Resubmissions

15-09-2024 23:12

240915-27aqvsxhjq 8

15-09-2024 23:02

240915-21efgaxake 8

15-09-2024 22:58

240915-2xypyaxdkj 3

15-09-2024 22:56

240915-2wn44sxcpk 3

15-09-2024 22:43

240915-2np2fawhpr 3

15-09-2024 22:42

240915-2m3k5swhmk 10

15-09-2024 22:33

240915-2gqdmawbja 8

15-09-2024 22:27

240915-2de4gswekk 7

15-09-2024 22:15

240915-16esravenh 10

Analysis

  • max time kernel
    173s
  • max time network
    177s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-09-2024 22:27

Errors

Reason
Machine shutdown

General

  • Target

    MEMZ 3.0/MEMZ.bat

  • Size

    12KB

  • MD5

    13a43c26bb98449fd82d2a552877013a

  • SHA1

    71eb7dc393ac1f204488e11f5c1eef56f1e746af

  • SHA256

    5f52365accb76d679b2b3946870439a62eb8936b9a0595f0fb0198138106b513

  • SHA512

    602518b238d80010fa88c2c88699f70645513963ef4f148a0345675738cf9b0c23b9aeb899d9f7830cc1e5c7e9c7147b2dc4a9222770b4a052ee0c879062cd5a

  • SSDEEP

    384:nnLhRNiqt0kCH2LR0GPXxGiZgCz+KG/yKhLdW79HOli+lz3:nLhRN9t0SR4iZtzlREBWhuF

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 59 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 32 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\MEMZ.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Windows\system32\cscript.exe
      cscript x.js
      2⤵
        PID:3420
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4428
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4556
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1380
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2656
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1068
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main
          3⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4788
          • C:\Windows\SysWOW64\notepad.exe
            "C:\Windows\System32\notepad.exe" \note.txt
            4⤵
            • System Location Discovery: System Language Discovery
            PID:776
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://google.co.ck/search?q=best+way+to+kill+yourself
            4⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1812
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffbb5233cb8,0x7ffbb5233cc8,0x7ffbb5233cd8
              5⤵
                PID:2032
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:2
                5⤵
                  PID:1660
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:3
                  5⤵
                    PID:2996
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2480 /prefetch:8
                    5⤵
                      PID:4584
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
                      5⤵
                        PID:2188
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                        5⤵
                          PID:3004
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
                          5⤵
                            PID:4548
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:8
                            5⤵
                              PID:1136
                            • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:8
                              5⤵
                              • Suspicious use of SetWindowsHookEx
                              PID:1324
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:1
                              5⤵
                                PID:4132
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:1
                                5⤵
                                  PID:3500
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:1
                                  5⤵
                                    PID:3872
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:1
                                    5⤵
                                      PID:2436
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1
                                      5⤵
                                        PID:3508
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:1
                                        5⤵
                                          PID:1616
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2736 /prefetch:1
                                          5⤵
                                            PID:3656
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                                            5⤵
                                              PID:4572
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,7078906603573329757,14927818416156758887,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4836 /prefetch:2
                                              5⤵
                                                PID:2420
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://google.co.ck/search?q=how+2+buy+weed
                                              4⤵
                                                PID:1860
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0x11c,0xf8,0x7ffbb5233cb8,0x7ffbb5233cc8,0x7ffbb5233cd8
                                                  5⤵
                                                    PID:4012
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://google.co.ck/search?q=how+2+remove+a+virus
                                                  4⤵
                                                    PID:1472
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffbb5233cb8,0x7ffbb5233cc8,0x7ffbb5233cd8
                                                      5⤵
                                                        PID:3872
                                                    • C:\Windows\SysWOW64\calc.exe
                                                      "C:\Windows\System32\calc.exe"
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Modifies registry class
                                                      PID:3824
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe"
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:756
                                                    • C:\Windows\SysWOW64\mmc.exe
                                                      "C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2848
                                                      • C:\Windows\system32\mmc.exe
                                                        "C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"
                                                        5⤵
                                                        • Drops file in System32 directory
                                                        • Drops file in Windows directory
                                                        • Checks SCSI registry key(s)
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:3236
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:1852
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:3524
                                                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                                    1⤵
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3748
                                                  • C:\Windows\system32\OpenWith.exe
                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                    1⤵
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1956
                                                  • C:\Windows\system32\AUDIODG.EXE
                                                    C:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E4
                                                    1⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3228
                                                  • C:\Windows\system32\LogonUI.exe
                                                    "LogonUI.exe" /flags:0x4 /state0:0xa398b855 /state1:0x41c64e6d
                                                    1⤵
                                                    • Modifies data under HKEY_USERS
                                                    PID:1484

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    ea667b2dedf919487c556b97119cf88a

                                                    SHA1

                                                    0ee7b1da90be47cc31406f4dba755fd083a29762

                                                    SHA256

                                                    9e7e47ebf490ba409eab3be0314fa695bf28f4764f4875c7568a54337f2df70f

                                                    SHA512

                                                    832391afcac34fc6c949dee8120f2a5f83ca68c159ff707751d844b085c7496930f0c8fd8313fd8f10a5f5725138be651953934aa79b087ba3c6dd22eaa49c72

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    2ee16858e751901224340cabb25e5704

                                                    SHA1

                                                    24e0d2d301f282fb8e492e9df0b36603b28477b2

                                                    SHA256

                                                    e9784fcff01f83f4925f23e3a24bce63314ea503c2091f7309c014895fead33c

                                                    SHA512

                                                    bd9994c2fb4bf097ce7ffea412a2bed97e3af386108ab6aab0df9472a92d4bd94489bb9c36750a92f9818fa3ea6d1756497f5364611e6ebd36de4cd14e9a0fba

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                                                    Filesize

                                                    212KB

                                                    MD5

                                                    08ec57068db9971e917b9046f90d0e49

                                                    SHA1

                                                    28b80d73a861f88735d89e301fa98f2ae502e94b

                                                    SHA256

                                                    7a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1

                                                    SHA512

                                                    b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                                    Filesize

                                                    24KB

                                                    MD5

                                                    c594a826934b9505d591d0f7a7df80b7

                                                    SHA1

                                                    c04b8637e686f71f3fc46a29a86346ba9b04ae18

                                                    SHA256

                                                    e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610

                                                    SHA512

                                                    04a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\03ae0658db22f33f_0

                                                    Filesize

                                                    289B

                                                    MD5

                                                    5c3060f65bfcdca9f3458273f15eacf1

                                                    SHA1

                                                    8517b71c1602c90e9039961456a8343cf939f7ee

                                                    SHA256

                                                    033f03649150db521aecfb3fcdb3194e687414980b36f09f076e3bfcb7a6303c

                                                    SHA512

                                                    e4bb2b6b6d3a07b37b15d8f40b36d010cfc07c71511b3172ca86eb93c8d8dcfaa532d5d4643d955e6db94e888d485fbc7a2c0cad78ce82ded4b3e1dedd99a7e8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\c0fa52bc2a2c6ddd_0

                                                    Filesize

                                                    339KB

                                                    MD5

                                                    a3aa0218ef4f15db57facf736b84ff2e

                                                    SHA1

                                                    255e9aeec0a2aca5fe3f3274dc7c14641dae016c

                                                    SHA256

                                                    5ea5bde718b26c747313e14a306c81f2476d3da9ff55495f906e38a7242f1ee9

                                                    SHA512

                                                    2f31a9dfed6e7ff1f634215f386f393928e2f98e227645d0cf720c28af5cc2feaa6e94d26bd7a916ccb59d182d645dc1531d521eec9c4118343f8de33f937f21

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    120B

                                                    MD5

                                                    2267b8a18cf3cce7164558ec4a6365b8

                                                    SHA1

                                                    1828e488a3d3883988c402b03efa665e03ab1d2e

                                                    SHA256

                                                    df54ea404f269358a32f6a8390374f14cd644afe87d6156eba892b0a44f4c1bb

                                                    SHA512

                                                    abe74f9ab04314a2e168612a1c242940f708268c1a237e701012b04e115c5d38c2a8ad34d9e76edcfccf3e213589f82c76912d6db5ba22cac872c48fd560e878

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    120B

                                                    MD5

                                                    c4025b60b80cc55b5ead5cf8675964a7

                                                    SHA1

                                                    c40b040cf07ca3c24d957a29c23dc239544b35d9

                                                    SHA256

                                                    f457de902d45da3cc328dd4bf36b8249d22bbf219dd22e414cee02b6891e464d

                                                    SHA512

                                                    8e03ffa67907b3e6d65882633118ce5aec604351800e4d3a6550c29dec981653003d9308c1ea1f6697ecedab03ebdc4811f1a8e5313a5e6714405d84bd463749

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    120B

                                                    MD5

                                                    e0951590f054805f24bd0618811007b9

                                                    SHA1

                                                    919db5385b95d0ab17f2c99aaf31d04b4a6c4b50

                                                    SHA256

                                                    fc99933272d797646d7d8edbcb187829a70f0db1c7f35e8e68a9ab54b0962d1b

                                                    SHA512

                                                    6c04e15b7e95a3006dc3a3b748e9e4403be4e48dd3122ade82de817ce579ea54adeacd8a9d66a4965377d63e7f24937cdeddc96358adc67d13b16e9dc9a5e02e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    a1e0a245a3d482be20e518885adaa225

                                                    SHA1

                                                    10fc29db19e55eae8ae6789ff4258d8cc89c71f9

                                                    SHA256

                                                    6399b4c2bd408ad843c50a8e2105b5159b676137a4c4b63e6ea04bd7f50f020e

                                                    SHA512

                                                    0ae638e51e2dc272bd1fe090cd5c546234d8ada467496919b8461d1273e538477c666095e85d131573823a922c4185e59e9ed4cb95e84a9867d7fae9c7857eb8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    9d10654469ce0898d786dffdca4c73d2

                                                    SHA1

                                                    e30b5fc443e533f333a12d87235fb0f96026d77e

                                                    SHA256

                                                    6061c2897f069fd7c22dfc8cdf3e91d5bd1c15e5516207287e8582fae33e5ec9

                                                    SHA512

                                                    552c682203171fd3792a7ffdb1eda57666152c7e67045ac936449641e41e6813c6924eaa6b500190d55eeef1fcffb53b0e5917e5ebd4c742ce68d94f0c8849da

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    02d62d80cca84916d181096b03893753

                                                    SHA1

                                                    f617a97273cc8d8d3c3962b6c30cc73d5e229ab3

                                                    SHA256

                                                    5f53079cde088ec3121880468bd4ad8a3f63e3819e19c6755281dbd7256d39a5

                                                    SHA512

                                                    527d7d2993252524e2b330c8216ff52862c50eb15b78fa12d687a023787f98c3b042d46f2eb67ca1745e4a439534ea03a0a3bd6fc1286264e02add32fbb8f30c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    2ffdc71f0d6c7977cb25783801473b36

                                                    SHA1

                                                    c87b7c01854bb6543ed4c2a6e4ef6c6f08e9766c

                                                    SHA256

                                                    611649cc239ed64577fee03ceb1874206f4da815d34da32fd1da255d01ef5e07

                                                    SHA512

                                                    c54166f36d3dd732b5aedccade88df06fcd50d13c9ae0af66c1601181c5f2e9440030b810c7520572cd012d9ecba90bb1339e5d57227d2fc08e724372e998b15

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    9e7962cc106af9d347ab2aa2df2978e2

                                                    SHA1

                                                    99ecf04859c83445414289ee3cd3c47aaf867794

                                                    SHA256

                                                    0dbe8f9e68a84287d34cadb97a5eeb5f0e2fbb911758aa3d9df884b925217e45

                                                    SHA512

                                                    c315cac5cd46bf647f265c39b93267033797d9302d0a298d28f54ee682d474f789bd357452d7e8318efb063cd43da4ad60da9c779c7a9f9bd042bfff77d75f0c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    46295cac801e5d4857d09837238a6394

                                                    SHA1

                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                    SHA256

                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                    SHA512

                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    206702161f94c5cd39fadd03f4014d98

                                                    SHA1

                                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                    SHA256

                                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                    SHA512

                                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    8a325df7e8febc260e615e91a8064a2c

                                                    SHA1

                                                    6f6424a106298c51d993c8477c16c599b26b74a6

                                                    SHA256

                                                    0ad02b2fecd08c5f87b03ba0543bd5db54670eaf174508b6a3b7ff65936445c4

                                                    SHA512

                                                    791762bb2b50dcd34d4201dc87f4808718042c225d0f16e5c552da83dc4211ca9101be2a61fb0b2d43db9cabafbdb81fdd8f50d85aa078b34894b6bb29d00532

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    69026dd64e4cb334d562055b3add2db3

                                                    SHA1

                                                    3380d3cd4bc5274c76fbcd100483f6cf117fd120

                                                    SHA256

                                                    26978862fc121a8dd2aaa6c0cca331dbac3dd957676758f7b66e539bfacad122

                                                    SHA512

                                                    c3040e4ae94f71a79ce5d9e6afd9a71eaaa7467543b07e048273fded538a45d228ecb63adb8e0eb54bb4ae100d5b6c23f93ddd87c0f78a7a0e73e51f29f1735f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    078935fce0e545757614fdde19440b34

                                                    SHA1

                                                    07b66ec67f211cf6819b1c03cc0c57965f1c5684

                                                    SHA256

                                                    50f359b785ebd71ad1a8804234e0f3122e992fc7e9de17fee783953cbcfd55be

                                                    SHA512

                                                    1a97cbe954d24d776b51c55de8d795c611a495a047fff120343ae24b25c3b942dc74c14bc304fdc13502b640ca28b249eb7dacaf50981ab4cb01e746fa292637

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    26adad8f5ed2f4800853d33bf3d733c6

                                                    SHA1

                                                    4960635b41f1bde9bfc90ef21776ed61e3f18c2d

                                                    SHA256

                                                    4e45a29b0ebe3c258ae7d80d75faab00db8224756eacaa0e085e1084cd07b28e

                                                    SHA512

                                                    0a676f5595f23034521b092d214dcdc0ab11cb97041bcf3b9cf4cd4c7c0da6c130c514e9a6d60dd37c9850bee4dd5e5a64758693f3da89513c6ac77422f832a0

                                                  • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\x

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    fc59b7d2eb1edbb9c8cb9eb08115a98e

                                                    SHA1

                                                    90a6479ce14f8548df54c434c0a524e25efd9d17

                                                    SHA256

                                                    a05b9be9dd87492f265094146e18d628744c6b09c0e7efaabf228a9f1091a279

                                                    SHA512

                                                    3392cfc0dbddb37932e76da5a49f4e010a49aaa863c882b85cccab676cd458cfc8f880d8a0e0dc7581175f447e6b0a002da1591ecd14756650bb74996eacd2b1

                                                  • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\x

                                                    Filesize

                                                    4KB

                                                    MD5

                                                    b6873c6cbfc8482c7f0e2dcb77fb7f12

                                                    SHA1

                                                    844b14037e1f90973a04593785dc88dfca517673

                                                    SHA256

                                                    0a0cad82d9284ccc3c07de323b76ee2d1c0b328bd2ce59073ed5ac4eb7609bd1

                                                    SHA512

                                                    f3aa3d46d970db574113f40f489ff8a5f041606e79c4ab02301b283c66ff05732be4c5edc1cf4a851da9fbaaa2f296b97fc1135210966a0e2dfc3763398dfcaf

                                                  • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\x.js

                                                    Filesize

                                                    448B

                                                    MD5

                                                    8eec8704d2a7bc80b95b7460c06f4854

                                                    SHA1

                                                    1b34585c1fa7ec0bd0505478ac9dbb8b8d19f326

                                                    SHA256

                                                    aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596

                                                    SHA512

                                                    e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210

                                                  • C:\Users\Admin\AppData\Local\Temp\MEMZ 3.0\z.zip

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    cf0c19ef6909e5c1f10c8460ba9299d8

                                                    SHA1

                                                    875b575c124acfc1a4a21c1e05acb9690e50b880

                                                    SHA256

                                                    abb834ebd4b7d7f8ddf545976818f41b3cb51d2b895038a56457616d3a2c6776

                                                    SHA512

                                                    d930a022a373c283f35d103e277487c2034a0b0814913b8f6ec695b45e20528667aa830eeab58e4483d523bd6a755a16a5379095cb137db6c91909a545a19a2f

                                                  • C:\Users\Admin\AppData\Roaming\MEMZ.exe

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                    SHA1

                                                    761168201520c199dba68add3a607922d8d4a86e

                                                    SHA256

                                                    3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                    SHA512

                                                    89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                  • C:\note.txt

                                                    Filesize

                                                    218B

                                                    MD5

                                                    afa6955439b8d516721231029fb9ca1b

                                                    SHA1

                                                    087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

                                                    SHA256

                                                    8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

                                                    SHA512

                                                    5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf