Resubmissions

22/02/2024, 09:45

240222-lrcmhsfh69 10

21/02/2024, 16:36

240221-t4e76sbb3y 8

21/02/2024, 15:26

240221-svfa5shh4z 6

21/02/2024, 15:19

240221-sp5nvaad77 10

Analysis

  • max time kernel
    103s
  • max time network
    88s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/02/2024, 15:26

General

  • Target

    https://go.enderman.ch/repository

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.enderman.ch/repository
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffe9d479758,0x7ffe9d479768,0x7ffe9d479778
      2⤵
        PID:3336
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:8
        2⤵
          PID:436
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:2
          2⤵
            PID:200
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:8
            2⤵
              PID:1384
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:1
              2⤵
                PID:4580
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:1
                2⤵
                  PID:4308
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4864 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:1
                  2⤵
                    PID:220
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4488 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:8
                    2⤵
                      PID:4592
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:8
                      2⤵
                        PID:2904
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:8
                        2⤵
                          PID:3600
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1828,i,4407467943524725696,1463333696844705432,131072 /prefetch:8
                          2⤵
                            PID:4776
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:3288
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:712
                            • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]
                              "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]"
                              1⤵
                              • Suspicious use of SetWindowsHookEx
                              PID:4556
                              • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]
                                "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                PID:5012
                              • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]
                                "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                PID:976
                              • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]
                                "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of SetWindowsHookEx
                                PID:2912
                              • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]
                                "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /main
                                2⤵
                                • Writes to the Master Boot Record (MBR)
                                • Suspicious use of SetWindowsHookEx
                                PID:516
                                • C:\Windows\SysWOW64\notepad.exe
                                  "C:\Windows\System32\notepad.exe" \note.txt
                                  3⤵
                                    PID:3788
                                  • C:\Windows\SysWOW64\mspaint.exe
                                    "C:\Windows\System32\mspaint.exe"
                                    3⤵
                                    • Drops file in Windows directory
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3196
                                • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]
                                  "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SetWindowsHookEx
                                  PID:368
                                • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]
                                  "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ.zip\[email protected]" /watchdog
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2008
                              • C:\Windows\SysWOW64\DllHost.exe
                                C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                1⤵
                                  PID:1520
                                • \??\c:\windows\system32\svchost.exe
                                  c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
                                  1⤵
                                    PID:4488

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    2KB

                                    MD5

                                    ffcef9bb11ddb90345d727607293ac8e

                                    SHA1

                                    41de202434972c00161a04c47f4475297e3e10f3

                                    SHA256

                                    00d62c2bb0df944368f280a94d37b3631821d6ef89f9edcdc5ef5b663c36c263

                                    SHA512

                                    f960d8b22be61e01d4f6b87c9450e2691580bc26991054fbf70adad2b6b2c447ba842be2cfaef8cc6d59eff7d63664578a9ef9140dcba9f6a14de27f7236d8fc

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    5a2b6e94891e26d678c67bacaca73b2b

                                    SHA1

                                    153104ea8328f7e0b612c706443505540fdf149c

                                    SHA256

                                    b588330003b176914b98912849a5b1f066aec67ac8f376453d4c4c8f70e4b1fc

                                    SHA512

                                    cf41159c86369277d670ec8580c0b1caba8fd6c3fad787c226a678bc208fbdb5e44d4b776682ccbfc9d738a22bd978e3beafe28ca92021c756c2e40a19500afa

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    986B

                                    MD5

                                    c0006b8d81f2ee774d2ba65d9638fdc5

                                    SHA1

                                    b175d726d49d5c523725cd048e65403a262d6a52

                                    SHA256

                                    26775ebd7283d4da6a1482f6c7a2273a205ec5f4916547003f03e263f8858166

                                    SHA512

                                    4fcefdf551b7d9d38e481904ff765a746fc5580e37055c1b80702e0fbd7adac15cc81c41eaf5705cb006a214cdb180257bb640fbd10e9613b58549d235cc9077

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    ea96bf9b09894596638a4f730dd6dbc8

                                    SHA1

                                    9f4e688d688753b80ca47d47a03dc4ff6680ba7c

                                    SHA256

                                    d7122525cfda35aba576a77fc97f00eaeead3d686645752075561174f9c4976f

                                    SHA512

                                    c0f4d413a5b344341d75783161d26c9909c48175b61006e583359231f4095f3e250ae5a1cd8901a9072aa5ba9a6875da34abad37547e99e2dda07ea993c2733b

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    986B

                                    MD5

                                    52a7fc377756b1bf15d497d40666dec1

                                    SHA1

                                    5975fc4fa23ce0f69c7a5545cf0fe2f465958e72

                                    SHA256

                                    b7ba8c3c35f0a406af83b295d9befa35d637dcb1724309f80301eb58f9e7bfed

                                    SHA512

                                    9aa611a27544f40b30cee8769a0dba48bff5dcaef32a2bf115497abebf5d85f680a7813c55c351356bc8fbb70721ddc70a9c82c0321746cf661531fdb2627e41

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    1KB

                                    MD5

                                    135c7138a3a2c0bf8f301d7bef524b1a

                                    SHA1

                                    892ce80bad067eeaa4bf4a607ecc1e03b2837ec3

                                    SHA256

                                    eca1f22a3d72143265f60b808f5fd45ea0120c579f24525b53b95af0641b38f2

                                    SHA512

                                    c030367356bc89db32fe0fd022b46f78edee5a165ab9cecb0cef46132657da91ce7e59878f68c1102ca241e0d1c69cec138e2e1030f6bf2d75c425b0ecc846b9

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    64ce2f4176f9e3f87dac40e29a7ef621

                                    SHA1

                                    b9bb136e794a3d1237faf26f688b3adb388028cc

                                    SHA256

                                    ceb1b2ba1b55e14b65dd31cd0c16180f0766fb8b0b553737b477a85e7b58cc59

                                    SHA512

                                    49e1fb5c11b3de4b005373ec04a63774e9bf3bb03d754aabb153b2fb2fc5f9d1fc5d3ac5ae9290d9d77ea7d9328c2b325c583ff20c16bfc3a10e8ef78fc291d1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    2651a7ddf3f2c4681cdb8ef6e83751df

                                    SHA1

                                    d1204b851725f28e479b6ade8f3d0448df8c9298

                                    SHA256

                                    2a63cab18df2ef146896b372207667268bbd904a3f9cafdec8c97a5791160b8d

                                    SHA512

                                    398e6c9c0dc134628cb9feef8c52909123b0db6e96568b21981f730df27dfcdc2c134e3bd337900384c2f860ea858604238f82660baab55d75945067552ce0f0

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    94aa4a241de42f28e114e529e90c86eb

                                    SHA1

                                    14bac783768b146a50bdd6c43752ea5fd2212f78

                                    SHA256

                                    1fe7d0a47c9369acdc98c8068287b24765f8674bd636ecff1eaa6e4f205a8d16

                                    SHA512

                                    bcad00d178675edc34e1e778c818045169e47632fe439c77021a9992f835b1ec32550bb59b27340825997001a6b7be443503eadee05f44794cd202403bdd3513

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    f3982242b544cbea7c193de7cdaafbe6

                                    SHA1

                                    55a08da9f998aa01b3a5c4f64f5d4d6ebd923792

                                    SHA256

                                    9733e371b900150b5f82900dd781ba2a430483d5fe65e2baff52b7de696d1d30

                                    SHA512

                                    9e1bcf09857901a7365af334449acf42dceb0127f18580db20dac405c6a7146b492e0cbb48615cb4e8234d8b9620a577f6c5aa18939111dce9c36cafa90c86bb

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    6265c415872c2b182e7beeecd251e845

                                    SHA1

                                    66758344e44cbe5a0d27e0d7cb6599af28cc3a90

                                    SHA256

                                    d403cc6a9c231df93d484ef1a167c211e31dbdf4c4331f7556ecb0ff667a5b46

                                    SHA512

                                    596cd539c1e3a8d4ba9c1e1fd719e7a1b3cbf866327216526ce03edd39e372afcb008baa07bd8b59fdf61212cc86f5bf6f5f7b7b6a4710a5666ad1175b39b57d

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    15666e94efc8226ad11a8968c0e914f7

                                    SHA1

                                    0312f9f5a56a7867a57f03c98c0352e3fbbd50c9

                                    SHA256

                                    226674a76bb15022b408e51bc51abe985d0ad8a8a83fe5449d39ecda3d851d17

                                    SHA512

                                    71608decff84e64e92760dba700357ec0c9c023fcdb81d77f12d3d9de70fa8415c7f5cab8b74fa1dd85416512bf2e7496f57d14fc6605884132636c6e35d5431

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    ec1a70801f868dcce86baa012840fb84

                                    SHA1

                                    ef0c4968c31e90bd48bd42c8687af5d2bd1f9420

                                    SHA256

                                    f748b30dd6413823da942f4aff3afdc725ce6706898206ebee555206d59dddc3

                                    SHA512

                                    535ce8aa5acfcb1c7a866dea91f53c3ab83d1cce98ad74fe81043463d307dd69682edad3b006758b9ad566d5a4ffc0f8b7ab27e06610514dde9814cfb1b2095b

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    3e173e12fb7541fef385b9dd11988c4a

                                    SHA1

                                    79a7d5b0fbb17235f713e53c362701157ca8413c

                                    SHA256

                                    214275789979a7545c6679672e27d3a55206e0444cb20e183635dd629586ea80

                                    SHA512

                                    a71b1974afd9f2fba10f0000e2020ac6af60a011fb8bfabbfaf95ce276d01139af5e8adb59e373604726e2f0d1c97c3bb88d69d7eacb2079bf630ce14552ad85

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    130KB

                                    MD5

                                    773b322958f80cded7b00c3248f872c3

                                    SHA1

                                    8f4d24ada94ae542fda04a200651fd4f391f9bd1

                                    SHA256

                                    4eb30dff6bed51a4b161fca98943f10da46652e9a08e34538541b582d5e6ef3d

                                    SHA512

                                    c646567c0be66b23e780ffe598f93c3b25d9bf69b879e9b652a29288582d972607ec1f2670f7e3a92d4a4cdfc2dd26bd09979eb7e65f6d3b68ed07b00dcc5c6a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                    Filesize

                                    130KB

                                    MD5

                                    db2ab7640cb5101c79ab133077de2822

                                    SHA1

                                    62deb2e7e95f9fffca4f2d301980c7949a336cfd

                                    SHA256

                                    29969fd9ab18b2b28429a1657e6beed9e5828c4fef7118f66a44df7405898867

                                    SHA512

                                    2b9eaec1dd102f099fa62ed002575c07592b6c7857600a13e558b77327268024f5d093054b76bcb7b32e5f21fda2a089f053f7ff9e7ba74889ab51eef920f925

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                    Filesize

                                    108KB

                                    MD5

                                    8ce635ce587a167f2bb80cadda79b044

                                    SHA1

                                    811500302ac9d238725b635d262ddbe705fd9dbe

                                    SHA256

                                    3640e1265636b30bdf813dd3eb38b822713dff6ed12359d5d1f0c15134f975f4

                                    SHA512

                                    0b50949b11bf413fb3736a32bf15ec58ad16fc9c5d92e335282c1566059502ff769831bf4e52d9a2b432eb5eeb2b15f72dc3f195c79c6bbbd36e3e43956460ac

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5865e9.TMP

                                    Filesize

                                    97KB

                                    MD5

                                    214a7d993b7fd6c03bbade6304e005cc

                                    SHA1

                                    a0b887de5ef04365d42c871d11de51bd0afb687f

                                    SHA256

                                    c006ec1da19c2425b16634f04000fd86daa582a76200c271c638b578b7bfa7f3

                                    SHA512

                                    a03f13a4f5049259e750f348fa2a7194570d395766878fa3b591690a54b9274cddb5601aa71077c275142f736ec6235ce5921af9d8c50cc5a7f0f5f6f03f4849

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                    Filesize

                                    2B

                                    MD5

                                    99914b932bd37a50b983c5e7c90ae93b

                                    SHA1

                                    bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                    SHA256

                                    44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                    SHA512

                                    27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                  • C:\Users\Admin\Downloads\MEMZ.zip

                                    Filesize

                                    8KB

                                    MD5

                                    69977a5d1c648976d47b69ea3aa8fcaa

                                    SHA1

                                    4630cc15000c0d3149350b9ecda6cfc8f402938a

                                    SHA256

                                    61ca4d8dd992c763b47bebb9b5facb68a59ff0a594c2ff215aa4143b593ae9dc

                                    SHA512

                                    ba0671c72cd4209fabe0ee241b71e95bd9d8e78d77a893c94f87de5735fd10ea8b389cf4c48462910042c312ddff2f527999cd2f845d0c19a8673dbceda369fd

                                  • C:\note.txt

                                    Filesize

                                    218B

                                    MD5

                                    afa6955439b8d516721231029fb9ca1b

                                    SHA1

                                    087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

                                    SHA256

                                    8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

                                    SHA512

                                    5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf