Overview
overview
10Static
static
3000.exe
windows7-x64
000.exe
windows10-2004-x64
Ana.exe
windows7-x64
8Ana.exe
windows10-2004-x64
Bad Rabit.exe
windows7-x64
10Bad Rabit.exe
windows10-2004-x64
10Desktop Puzzle.exe
windows7-x64
1Desktop Puzzle.exe
windows10-2004-x64
1Memz.exe
windows7-x64
6Memz.exe
windows10-2004-x64
7NoEscape.exe
windows7-x64
1NoEscape.exe
windows10-2004-x64
WannaCrypt0r.exe
windows7-x64
10WannaCrypt0r.exe
windows10-2004-x64
10Resubmissions
08-06-2024 08:50
240608-krvyesae91 1008-05-2024 16:15
240508-tqnx6ach3w 1008-05-2024 16:07
240508-tkr3mafa54 1001-05-2024 18:02
240501-wmf49acg3s 627-04-2024 08:46
240427-kpfeysff8s 1025-04-2024 21:25
240425-z9y55afb7v 1025-04-2024 21:16
240425-z4pphafa97 1025-04-2024 18:27
240425-w3929sde33 1025-04-2024 18:17
240425-ww4a5sdc8x 10Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
000.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
000.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Ana.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Ana.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Bad Rabit.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Bad Rabit.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Desktop Puzzle.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
Desktop Puzzle.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
Memz.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Memz.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
NoEscape.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
NoEscape.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
WannaCrypt0r.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
WannaCrypt0r.exe
Resource
win10v2004-20240226-en
General
-
Target
Memz.exe
-
Size
14KB
-
MD5
19dbec50735b5f2a72d4199c4e184960
-
SHA1
6fed7732f7cb6f59743795b2ab154a3676f4c822
-
SHA256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
-
SHA512
aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
SSDEEP
192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Memz.exedescription ioc Process File opened for modification \??\PhysicalDrive0 Memz.exe -
Drops file in Windows directory 1 IoCs
Processes:
mspaint.exedescription ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000092652a3a16f749f5fdbb60bbe7e9a3f78114b19526b019338eb133ad5c53e7a2000000000e80000000020000200000004a1f03ce7fdeb79f9c4e6066d55f51e6a071ee39abbbfc579742b7cda0d8223620000000724e0aef13dd3477c013bf8bbdaed01a76ab1736d2d7161d9733d2ed95e4ab1d400000009df915489fad45d887e0d640070a841cfad4db3a77b0cbd47b90015f197bf6c5ff97e9517c8edfc2c0837dd87c4ea69beaa8d45c0310430bc491df9bfc5b3e00 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e9798d3c97da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B83351E1-032F-11EF-995F-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420230769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Memz.exeMemz.exeMemz.exeMemz.exeMemz.exepid Process 2484 Memz.exe 2484 Memz.exe 2484 Memz.exe 2976 Memz.exe 2976 Memz.exe 2532 Memz.exe 2484 Memz.exe 2976 Memz.exe 2532 Memz.exe 2484 Memz.exe 2532 Memz.exe 2976 Memz.exe 2496 Memz.exe 2484 Memz.exe 2596 Memz.exe 2976 Memz.exe 2596 Memz.exe 2496 Memz.exe 2532 Memz.exe 2484 Memz.exe 2976 Memz.exe 2496 Memz.exe 2484 Memz.exe 2596 Memz.exe 2532 Memz.exe 2976 Memz.exe 2496 Memz.exe 2484 Memz.exe 2532 Memz.exe 2596 Memz.exe 2484 Memz.exe 2976 Memz.exe 2596 Memz.exe 2496 Memz.exe 2532 Memz.exe 2976 Memz.exe 2484 Memz.exe 2496 Memz.exe 2596 Memz.exe 2532 Memz.exe 2976 Memz.exe 2496 Memz.exe 2484 Memz.exe 2596 Memz.exe 2532 Memz.exe 2484 Memz.exe 2976 Memz.exe 2532 Memz.exe 2496 Memz.exe 2596 Memz.exe 2976 Memz.exe 2496 Memz.exe 2484 Memz.exe 2532 Memz.exe 2596 Memz.exe 2484 Memz.exe 2596 Memz.exe 2976 Memz.exe 2532 Memz.exe 2496 Memz.exe 2976 Memz.exe 2484 Memz.exe 2496 Memz.exe 2596 Memz.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
mmc.exepid Process 708 mmc.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
mmc.exeAUDIODG.EXEdescription pid Process Token: 33 708 mmc.exe Token: SeIncBasePriorityPrivilege 708 mmc.exe Token: 33 708 mmc.exe Token: SeIncBasePriorityPrivilege 708 mmc.exe Token: 33 708 mmc.exe Token: SeIncBasePriorityPrivilege 708 mmc.exe Token: 33 1968 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1968 AUDIODG.EXE Token: 33 1968 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1968 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEmmc.exemmc.exewordpad.exemspaint.exepid Process 2180 iexplore.exe 2180 iexplore.exe 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 1372 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 1616 mmc.exe 708 mmc.exe 708 mmc.exe 640 wordpad.exe 640 wordpad.exe 640 wordpad.exe 640 wordpad.exe 640 wordpad.exe 2024 mspaint.exe 2024 mspaint.exe 2024 mspaint.exe 2024 mspaint.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
Memz.exeMemz.exeiexplore.exemmc.exewordpad.exedescription pid Process procid_target PID 2288 wrote to memory of 2484 2288 Memz.exe 28 PID 2288 wrote to memory of 2484 2288 Memz.exe 28 PID 2288 wrote to memory of 2484 2288 Memz.exe 28 PID 2288 wrote to memory of 2484 2288 Memz.exe 28 PID 2288 wrote to memory of 2976 2288 Memz.exe 29 PID 2288 wrote to memory of 2976 2288 Memz.exe 29 PID 2288 wrote to memory of 2976 2288 Memz.exe 29 PID 2288 wrote to memory of 2976 2288 Memz.exe 29 PID 2288 wrote to memory of 2532 2288 Memz.exe 30 PID 2288 wrote to memory of 2532 2288 Memz.exe 30 PID 2288 wrote to memory of 2532 2288 Memz.exe 30 PID 2288 wrote to memory of 2532 2288 Memz.exe 30 PID 2288 wrote to memory of 2496 2288 Memz.exe 31 PID 2288 wrote to memory of 2496 2288 Memz.exe 31 PID 2288 wrote to memory of 2496 2288 Memz.exe 31 PID 2288 wrote to memory of 2496 2288 Memz.exe 31 PID 2288 wrote to memory of 2596 2288 Memz.exe 32 PID 2288 wrote to memory of 2596 2288 Memz.exe 32 PID 2288 wrote to memory of 2596 2288 Memz.exe 32 PID 2288 wrote to memory of 2596 2288 Memz.exe 32 PID 2288 wrote to memory of 2684 2288 Memz.exe 33 PID 2288 wrote to memory of 2684 2288 Memz.exe 33 PID 2288 wrote to memory of 2684 2288 Memz.exe 33 PID 2288 wrote to memory of 2684 2288 Memz.exe 33 PID 2684 wrote to memory of 2540 2684 Memz.exe 34 PID 2684 wrote to memory of 2540 2684 Memz.exe 34 PID 2684 wrote to memory of 2540 2684 Memz.exe 34 PID 2684 wrote to memory of 2540 2684 Memz.exe 34 PID 2684 wrote to memory of 2180 2684 Memz.exe 35 PID 2684 wrote to memory of 2180 2684 Memz.exe 35 PID 2684 wrote to memory of 2180 2684 Memz.exe 35 PID 2684 wrote to memory of 2180 2684 Memz.exe 35 PID 2180 wrote to memory of 1372 2180 iexplore.exe 37 PID 2180 wrote to memory of 1372 2180 iexplore.exe 37 PID 2180 wrote to memory of 1372 2180 iexplore.exe 37 PID 2180 wrote to memory of 1372 2180 iexplore.exe 37 PID 2180 wrote to memory of 2560 2180 iexplore.exe 41 PID 2180 wrote to memory of 2560 2180 iexplore.exe 41 PID 2180 wrote to memory of 2560 2180 iexplore.exe 41 PID 2180 wrote to memory of 2560 2180 iexplore.exe 41 PID 2684 wrote to memory of 1616 2684 Memz.exe 42 PID 2684 wrote to memory of 1616 2684 Memz.exe 42 PID 2684 wrote to memory of 1616 2684 Memz.exe 42 PID 2684 wrote to memory of 1616 2684 Memz.exe 42 PID 1616 wrote to memory of 708 1616 mmc.exe 43 PID 1616 wrote to memory of 708 1616 mmc.exe 43 PID 1616 wrote to memory of 708 1616 mmc.exe 43 PID 1616 wrote to memory of 708 1616 mmc.exe 43 PID 2684 wrote to memory of 640 2684 Memz.exe 44 PID 2684 wrote to memory of 640 2684 Memz.exe 44 PID 2684 wrote to memory of 640 2684 Memz.exe 44 PID 2684 wrote to memory of 640 2684 Memz.exe 44 PID 640 wrote to memory of 1844 640 wordpad.exe 45 PID 640 wrote to memory of 1844 640 wordpad.exe 45 PID 640 wrote to memory of 1844 640 wordpad.exe 45 PID 640 wrote to memory of 1844 640 wordpad.exe 45 PID 2684 wrote to memory of 2024 2684 Memz.exe 46 PID 2684 wrote to memory of 2024 2684 Memz.exe 46 PID 2684 wrote to memory of 2024 2684 Memz.exe 46 PID 2684 wrote to memory of 2024 2684 Memz.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\Memz.exe"C:\Users\Admin\AppData\Local\Temp\Memz.exe" /main2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:2540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://google.co.ck/search?q=virus.exe3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:537613 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:708
-
-
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:1844
-
-
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\System32\mspaint.exe"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD526202b29cbd96f471fb231568c47830c
SHA1c2885ee1ac385f7aa8d2e021e720a39c549f4435
SHA2560acd1be7f5733975408446dc08ec5c0037f767926534ce882a1c6e45211a6bf9
SHA512f0089c62c6ca63c8409aa9d3bf7f5b322bb06199e906637e42ec1e924e494bc1f93cab4da1115a92bd66b150ef7bb83a4b14336d98cd24402cd83b721db350c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55af56937cb4064193429458d346103c0
SHA1af314c4618f6f051ea53f9771d02eaf3bd7a27ee
SHA25678987fd4b4727d784dd7fb1217f41e5e0acb49d7fbc19feb009ec4acd8864d8d
SHA5128c26d993aec6b3cdb9bc8893abfad8faf7d01c82442977a4bd8d3a61e830d969715ee29dd033c9ae2b2ec8fdd0bd95b6464e1fa249e74ddfdb868c1d98b293c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507e8628de7fe7c80a19144e2883ce2f1
SHA1326f349bf36f3c0b76a992adf0dcda74354a54f4
SHA256523a069472e6e471ab14e93326eb4433fb4ef3ace37c1b9482a1d7f9fa3aebba
SHA5128b2316e1dbf2d84415e5ec86d77be9f1b90d1a81148558bebbc6678a7699acd99f5bad382adfe6f5bd0f2af883f99f846ebe7bb72cfd90b82f7d654e391d2943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d962f3c49f1ec422ccfd7a88d311c7
SHA1ed9337d93276403920363eff6be00f1102737717
SHA256991505c08ff7bc175e8f0dc8eb528c9f045bf711f456477d44ef948c05d6644b
SHA5121ffd407f5e43301d3f40650061a1dc4c57d91a4a96c63d4d1cbe036e8de2076105812910a57bd1128bfb87f03ad9b15954fe0eab4dc3137f7cc1f6746b64c309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a11be0e6e00c6a892bd5f18411ec34b
SHA1286ba8d75f7edbae2c176cd62ecaccfe8d9ccbad
SHA256a215dc70214c56994ca37034c1c690228716d631058a7a54b75e0d3ab6ff4e63
SHA512c6d445b8dee2561e9fe485fe32dc6dbbd62e13c1de67dc488c6ba8a436d4fe3e45da59fdbc80e35f3a4b40b3f1380030804cb9b8bfc627ea10b7f1c7f7571c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58df31afb1635ef8770de5a63aaec20d8
SHA192dfc246e4e0b87d5c12122fad070bb7c5b11b44
SHA25683ce3aaca8057d3c71c5ca4c22457f57c7c926de3a1364453acb4689e3d399ef
SHA5121429e90503163fc53ec54230354506c475d8c3754e9af67a822ba85e6752303b04a33d138929192f097590854a38b55fa75c672f1692930ab959a7e4c25f723d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e243c6f1614ef7119c83b68ae22d7a41
SHA18768a2a50eb7ea004f1aef9f391ab7a2abd5f762
SHA25626d07848135c6821ea25dfbd5a01fbbd1e7898b78b752b0653fa0e4be54c854a
SHA51279b4ae0d9b471348ba416cb3aa9df27cd8fe875437a70b02d1e083be754611145503f45d095d1408cd5a932b2c458cbfd5414c88796b6fb4043208c80448e5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8904103ed702af20aa5bd50a500797a
SHA1081437461d31c2d29dc87984c50ce63a3ce3d4b4
SHA256764fe3e35f96abd891b73eeb5f849a639c11f1344230b118cb4cb0df52542313
SHA512c8bb2e82bb9819f2d698b62b3eeefbeec5d160781d5802734a562ca7a8d1b1b9ab1e45f1a6a8bd276a74a98bc78e1430ee6805f08c4a9d46a96ebc5ce1646cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d225e789705e9c51f00a19f01f5e9c7
SHA1c45bf12759c799b5d182715da9677828c80d0aa9
SHA256737faab9133ff923770073d126bd6d7a10691a83fe1080fe6fd509518ff86271
SHA512d7d790dc358deb4f4dd5fc9d719a25f94ffbb92eef55d3af4dbc1da87b250059ceb4384cb9e1e865cebefbb14b407b3baf728cf133b55dd30d8d14104813bdbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8ffd4318dd1631de38fa18e83975e9f
SHA18256b9cb889ab9faff7ea5d6057e15154e9638f8
SHA256b195454717dcfbc40e61fab7495996122852792e9562219cdd4505717118a9ba
SHA512239a0a4fb6d837b4a3e3f67a1a9efa7a886bd36c8896c62493b12a8c8b446502342c0d7ef2137b832cbf307ac750a1eed1fa171e8635d753d1c916dc63cff1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c35cb6a48a652b2238e26706d2f15e4
SHA1a6c9809a55b3c49085f4cfbc3c1286d3f84279d7
SHA256382cdfd6796b1d2858b87b4ec90d2726ee64b2f94c20f6e35bc02bbf6b20d7f8
SHA51290a4c4c853f045e8b2fca0400147ecb61e819b3025082237f459994cfb595d0d5eab682b73620f465c3b0221835ba562f413caa3250715bf93e7e99eddd32f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5df30d380ecc8f075a2fcce5df6d61eba
SHA1069a939a1f531999d7396a762a331e26671cdf1d
SHA2561241d18ce26e5eca24f25af452ae9ca48dc08983bbb6f80acde74aef58f8dce3
SHA512389f2ae8623391bd92b80baabb5fc0c00a26b1aec7295e36c27ae7e49af7f6626eb876f50d77a2fbf49afc11afbd39ed385391730f09a4e1e00e91d50ea6b8f1
-
Filesize
5KB
MD599a0fcf0ce36d7df1c114b71d535307c
SHA1ab2401fd88df7caf4144c5ab4650843733c80b74
SHA256a67c8a7f0a4c2e402fa750ba8d78c3e046b6524d41dde84b81dd62aacf4f3e7a
SHA5128c1d1dd957ab599c82310163e84d616058259afb55a16929621556436ca28c0edd595f935c7709f8c72ab19cbad3eb6d3129176b4dc4b3c0cdb985de5e57c7d2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf