a9321a9a994dab2ad325a9ca7dcb352bda8fdeb7120feaf9bb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2fbac7e824515354335e1ba3be9df787

      SHA1

      b891b8408e3a0aec559168011392fbc6e27e6848

      SHA256

      4e269846912beee303387f4f2b63a7a560b7cad1968d981672e63fef1d757469

      SHA512

      f2a67820069067de26698ac1ec8805e8e7b64585d5d2caa4041612c47572d1efa7fa9b6f90eb86e7eb340a7dd5e633a0db73a38c426b405b0ce91c8047a0ebbc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1c47ccbb3526530b5e6530efea38357b

      SHA1

      05b2b8391ce9f578d68ec293de4f68442ed45e99

      SHA256

      807a4eba1b779c9f4d18bc3c8cafc70d13f6e4f5b2ced66b5aa0b36c77e4d672

      SHA512

      96862d3db2a7f4f98091765369e0e62445fef1bb1d33094bfb1a837eaa1cc6c7387d5a3e5891240b471beaf70f9e2cb58f7c268d0516e816a5a1c2bafb1a7d66

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      31821de48a089d478d47215ee1a933a6

      SHA1

      5527b7f8666b37630a5f5b331b2054bd2068f62f

      SHA256

      1cbcdbf9a4a557a4468b2094180498bfe10fe34ba2fd4f8843716dc5479084f5

      SHA512

      4f9e73fb27a16836786d6e0554fc51b49f671a2542c938a47a8fd03b1c77b93dfde27436bf003a71a5163fbb92c077fde4558577d5a763cd4b6784fbd4365b0b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6e7022eae2f9badc7d586415cbc9f8ca

      SHA1

      7b7c2787c41917c82c046be2f01b7286bea5b5d6

      SHA256

      af0e9a7d848775473c284cb86bda5b5742bfae026fafd09c79c3cd35efcfabf5

      SHA512

      ad2a0dcb8a4d4aaff2196f4bc5b4d63e3f59970ce387202b0996dba8437bdbb014cac7f8a2c09e6b77dde38502113fc6a5089c0a6b294da814d977d05f9405af

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d3110b94029fc7c7d540dd4b7b701dc4

      SHA1

      3e8b7253903db7e74978d82db08c8e763dc177d5

      SHA256

      808115da614a4faa5ab11294362acc2d480afc6ae6a37f56befa7e6186e512a5

      SHA512

      5b43a78fd02903d1d30202bc9980f2c7b11a8a8c69cdb386825dfe390c3f3cf4b3119ca04046266e30fcba3ec42e1dbc9b1b617ca8fb5f0162e09b6c9abf0a54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      275a134c2d4222bb4a5d2d641e78cbbb

      SHA1

      8b543b24387f8e015d5083140a97d606efc126db

      SHA256

      2e45d1b79516fbeea5264027d82e5babd81b56ebc5d729e29c40430773821d9e

      SHA512

      852a43cfdd5ba53f93acc3b62ff1f8608dfd18cc7268c98931f41485a26b3b506eba3fa9bfb29ea806cefad4070616a530828e903ffc01159617c750940e2f2f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ca68a9f8c8f190e63fc76b9af48a2e14

      SHA1

      383a16199ab3ddc7d5bdf2d6a711470e54d48737

      SHA256

      6985b33b3083d66ce92a1406f579688a49e8c92071c9d39b149857c52e9d7112

      SHA512

      240727d19e748f9d7b41160d3d61f8e0e520232046591285ce4ecd73a72c0b8ea870d77fb44dfbd69307917239e7b5f07d74080c84874a715082f19408a37b1b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      392B

      MD5

      4987831790b55bbe7113461cca66bdb7

      SHA1

      b84250184484719caa014bd661e1bd60b2261951

      SHA256

      499b3a883781e8310b3fd00c11c5183cfd4682abd18f1b5b6af0c5ab897fcc9f

      SHA512

      0ee2468848e2665d553d6578b866890899c37af6cbf32ee7e9ae8e521e204d9e391b32b2b6bd1d96a94fadd0b9f67885e5fe9014b2506a0db1fe3f9c729197a4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_3B19E079B02C6E9472149DB847F37EF9

      Filesize

      410B

      MD5

      7a231455e6d328e6133653a30aa0469f

      SHA1

      e8e051a1f06dc7c4854f64ba776dcdf8546ab21d

      SHA256

      d89f555ed86ce2c6e147598cfabbb9d65887d9f7d8e0039c8c66dbf692ac26ee

      SHA512

      f39dd53dc3aa0a8f6e7c7eb1657afae653144805e04a50d5116557a787df5a585801c2d956fe71b463ad167ecde29aeef26a444d772483798a782bd32fbbe04c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      11e6abed861c332e73ef3a3a166836a8

      SHA1

      c25b15c001d3e7fb7337aecd2efc05bf8efef0c8

      SHA256

      912a7b2253cccb5515fdc97869039529bc556c311c9562cf205988bd455a0d1b

      SHA512

      f46607a2439cfdd0efd4aa6479976156bc4cd63b85584c439d391802454a254e544b922e83edf06f5860a073240d97fb8dd518bf1d0373f624a84f110f9ba88e

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\p734dsx\imagestore.dat

      Filesize

      9KB

      MD5

      a9b1df80d82d5e01462d01a7088014c4

      SHA1

      36d6b1fef85b8d16235c640869afb6cb243b8cdc

      SHA256

      9ad7c24013af095d614213c8560214649980da787e02d45e0e0dba2483965f7c

      SHA512

      816040f418f4431ba36eb6f01a56f362b6df015d62b09ba60634028404a86460254fa828727193526dfccb6d902c7ee5bcbad7a43c8f4639b832b1ca7d47633b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ONXID7T\favicon[2].ico

      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ONXID7T\favicon[2].ico

      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DE9Y0H7M\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Temp\CabF126.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\TarF137.tmp

      Filesize

      161KB

      MD5

      73b4b714b42fc9a6aaefd0ae59adb009

      SHA1

      efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

      SHA256

      c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

      SHA512

      73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

    • C:\Users\Admin\AppData\Local\Temp\TarF320.tmp

      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\CZEPBEYX.txt

      Filesize

      448B

      MD5

      0b5e4c2cdb7dd1291b502b9365302e72

      SHA1

      9139f76abd54d4e384fcbdf6910e043a513cb6e2

      SHA256

      f06e4a4a408a8fc8aded10467f046e43f29efc6685072321cfc7f85e073ad4f0

      SHA512

      4560aa3da75521a9d9be1ed12cee2e58b0362b13ec5bdf408a7fedc3f1e267479a5d7fd542528c1df9f4648ef024216a6ae4e4187a141f4e5ace2cafdad84cb0

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OOKO4ENV.txt

      Filesize

      607B

      MD5

      f7235ff42698ab15c2f76d7ec533ac62

      SHA1

      4617ef02d908b27483cb368621578f3dcd9fed6c

      SHA256

      647818a21e3764ff67e3c70f1968bd8b787bb1b9ddc0948a68e45e9b521cbd94

      SHA512

      053feada42d0fabc4f1e1df3ac51d05f9ae24a6c6b783dfdaf30452d3fe4e9a8132d5bae67fe2b7f1e02351c0b4d0fa8ce8f36275c86ffeb202637d1cbd41491

    • C:\note.txt

      Filesize

      218B

      MD5

      afa6955439b8d516721231029fb9ca1b

      SHA1

      087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

      SHA256

      8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

      SHA512

      5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf