Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 11:46

General

  • Target

    2399bce7611824e5c567f6a1f7b607af48303513ed26a23291a7744f5bc5badd.exe

  • Size

    309KB

  • MD5

    6cbc7e6d153fc19965a2c9baa9a74590

  • SHA1

    a73364f246c9dfa1391f7643a487d9918acfce10

  • SHA256

    2399bce7611824e5c567f6a1f7b607af48303513ed26a23291a7744f5bc5badd

  • SHA512

    408ea4a47aa987ec6fc6954f48105c160567389833aaf313ac94fdc09f4db519c9b0c3c9d03898999ed277ca2d60c980a45363557381b7de02056d6c0cd522c0

  • SSDEEP

    6144:n9UfckvcZvGexZBBgiDPxnzNoLyW6y+Mnzi6K0jQRRfhYp6RE05dpg00:9Nkvk+QMYP5AWqziBZJpg00

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2399bce7611824e5c567f6a1f7b607af48303513ed26a23291a7744f5bc5badd.exe
    "C:\Users\Admin\AppData\Local\Temp\2399bce7611824e5c567f6a1f7b607af48303513ed26a23291a7744f5bc5badd.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\wWWkS.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Windows\SysWOW64\expand.exe
        expand.exe "C:\Users\Admin\AppData\Local\Temp\ico.cab" -F:*.* "C:\progra~1\ico"
        3⤵
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:4000
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe http://www.v258.net/list/list16.html?mmm
      2⤵
        PID:4332
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.q22.cc/?ukt
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:720
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:720 CREDAT:17410 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:904
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.v921.com/?uk
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:3372
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3372 CREDAT:17410 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4352
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.779dh.com/?kj
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:4344
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4344 CREDAT:17410 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:5076
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.v258.net/list/list16.html?mmm
        2⤵
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:740
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd4,0x108,0x7ff82e5b46f8,0x7ff82e5b4708,0x7ff82e5b4718
          3⤵
            PID:1564
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
            3⤵
              PID:4364
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:3
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3176
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:8
              3⤵
                PID:1828
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2776 /prefetch:1
                3⤵
                  PID:2512
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:1
                  3⤵
                    PID:4648
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5256 /prefetch:8
                    3⤵
                      PID:224
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:1
                      3⤵
                        PID:1908
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:1
                        3⤵
                          PID:224
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:1
                          3⤵
                            PID:5124
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2540 /prefetch:1
                            3⤵
                              PID:3308
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:1
                              3⤵
                                PID:2420
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,13679344622730170503,8393384964814484297,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5912 /prefetch:2
                                3⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4832
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4896

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                              Filesize

                              2KB

                              MD5

                              596d2fdcebb9285d08c83e8c66f21dc9

                              SHA1

                              d634a64d292467c4fe9f1b2b80ac3bf82a08d49f

                              SHA256

                              0231bc4602667ff24bfa1caab1d56c225a54031c452c9de84b810be18628a3e3

                              SHA512

                              fd0399c36455095561381c33ba0f6f98496dc2fd63792f148ec9dfbc06ed6ad24a6bf9aa7f559dba7f257ccd145ee8532418606c2eb282a42ca678de4231d818

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

                              Filesize

                              1KB

                              MD5

                              4f790e907d5b073c2ae2f7a61d68914c

                              SHA1

                              46879f68779494403147fadb910943a6d002c86f

                              SHA256

                              cdeb3f6798cee105323de686a9bb9c89f0dcedc6fa3bd2ededbb4c317ca1c4ae

                              SHA512

                              319f4335ef1ee4f0ed9f405fd65391d56d16f2657c8d7f57b6de36d64f9bbafc5d937bc1bdae6830a4e60d06ffc6b96d4bfed9c68ac4e0f4d4adef2b89605ae6

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

                              Filesize

                              1KB

                              MD5

                              4f790e907d5b073c2ae2f7a61d68914c

                              SHA1

                              46879f68779494403147fadb910943a6d002c86f

                              SHA256

                              cdeb3f6798cee105323de686a9bb9c89f0dcedc6fa3bd2ededbb4c317ca1c4ae

                              SHA512

                              319f4335ef1ee4f0ed9f405fd65391d56d16f2657c8d7f57b6de36d64f9bbafc5d937bc1bdae6830a4e60d06ffc6b96d4bfed9c68ac4e0f4d4adef2b89605ae6

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B

                              Filesize

                              1KB

                              MD5

                              2a1f3dcabef0e0216264294215885cd8

                              SHA1

                              5b190f98edda2cfcdef40ee77e2a4e2a461f4e8e

                              SHA256

                              2a4ab7be4b3ecd9d3134322ee57746139643960c6aa573b656bf959f46ca5c04

                              SHA512

                              396a63861f311ad9b31574c5b7c172f4539c389123d04df0a7c8548da10390684ee49c1a82ccfe4ee819e989ce93b667a68ce0e908785178291d8845c6489f07

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C

                              Filesize

                              1KB

                              MD5

                              813ed61a718d779ca21105e34d91302c

                              SHA1

                              ce4b51774f09d2d180377de4b7a6a40058f011b8

                              SHA256

                              47918b5dd7f333ff58e86efa64ad051cd29f5a5b0a4a5a5991eb42672f61b9e4

                              SHA512

                              92d3a317c968a40f2b8383214b3446059195eeffa497ff61fd757efdc896aae5be876d43905fb715dd1b3fd4ac26bea79a1f882f37b28df79a7f77c00a7834bb

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3

                              Filesize

                              1KB

                              MD5

                              b1b29b5beb70f1d8c518512fa7885cf1

                              SHA1

                              924b6d73f81a0ee09a3a7bc78f83aa82c3466fe4

                              SHA256

                              1dbbdcb24cadb5e3bb329ec5562f1869637153518d38afd3aababf2c1a49c9e7

                              SHA512

                              11668b6d264076099bc791116b487842562975f0ed99f73c4e68c49a776599eb0370b68079f19098a1b951a5d7f6e761b724f5e15b48f6b29cef0940283f297a

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                              Filesize

                              1KB

                              MD5

                              b6f52795b677b4e2ad47736ffe3704a5

                              SHA1

                              945cb962aae5a0986c476650006227debf93b51c

                              SHA256

                              c8aff1f15506340e6abd76c8a8382e9caeba4fa8e8483254cf7ab9d22c2a57fe

                              SHA512

                              1e241b4c9bf53a97c980dd09bc73abcaf05ed8ccc641d5b0ad1eadc4502b4c1519b62d9c51f8e38c73898c2eca4a4a2e81777763731bf0f36dc5c04a30ae0450

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                              Filesize

                              488B

                              MD5

                              a2797ca2d3d8795929fb10c4bc5a07da

                              SHA1

                              7b5d078def7af7312175dac077ed985c8ec45310

                              SHA256

                              2442a80cfa749f11196a5eff12427d097eec01b72dfa14205019a7193edac79b

                              SHA512

                              54f3a309fc922e66c74529b28732b644254c540be77aa34a9075aa1c0c9e8e27b399374359483dea83241d6be2dcde3e9ad610f4ba809645c032ad12f1d25019

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

                              Filesize

                              508B

                              MD5

                              8f72928024dabc8e3e543926428dddd4

                              SHA1

                              d51158492675a7cb901b761381e2d6820fa8c3bf

                              SHA256

                              c540d1be61df096387c0ace1a183ce21f145290d8902971f37c8955ee85158e1

                              SHA512

                              6c846ff8f83107b542d01c8b22fbd6d12946460f3a78f03ad5dd027618a1c802098819a57b24965bb2b21d2ae79f56803d820d46a49319f6afe1fb5d2c830924

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

                              Filesize

                              508B

                              MD5

                              8f72928024dabc8e3e543926428dddd4

                              SHA1

                              d51158492675a7cb901b761381e2d6820fa8c3bf

                              SHA256

                              c540d1be61df096387c0ace1a183ce21f145290d8902971f37c8955ee85158e1

                              SHA512

                              6c846ff8f83107b542d01c8b22fbd6d12946460f3a78f03ad5dd027618a1c802098819a57b24965bb2b21d2ae79f56803d820d46a49319f6afe1fb5d2c830924

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

                              Filesize

                              508B

                              MD5

                              8cb8b2dbc8882617dd656d850328d4cc

                              SHA1

                              7eb2d859d86773e52518893a5b096ee155fc81b5

                              SHA256

                              03ed28325fa77213c78653754e9163a1ffd9151056961a5cbc26435c3a36760a

                              SHA512

                              8defd1ed5b5cb647e9df7d796fdcfa11dcc2833ea3687d151adacd79afca829ea56225f7c8b03253673010ae651d4660a84d233cf0fb6cc5e1383cde3901ce35

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B

                              Filesize

                              532B

                              MD5

                              d8c37cfd747c8ee6e71e918f36dd1a17

                              SHA1

                              b7f0f1506ea0285b771cc110624e9c6570d449b6

                              SHA256

                              1216a3cfcd8773be3eeba5098c5cd5add1cbdb229eee8a4223fccfbe5e2bbea7

                              SHA512

                              9bdaff5c8a1a11d243a28c58950566da60035c691c5728d4160dde4c8cc0b85ec4c82a68860553582ba516f6e94eac91e9270ee11320d9160ec29a6960834c63

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C

                              Filesize

                              492B

                              MD5

                              cf0346c0e48d6a96faa6fa877ed28a0c

                              SHA1

                              5b58080eb56af12ef5978d1f8037f1b89231dece

                              SHA256

                              403e08eb874ca04b28e99fd375a66309327fc5b338931a3f543a98b4aba5c8dd

                              SHA512

                              02e84fc9c9730d6288c8b6b4f4b5948f0f78db11f43e7c7eb637e152b7b6ce7bfc119888b04446d6aa0b208690675308e8d9af9f2737d81cf5dfad6470988ac4

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3

                              Filesize

                              506B

                              MD5

                              cce8f4ab359deb48e758654dbb389cd9

                              SHA1

                              03b92340abcf6c2902c41a2f7f69533df398a467

                              SHA256

                              d7a8add164b8215af21efaa08ada964aacb8df93aa248393cb56439e28c52c56

                              SHA512

                              8b78fd6ec16817696ca8bc69ea5a5a419d0d7e4e0c03b9980c85a9882ec67ee0a08992ecc203b14395b13df1905f90d4f23f0298f6e2c0382ccf915e30c97672

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                              Filesize

                              482B

                              MD5

                              7c2adb55f6c6030276fbbd00c599e914

                              SHA1

                              adc296e5b72920507bb16c9940a64e6217a9bbdb

                              SHA256

                              b9ed0cffa188badb2bcf65b707f1b52b2e96949ef0afa55131d85208ba25a665

                              SHA512

                              ed82ccb1a833456c35f792323246234f6bd275b94d8f0f827de32057db0da118f459437212481b8df2bc1ba291af7121eb4979e1a004b77b319f5faffcd82cf0

                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6F76B2B1-4312-11ED-A0EE-72E891315508}.dat

                              Filesize

                              5KB

                              MD5

                              0b31fe37b7289b7369fa56885c9e1be4

                              SHA1

                              3455c17ca0afd0a09527e2f1afd6356a97b31cf9

                              SHA256

                              e564a558c57565d92a9d5f4bd9d80c9fb01781aca9195143438974b202cf3c4f

                              SHA512

                              bda6196e6f308c4e789a93324eba7a5cc6b7e86b69505fbc205ab747e70c023e358e099ca523ac94cb950875c84ce75056c8400e79f15c668ff91ac3c224ca82

                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6F803D78-4312-11ED-A0EE-72E891315508}.dat

                              Filesize

                              4KB

                              MD5

                              11a213658214695d03c9c46b5e91b507

                              SHA1

                              01d799f2a53765f5649661b49da8b4419e4103ad

                              SHA256

                              616cb7a90ab514b290127e627801963ede0c4d160fafcbb76078844ec4faa38d

                              SHA512

                              a3ed67f6c935db006a1f2589a10eaedeb3a28b7cc357c61be18f3747b2944f771e6c297d486c48a483ed47d8534c85d8926d18112a81830f325bc1865e08c090

                            • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6F803D78-4312-11ED-A0EE-72E891315508}.dat

                              Filesize

                              5KB

                              MD5

                              98ae71da6e38402f7a69da0ada612b9d

                              SHA1

                              de8170422f3e9635a9558ce174aa50a722d7c63c

                              SHA256

                              2fcbaf178dd64f015cbbd81010d2f5c436030c561317e9becb25fa161a85a67f

                              SHA512

                              826e5076695c3b93aa6be6573620c8d2f24dc95ec9c0f44888ec5b1289491c6f9634001c9a5c894b09e06e6acc1ed8e9f1038b52b68ca945bc9b5f014e4fcdad

                            • C:\Users\Admin\AppData\Local\Temp\wWWkS.bat

                              Filesize

                              98B

                              MD5

                              ada787702460241a372c495dc53dbdcf

                              SHA1

                              da7d65ec9541fe9ed13b3531f38202f83b0ac96d

                              SHA256

                              0d0f600f95192d2d602dbda346c4e08745295f331f5a0349deae21705367b850

                              SHA512

                              c86091735b855691c89c7946145591dec6a6a6a36a2438d392587a9cc1f2d85c1ebe44fcff1cc9d94271a24ebbc2ca38639577a6f5c592e9e10517da26572708

                            • \??\c:\users\admin\appdata\local\temp\ico.cab

                              Filesize

                              20KB

                              MD5

                              1319e9998cedc513c68fa6d590b6ad63

                              SHA1

                              ae95b333e88a13886994f320f5dfb4856168a710

                              SHA256

                              9a5b18efe243fbe9b9b0be3674a24080e9210436986988f3f85a4007905083bb

                              SHA512

                              d4052a899c6c310296e2f5fdf6c2031c22d2644be620cb34ddcc6b59789d82a6462daaeb34466c568be48ee975c4a5ab43143eab0792312a6cd0d49f9fbd8d3f

                            • memory/2996-159-0x0000000000400000-0x0000000000548000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/2996-132-0x0000000000400000-0x0000000000548000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/2996-134-0x0000000000400000-0x0000000000548000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/2996-133-0x0000000000400000-0x0000000000548000-memory.dmp

                              Filesize

                              1.3MB