Overview
overview
10Static
static
10Malware-1-...30.exe
windows7-x64
10Malware-1-...30.exe
windows10-2004-x64
10Malware-1-...40.exe
windows7-x64
10Malware-1-...40.exe
windows10-2004-x64
8Malware-1-...32.exe
windows7-x64
10Malware-1-...32.exe
windows10-2004-x64
10Malware-1-.../5.exe
windows7-x64
10Malware-1-.../5.exe
windows10-2004-x64
10Malware-1-...91.exe
windows7-x64
5Malware-1-...91.exe
windows10-2004-x64
10Malware-1-...ey.exe
windows7-x64
7Malware-1-...ey.exe
windows10-2004-x64
8Malware-1-...ad.exe
windows7-x64
6Malware-1-...ad.exe
windows10-2004-x64
8Malware-1-...ti.exe
windows7-x64
5Malware-1-...ti.exe
windows10-2004-x64
8Malware-1-...an.bat
windows7-x64
7Malware-1-...an.bat
windows10-2004-x64
8Malware-1-...an.exe
windows7-x64
3Malware-1-...an.exe
windows10-2004-x64
8Malware-1-...ve.bat
windows7-x64
7Malware-1-...ve.bat
windows10-2004-x64
8Malware-1-...ve.exe
windows7-x64
6Malware-1-...ve.exe
windows10-2004-x64
8Malware-1-...ya.exe
windows7-x64
6Malware-1-...ya.exe
windows10-2004-x64
Malware-1-...re.exe
windows7-x64
10Malware-1-...re.exe
windows10-2004-x64
10Malware-1-...ry.exe
windows7-x64
10Malware-1-...ry.exe
windows10-2004-x64
10Malware-1-...ck.exe
windows7-x64
3Malware-1-...ck.exe
windows10-2004-x64
8Resubmissions
13-02-2025 01:26
250213-btppra1pcz 1017-01-2025 20:14
250117-yz7h3s1qfw 1017-01-2025 20:12
250117-yy9l2sslcr 1017-01-2025 17:25
250117-vy9p9sxpez 1017-01-2025 17:21
250117-vw8eesyjfp 1017-01-2025 14:16
250117-rk9ass1rhk 1017-01-2025 14:12
250117-rhv1ds1lds 1016-01-2025 12:52
250116-p4et7a1mez 10Analysis
-
max time kernel
899s -
max time network
849s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-02-2025 01:26
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Malware-1-master/2530.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
Malware-1-master/2887140.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Malware-1-master/2887140.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral5
Sample
Malware-1-master/32.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Malware-1-master/32.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
Malware-1-master/5.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Malware-1-master/5.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
Malware-1-master/96591.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Malware-1-master/96591.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
Malware-1-master/Amadey.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Malware-1-master/Amadey.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral13
Sample
Malware-1-master/Download.exe
Resource
win7-20250207-en
Behavioral task
behavioral14
Sample
Malware-1-master/Download.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral15
Sample
Malware-1-master/Illuminati.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Malware-1-master/Illuminati.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral17
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral21
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win10v2004-20250211-en
Behavioral task
behavioral23
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral25
Sample
Malware-1-master/Petya.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Malware-1-master/Petya.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral27
Sample
Malware-1-master/Software.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
Malware-1-master/Software.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral29
Sample
Malware-1-master/WannaCry.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
Malware-1-master/WannaCry.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral31
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win10v2004-20250211-en
General
-
Target
Malware-1-master/MEMZ-Clean.bat
-
Size
9KB
-
MD5
bbae81b88416d8fba76dd3145a831d19
-
SHA1
42fa0e1b90ad49f66d4ab96c8cca02f81248da8b
-
SHA256
5c3fde60c178ed0306dd3e396032acdc9bc55c690e27a926923dd18238bbd64c
-
SHA512
f03ac63bbb504cb53dc896c2bec8666257034b1c4a5827a4ad75c434af05f1cd631a814cc8689e60210e4ca757e61390db8d222f05bf9f3a0fa7026bdf8c4368
-
SSDEEP
192:XBOTDzoOgdlf7MAdTyQuHq2b1vXei2SLca5icrLJlz3:ss/tDyQuHZddL5Jlz3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 MEMZ.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010dad1b8489b8c46a5be8564bece1ab300000000020000000000106600000001000020000000da50163a644fd9f97f38cde856284e38ec9eb77a6bce6732313935e25a6ef366000000000e800000000200002000000077e7242ad668d14af296e93715988f97edb7cda039ee9fd6ae60599a7f62971f20000000ba8dfdf4cd9898794cef8470c6ec4f9d18812c3d530619e6e06cab09a9c087d040000000027f602f1018aad3e38ebb6b5b21632792be79fb5b179ffe78c3960826cdc00ffaeef10983e654a5c012ac4c59cd0fbda10e23459d7d6d151560f2ee5fc31717 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "445571947" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE5B7B91-E9A9-11EF-98B1-E20EBDDD16B9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0210f98b67ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1712 MEMZ.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 1628 iexplore.exe 1628 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1712 MEMZ.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2680 cscript.exe 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2680 1116 cmd.exe 32 PID 1116 wrote to memory of 2680 1116 cmd.exe 32 PID 1116 wrote to memory of 2680 1116 cmd.exe 32 PID 1116 wrote to memory of 1712 1116 cmd.exe 33 PID 1116 wrote to memory of 1712 1116 cmd.exe 33 PID 1116 wrote to memory of 1712 1116 cmd.exe 33 PID 1116 wrote to memory of 1712 1116 cmd.exe 33 PID 1712 wrote to memory of 1628 1712 MEMZ.exe 34 PID 1712 wrote to memory of 1628 1712 MEMZ.exe 34 PID 1712 wrote to memory of 1628 1712 MEMZ.exe 34 PID 1712 wrote to memory of 1628 1712 MEMZ.exe 34 PID 1628 wrote to memory of 1908 1628 iexplore.exe 35 PID 1628 wrote to memory of 1908 1628 iexplore.exe 35 PID 1628 wrote to memory of 1908 1628 iexplore.exe 35 PID 1628 wrote to memory of 1908 1628 iexplore.exe 35 PID 1628 wrote to memory of 2780 1628 iexplore.exe 38 PID 1628 wrote to memory of 2780 1628 iexplore.exe 38 PID 1628 wrote to memory of 2780 1628 iexplore.exe 38 PID 1628 wrote to memory of 2780 1628 iexplore.exe 38 PID 1628 wrote to memory of 2332 1628 iexplore.exe 39 PID 1628 wrote to memory of 2332 1628 iexplore.exe 39 PID 1628 wrote to memory of 2332 1628 iexplore.exe 39 PID 1628 wrote to memory of 2332 1628 iexplore.exe 39 PID 1628 wrote to memory of 2772 1628 iexplore.exe 40 PID 1628 wrote to memory of 2772 1628 iexplore.exe 40 PID 1628 wrote to memory of 2772 1628 iexplore.exe 40 PID 1628 wrote to memory of 2772 1628 iexplore.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Clean.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\cscript.execscript x.js2⤵
- Suspicious use of FindShellTrayWindow
PID:2680
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://google.co.ck/search?q=the+memz+are+real3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:603147 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:930831 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:537625 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f8401f4104e93138f2c8bba0363369f8
SHA14336f4d023aaa785516578475e9b55af4d0f6dd8
SHA256dada9f6fc4edebdfeca44e1488ee10fc247da336e01aa5ba4c6fdd9516865035
SHA5127b723f6e614d5d6ec741f939cf4fd5e6ecb1a15f0d8d97d438bd206603283d3025415266fb6f9e74f9aa1682ffdaa6e1f4e377cf229cada28ff91b5fc3f4a99e
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_DF7E0826E3998899AC6568DD2C34F18A
Filesize472B
MD5b8c5b8bc14f295df88567c881e46c4ce
SHA13787236f1aeea9a07d422ecd69a32020d5437c69
SHA256de3fb78a4794780ac66dae288c46de61100c8c9a744012b5fc08545b32f8f7de
SHA512673677e1d1255807adffe282af28fcf194e2f0f617f6738b87e3a9b5d66f4253a81542c2c618c73aed0033955833673afea0e1a6dea807a10f8ffda7b8450f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_4654F046C50FA3E6AFD0824D55A1E2F2
Filesize471B
MD5631f24603088ad998a860b05c8a9ebeb
SHA16ce70c57de3963f95749c6f31f43cd4b01b77d80
SHA256294f0974892e58f2328c3e8e8a9f5fbf40febf4e77420c1672776a2b5c947a4a
SHA512e1570674a35fc772b5b6b7cd01e46e407bb2ec542cf090d0793942a126f91563ab70c8f8406f052d38a064aefd83726deda98a348f1f2cc62bdc5247bcbaaccb
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD510b08ea29811a33a550fc989d6bedea7
SHA1e31609e73e259c27907c0eddedb12b5373e4bb07
SHA25697f2c2cf6b9b4769b5a2df9904d9f126e5f9bf9bfe7ec671199806bd169267d5
SHA51209b201d3097ec08dc5be8e0640b15a84250d4a443c144ae7e1039b13a193c439649075aa1a5ee5815b3755437c9fc3464a0ae60310c20caa739a945ce04d8f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD59080ddfa780350697ac539f37b3921a2
SHA1af7e9eece3b4c4175f5b1c22d7caf21895388342
SHA256a6c22869a657975b877b00b2aebb84b8b5b499b8c709ae8c1891b7ac1e2838d4
SHA5123b65d483d72062f0021c25b292656da294db24b632a03eea35acc458180ed7c5e24a7a8a95edd3bce6ae062cc1915d7023568fa7152f35db354c87138beb9fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56af281b13d30f261f302d5a49214d58a
SHA1bf0cb704c09e12d69767cf8e31602d72cd67c497
SHA2562cabcb238306483b57884df2d6000cdcde64a801c8fe0f18b5e8cc1fcdfa4bbb
SHA512e372269b09a17154a14c9c25ac252f67bc146d7af92a0245790d0d17b7efac19e45ff68933938c4a7e8578d0b36b0034279515c4805b9568bb389a94a6af8974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453ab1e23b8ccb28968786a708ba366a
SHA152e0edd3366b7e980b9107f62fd7acb51843ca28
SHA256fc3cef79c5b8ce6a4a8a22ab9f440771a99f035a9f0ef92df3b3f078653bd03d
SHA5129b5148472d90714485f5715b6dfb974642715845351b398996297ed33eb922296f805107ea21b03a278da2a68a9971669b4ff70d40d926d3aba10af09fb05c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af40e21e69748e170815f49646381240
SHA1eb13d258463ffee3a3eef09d953faf96380ab3be
SHA2564659f5e94776440ada19d92179ede260800b53271b058003d9972f69cc8419b6
SHA5120254349c1188df4789af75bbaea13c52b1e139ece14cdf188f6336d09919dddf8398ad71df9a0f01f9cb7c7a239fbac9495d5711b12717957944ee83e0786685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54848b521e975b90d0b37d1199f60d927
SHA12bfb20805513cd69f105fbbc5a4c246cc553cf82
SHA256c31801ffa4b8ae2198d91a675509b85bad85c39483f9b52916d2fabc31c06e3c
SHA512721e8a7c50926ffbacf1be3209f0fadd2177c0b260ffcaafce7378d804c0d36294efab60d6c9bc80ea4690815df9fc87f69dc83c77ef42c1eaeb6b4aeaab0547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598bc0089d820bd5f27988c9d12c576de
SHA187a4ac46081dbf4597ab9b8c3bff0601ecc8a646
SHA256ec1e1709ad2273e2a2388e1972aa7eda256ba5c749583b04b498b763f4385907
SHA512404505dd1cb12bd150b9490f63a12d35fa7a9ed5601a8cee73caf239107baf1bebf42579b5cde7e06824d00552a3d94503b97b049ebec49db8310e5a26e012ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44feebcc8f0666f45f71a7e4813057f
SHA1394a6762804f47a64770e5511886c3e65be66574
SHA256916b426a4470345597468b88c996aad95bad54b33bcca5dee47629ee089fcb50
SHA5129b5764392f6763fc7fe5c0d6dead1980305814a9de30baa011607349757fd9e7012b9129a2d2ea1ee1d39778f26f3d34113a4ea037a114c39fa24a1ffe7bc190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb286346ac17c60b95d675a359471b4c
SHA1a4f99a2fd9fa6214cd03057111910cc9a24778cd
SHA256927d0809ddc1f9d3989356f029c6fd66b6d01bedba9295a21d880d55d02cdbd7
SHA512338a4a89437f577ad997680311548896aba7157a76441dc61dbbe72f32eadc0fed2b22c214a66299b115f71f2cb52a7101b27455c74802090ea309737beb7f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5f0b0817275ea6eaad5e42ce9914f7
SHA1576ea278f4c448ac295ffd721bde67e01ec7bad0
SHA2565e6e8f7b2e509ff50027a892deffc9f1d2310030679f9bb93d5d52dfdc6a91d9
SHA5129e693f189900e0311ba0f1856a1f8da92cd341c388e7ef517004394ddcf4b694b51242486a0769a4b928043da2a0cd9e9a4735fa4fc6c21ec918ae64e579b029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f02fdc0896aeea7da44858adc62d97
SHA10d98a9a12ab847eacaff88e9087b2189468b91c7
SHA256cc331b3fb7945d7670a6a90249767a2e0d0a41905aecb786e67cc965bf26c354
SHA5129a623fd22a220787742593941fb6fd6d4f042335233661b6a6007bc6ba3061dede2356a1a9a9e4561391967996f4eeef69346eb146594ffcf261ae9fc871b7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d348207d90227d93cc8e01698f82c246
SHA16ccb10c4f927f5425b411ffb12c521423fb823cd
SHA25648f20b72f40e584881afea5347819d2d3876ab67f8e4c509468a6ac3af7b2873
SHA512c99b9dfcdbe08fc7a02cf7a600ff8b1b0bcd15b61790c54a9ad03ac445221437203f670be8152b8997bb9b0c94891e0a7f6bfa33f376314a42182c106a9ba7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5738e45f1797f258709d865b397dbb5
SHA152a4c5dc339252db41dec8696f1fb6c8a8893085
SHA256bc7af98c02776b2d96d2a7cc8ba25d5dfc9178a02f7f44dc59a66f89cb6960b9
SHA512cad8a2f05b59fe290486e45cfffffbb28a364ce5b13f2c6bd74011b4e54b93b290b21fe590e3a31ae1a2afb1acd776590f259f695d6c015a3b699d80e0fef287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2f972887f579b1c6788fae546a2c7f
SHA1fb6fc5b905c770aa4b09aa7dae8d3014067b3303
SHA25670c4948e4c286edcc75233631f0549b37e204355bd593439cdb22403070d76c2
SHA512411cf70b44087c54c17d4d756df7dd1799b2571725d5f93b959bcac946d08bbff595c51b6aff809b2ebf710d9b62b849312608eef0eafa156dd9908b8109b443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130cd7e7c6feef87bfb34821477a963b
SHA171dfac153ba6fea27760d598c57a3cc1837f11d8
SHA2565cd1660f1659d55574b9e0d18500d57ac96cb11e98993bd0a576aa23cc8a1d36
SHA51231274e8d02b2713e3f2a53beaf2a5d00d7e5a64900e6eaa618e9fadead27c732dbdda1adfc9b6a2d5121a389017f494a3382bdfb1791d932b289935ef7b9d39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_DF7E0826E3998899AC6568DD2C34F18A
Filesize402B
MD5ab7b06604c14e3f74adc39ee6c0b4089
SHA1d9fe6655a3457980529c915cc9f985aa310767ab
SHA25662212999ee834458c1a4a97be1727afd8531b4f505fd8ed6deb3bcf9851827c7
SHA51207b523a933e52485026c73022ec80d09b79cc97517ec33ef38c1d66f1c9a26118bbe554fe7a4544339f3b38d4d38377823b197ed56450a54c7e4794dc1e41f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_4654F046C50FA3E6AFD0824D55A1E2F2
Filesize402B
MD5c1b523c2b1b314c310f7574a605406b8
SHA10006c2338d6fe4546ee750e779a08b7a517414d1
SHA256fbede47daefa2e3f7f0a3db28d548dd5543a5031814d4dfae9ebfd2f46816d1d
SHA51292634493d3c97a70214fc7e97f128a6107fa649dcefe859ca1e8a5df6cfea626edb42832696eec4c2c082ae9e74fa009a096d143fb84858a76d4465a665bff8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56fa09fb65995154501dc7ebf483408d5
SHA14a3f51b4a6c1e3d79de9e2d98d0266c2c7492986
SHA256de1adc117c46a64e6c82b57ee2dab84edb0c860fcddbda531af1d2db822042c8
SHA51214cbc2a67e5926e03d69de4f37fb61c3a6a81e5b756fbba26022a153747f2bb377fb3f09e9cecfa0ade407a520df51d3dee22a67b28cb7fa797968826e4ae209
-
Filesize
5KB
MD59b63afe7692450b2c264bd8655d1e8a1
SHA1d874a87e2be71d1dd56005c004e78d8985a81da6
SHA256adedb5006c8aa95a3c20cd37803f5d5c91d897b2a7e805c1ef327987608f2fc0
SHA512b4deb012a8b0e02bcde31eebc8c99914474efd360701ef0ced30c9170ec4cf590b6f9f45c41f1a3d4278712412c37523e96a42f189c33d70fce205ac13721ec8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\search[1].htm
Filesize247B
MD5a4d9ae83d488af6206c02058e591e1e9
SHA1e92f3ca4db460708f1c6206d589dc0fc42ce5c1c
SHA256385a004f309d9133f9822e32d86e2f19e164b7e55517e5b4f6080de4d689e733
SHA512392edf77be9b500cf00c1d88efe907c15cc921897cbeabd933d2faac844f2b1e823f12bc802bffbc956b591ba6435f948308120a14d08300b6fdbe37f4adba6f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\favicon[1].ico
Filesize5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
5KB
MD5d2ea024b943caa1361833885b832d20b
SHA11e17c27a3260862645bdaff5cf82c44172d4df9a
SHA25639df3364a3af6f7d360aa7e1345e27befc4be960e0e7e7e060b20f3389b80e76
SHA5127b7cfb5e689feed6a52eedf36b89a7b5cc411191571c0af5e5d704b5f24bfa04afa62d1daab159a7e5702d80e56f3946bf32db0551d256419ca12cd3c57dcecb
-
Filesize
8KB
MD55ce1a2162bf5e16485f5e263b3cc5cf5
SHA1e9ec3e06bef08fcf29be35c6a4b2217a8328133c
SHA2560557ea4c5e309b16458ca32ac617b76d1a55f5f0103e368d05c0f0386b7a0a43
SHA512ceb5e270bdbcab5be645e50705e3111a5c4751a7a865580d53fa86580025201264a49dd0ea9135b10cff28d7bb21b767ac5d4aff40e880a866ab35df273b5de1
-
Filesize
4KB
MD520e335859ff991575cf1ddf538e5817c
SHA11e81b804d67d6c0e22c0cef7e1cb9f86ce0ef5ee
SHA25688339750431112ed60cdf9bdb7697434ba9b38e2d15ad604c4462705bc1bdfcf
SHA512012251b342722cf35ebec2c7d071db505a992d81fc4b3492cd87640b5c955dc084825fc5e72edc821f4c481867183f21d26cd904fe7f0373d1156332f87b031d
-
Filesize
448B
MD58eec8704d2a7bc80b95b7460c06f4854
SHA11b34585c1fa7ec0bd0505478ac9dbb8b8d19f326
SHA256aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596
SHA512e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
12KB
MD59c642c5b111ee85a6bccffc7af896a51
SHA1eca8571b994fd40e2018f48c214fab6472a98bab
SHA2564bbf7589615ebdb6c769d6d2e7bdcb26072bac0cda6e225a4133ba8819e688d5
SHA51223cc74b5a7bdf70ba789d1730a0009414cfb9c780544e3d8d841be58782b9a9a089969c4295a0da25d07285505992386486d6ff0524e75605b96bb99cd3aaa1c
-
Filesize
425B
MD549814df29dccdd3e4e76f696d9992814
SHA1fedcf6448199e03ca09007d807fd49895653e443
SHA25637a5cd509f8ad6be420f821ce2b5f8693beaa8c537e03dfad0e061a3eb108d62
SHA512eb65a3af71c29e60fdcd42a1dc4b1cba769499677b6152e95910baa9253631c20034061ea25520d8bbf0c08a8c9f5853da1106fa6cabfe851a804d0b0f812db4
-
Filesize
423B
MD52d2a24fe6590b1c9d41348c7171dcd7a
SHA12b42c63b4cf4a4e553fdc0230f2150a95b129013
SHA25630eda2db73d34bbf7f69fc971cce1ab7418990873ed4baa5a363fe14c5212700
SHA5127e339ce3be40a7cff6a0cf658fcfbc048117a3ea45d561dda8d0206bdf9d931a97e999fbb39134f9b0a4ea81f30c765bd8195ff31eb54bb3a4ee108f1e60fc2f
-
Filesize
416B
MD50bbb3ec345d8cd7f1ba94d9a0b842df2
SHA13c54953680b192043857d710d5e72b74b2ce45e3
SHA2563dc7fdb432732c06911142dc7264355534fa2b90e0c1782b5648457c3fd69274
SHA512b9152da15cd7b56361489d50c7242d6bf1e734d70d533dbf9dc6cb614ea4970a876d63d672ab3bfc8a2af70e680f88de5114966bd1c51f165652e74a4a43f62c