Analysis

  • max time kernel
    180s
  • max time network
    226s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2022 05:05

General

  • Target

    119968377cd04f8b469a577f87bc71da7f3e734aab86a5067dafe6d84e49d1dd.exe

  • Size

    1.2MB

  • MD5

    5f666bd3759c70d9e6ab59cad547dca1

  • SHA1

    85c22c89aaff94dba3f4ae24ccb47c6a148750d6

  • SHA256

    119968377cd04f8b469a577f87bc71da7f3e734aab86a5067dafe6d84e49d1dd

  • SHA512

    f496124b29a9a58cb1fb90910cd1ea0eacb3dcaabdd7a4da1b20e9778fe67e115d51f9895a6ec7b865d41075ba96a2d0c7b21c72624d2826a40d517acbc41f51

  • SSDEEP

    24576:W84Fb6PHUotlxRz0rs2u62W5su0S7sBpbum:W/6PHpMA2u6L0S7sBpKm

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 17 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\119968377cd04f8b469a577f87bc71da7f3e734aab86a5067dafe6d84e49d1dd.exe
    "C:\Users\Admin\AppData\Local\Temp\119968377cd04f8b469a577f87bc71da7f3e734aab86a5067dafe6d84e49d1dd.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\sw53I.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Windows\SysWOW64\expand.exe
        expand.exe "C:\Users\Admin\AppData\Local\Temp\ico.cab" -F:*.* "C:\progra~1\ico"
        3⤵
        • Drops file in Program Files directory
        • Drops file in Windows directory
        PID:3852
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe http://www.v258.net/list/list16.html?mmm
      2⤵
        PID:4348
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.q22.cc/?ukt
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:216 CREDAT:17410 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2864
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.v921.com/?uk
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:320 CREDAT:17410 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1268
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.779dh.com/?kj
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1200
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:17410 /prefetch:2
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1960
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.v258.net/list/list16.html?mmm
        2⤵
        • Adds Run key to start application
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4716
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8d18b46f8,0x7ff8d18b4708,0x7ff8d18b4718
          3⤵
            PID:4720
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
            3⤵
              PID:3148
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3544
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3064 /prefetch:8
              3⤵
                PID:2692
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:1
                3⤵
                  PID:3160
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:1
                  3⤵
                    PID:4308
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4936 /prefetch:8
                    3⤵
                      PID:5192
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:1
                      3⤵
                        PID:5264
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:1
                        3⤵
                          PID:5436
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5472 /prefetch:8
                          3⤵
                            PID:5504
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:1
                            3⤵
                              PID:5624
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:1
                              3⤵
                                PID:5640
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:1
                                3⤵
                                  PID:5812
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:1
                                  3⤵
                                    PID:6056
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:8
                                    3⤵
                                      PID:6132
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                      3⤵
                                      • Drops file in Program Files directory
                                      PID:5172
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7f4bf5460,0x7ff7f4bf5470,0x7ff7f4bf5480
                                        4⤵
                                          PID:5236
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3348559930794603000,12980681331234991947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:8
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5528
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:4884

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                      Filesize

                                      2KB

                                      MD5

                                      bc68c4ccb08d2c94eb10c1918865ccae

                                      SHA1

                                      8256faeec3f3ec799819d5370195a60f0ec2bdb0

                                      SHA256

                                      79313c35e9f5655225ab6d4564a396cf9d473d04909c04db10935c27959f677d

                                      SHA512

                                      f6baa632cd93126c31a495e340e8f42e3f9b171b0975877e7a6725677fe57c8b51784be5366cedba022fea273cfe9ecfc5fce8546f2a76e1e6516e5865666933

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

                                      Filesize

                                      1KB

                                      MD5

                                      e1e159dce134ebc89f28c54cd706d81c

                                      SHA1

                                      acc060e05851548ef3c6ed96b2eb115a4492bafe

                                      SHA256

                                      4a63ca04249e5249ec8a2f14064d545407f1f9df526022c9ada74b23e0e18e92

                                      SHA512

                                      6f8c41e4e4294fad4d7e1fb20e34e41b4b877cf7e887355d733496245787235fdb7e517f67b1aa88d795c17e9985c788331d80da00c848234475661ab12b1045

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B

                                      Filesize

                                      1KB

                                      MD5

                                      1664c1f6eb9b80bcb11ef3a12c291d9d

                                      SHA1

                                      48598250890d6ef049a816e417058f1043a56919

                                      SHA256

                                      5125477f0d9889f0b69ce915c85ba9ab5be2b7c50ef2e800308e1e3761d26bff

                                      SHA512

                                      2b103650ac19f5322ac65f8b06dc9dff33fea64384e3dd1875ffb671dc6dd8869b8452562f8025f740433447113e2c11a0360e3128417ddb1db2033d1d51ba17

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\69C6F6EC64E114822DF688DC12CDD86C

                                      Filesize

                                      779B

                                      MD5

                                      808ea1770185268f036f9f79842ff1ba

                                      SHA1

                                      a68f86646a35ee3be289cfe390f655769c71f47b

                                      SHA256

                                      8b65272f69dfb47bb05ba0fad1fcaabdf2f9908f918be8374956e750d3921695

                                      SHA512

                                      f927daa02ac7853c1bf2a9cdb8024ce92d6c3a375def191ef6a7767af71089b870178dbd9090142710749c1fc507d1a6aeadf69a45905fd4d38cb40070b4c023

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                                      Filesize

                                      1KB

                                      MD5

                                      8d6776475ca38542b9dbe64bb72fe39b

                                      SHA1

                                      6d23a3b1d4e4f439c161608d44cfa886f316fd93

                                      SHA256

                                      e693edc50280c612b17c433cfb31240c76dd818a44f76d353a63caa56831e1f8

                                      SHA512

                                      9283133fef2b578391337e302e714b61e94c71997b47dbb602645ef28e7e518f8027f8a3368bb24471d4b35746aba55d187876f9f90df963e687e008a865a4ba

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                      Filesize

                                      471B

                                      MD5

                                      7550b85aee4221c59808672005ed8855

                                      SHA1

                                      aeb269eff06f518132b9ecea824523fa125ba2d2

                                      SHA256

                                      2b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2

                                      SHA512

                                      216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C

                                      Filesize

                                      1KB

                                      MD5

                                      2307204f7dd44bfcadcf7570ab50250f

                                      SHA1

                                      64969ec920507c0d77f4fb4ee835e034b3787f97

                                      SHA256

                                      af7b4f149b5959598ec81677f722fb3af332b504d1896cc761cfa1df91b9ac4b

                                      SHA512

                                      99151f153d0ccb66e144b43f6e088eb1846557d103f9147f6f83854d71501cdf69b861518047535b8231074945c709825c22367e9bc3845aa3d632d52805afc4

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3

                                      Filesize

                                      1KB

                                      MD5

                                      e8adf38ae3c2692474a2c6f496bd4ed1

                                      SHA1

                                      4389ccb7e7ba79b209b0d8d8660b50f5e8c170b8

                                      SHA256

                                      a060353c782c22b5d53e95b315a43714cb95406a95703488c5846f3a0d2a2b6b

                                      SHA512

                                      7af13229612019ede709b90eebcd60e38e62b61b7a024f70eb79fe1adb6bc14785b49b87768cdbe601ee908ba67c2a61d942862d1b2b9bf64e24bc5b970f15fd

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                      Filesize

                                      1KB

                                      MD5

                                      ee895cd37d1bbafdf7a736b85dd47348

                                      SHA1

                                      5c182ae0d6ffc54c386763ad882256cedd8d0e7c

                                      SHA256

                                      939346daba2e0757e14e822fd55350189708ac8d2d782b148e1744ee85c49aa5

                                      SHA512

                                      b2f86fa2f14864ab155693804f0d5da4f13e0c9257743eb7376d49a6ce77d950f6e98bbda24030386578c0edb58f4ad3e50eaec2dcc10803a7dd314d703cf740

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                                      Filesize

                                      488B

                                      MD5

                                      b0f7b6796aeaa9e5ebf3f7c557225a9c

                                      SHA1

                                      0b85c9daddb0d3f997d7733c89d8444a91195454

                                      SHA256

                                      f33032273805ff73f3aa4eafc398eb3556dc0d53a58fc0cde45e719201f3e730

                                      SHA512

                                      7d27c9837d32410e8ad3fc93778e0f7d1447c4530b40813db35f4196948652cad941357b9912b02da3b46066d9c962162f1a425cc59ea4a5f95f5eeef0e3fb41

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B

                                      Filesize

                                      508B

                                      MD5

                                      149a98b30e9de29b0985c1193043f28a

                                      SHA1

                                      f0dd329de90e8e6fc3d43af4d69892be6ff79691

                                      SHA256

                                      94febe0914e76213fac917d8f7a089fe698207fd805c6f31da3551d5e1c0c93c

                                      SHA512

                                      5ee8fc9de3f74625f762c200a346fe14ea3b5de0197a64158baa8b22f2bda875cd83f14921650bdbfb759d47d0bc953731b1f2e2a50416a89958617b14026ed6

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_97A2CB43E01F27293633B7B57353C80B

                                      Filesize

                                      532B

                                      MD5

                                      b4d7c2791316983ed1a243e7d702d9c4

                                      SHA1

                                      ab556fc3c9413c6b0836fe2f1bbaba424a8e4c5c

                                      SHA256

                                      8b2472b23729937448eade64aee09c1368d157e16dc2ad3a83285620b70a70bd

                                      SHA512

                                      22a0e67aeb6f87c4a3cda781bacad647310129b2b9c68d7fba0b4d2dca0bc7d635fb3e666420f82eb741de84dc34aec8b5702d855304ed28523183e7de418bc4

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\69C6F6EC64E114822DF688DC12CDD86C

                                      Filesize

                                      242B

                                      MD5

                                      06501dd865e449e13a71521d01bb9050

                                      SHA1

                                      4e8e53aa4ecf4864a7efc337b819f2bc3e8f4941

                                      SHA256

                                      3be9c5f57afcc68d26ee551a66ae8862729b6de364a39deecceac1be825bb3ad

                                      SHA512

                                      ac671080ae27a88fdea864f0fe99d164fab033ade8bea763b982dc6d43af32e6113a8e3b2006575b35f681047e00b618838397d698a60ce15fbede2376c141e4

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                                      Filesize

                                      446B

                                      MD5

                                      683847b9a85c2260d69763a6063a4212

                                      SHA1

                                      97dc016348d9bce3aff04c8aac00e9cc1e9a3082

                                      SHA256

                                      f9343992f35e7c0f8e23e7970b3d19fefdfe2506d728966a74951fc76f7bc6f5

                                      SHA512

                                      02b8f849c7fce45e785cf974c7a911a9f75504d6d9e800280c44f8a53c6c15645c6f77106abcc5839369860ebc1ae27e81ad887dd6b359c99c3f28bcecd66741

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                      Filesize

                                      434B

                                      MD5

                                      15e07daf45bafa85161d9db5ce875539

                                      SHA1

                                      38783cb7bb1c5204b2e4d63140f6793e50a5e871

                                      SHA256

                                      05d9fb69bab90051c655a8ab7b6166ffa85f66282c4762db986a5ff134df87bc

                                      SHA512

                                      7db7d187976d34a3b36a2f919a40ee19953c88a36421d6b6fb73f7e4fa6c05403e9ea9aaa89f2812c1e4be4126fe5f366262588fb958615ff48f2ef94b394897

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96C

                                      Filesize

                                      492B

                                      MD5

                                      cc2c7efba22dfa566bb49920709814b3

                                      SHA1

                                      d5e71adec25e8bf0cd79d61c4c4bfa439b289d6e

                                      SHA256

                                      e8fe11d868cc56721cfa5f3d39d757c4430b8eca907781a3aaea8c3aaba4213d

                                      SHA512

                                      d50ed8f081f218fb8d1e22e1567187dea3a88133e1090cd9348a276f5d408407d995cabd095db231b115a41f03ac8b3f22e2b58eee1257f74b0e8e5bc5873cb8

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3

                                      Filesize

                                      506B

                                      MD5

                                      9a0e109624e83caad906b353f899dc21

                                      SHA1

                                      fadc49c34039a7d5457b6db694158a64567ec8a4

                                      SHA256

                                      52b52bcb3303e12809c5c4cd97d4e8e85cb27a68dc79cb001a34671dd24a9787

                                      SHA512

                                      a6b5aa66708904ac1a4fb8013062d2efdf2430284b8dfb51b1ead8006f40d92eebf9b3ba41e29dfccb329f66a8bfe8303ad62aacb6bfe8817ff434b6319628c9

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                      Filesize

                                      482B

                                      MD5

                                      6b8665feed7717758de0c65b6f4b48d7

                                      SHA1

                                      8a801f5e72479a0a2a1b7e158b3d1eb34c6ec3a8

                                      SHA256

                                      cc5fd2edff84f5a0d1c1aeadcd450ea9e6efcd92ffd402f4d9165cd0c20e0eeb

                                      SHA512

                                      68a3bdda0e5177e083c2efd2ffc88464eda8ca29968140a6d8280f381127cd7dcd802f333e53b2368257d9820c02de0086d5125cc0b91b69f816d9d3dec05aab

                                    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3C1F06A1-5151-11ED-89AC-5A10AEE59B4B}.dat

                                      Filesize

                                      5KB

                                      MD5

                                      ce134c4bd9418ed76b4160d3b401c414

                                      SHA1

                                      0eb0362dde515610d9a80801abdacefe8aa4add1

                                      SHA256

                                      4464492de10f6fa08529bc69c8b967bbf9af787c8670935f4f82b7c4c1e38166

                                      SHA512

                                      3caaf310ed07c907851a3aa86428c4bc192c254f0136e67100c695534dcf06f37b9933d1ae21fbc98a4303ad61421353b992adeb4da24190f55ff47cf4681f26

                                    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3C216D41-5151-11ED-89AC-5A10AEE59B4B}.dat

                                      Filesize

                                      4KB

                                      MD5

                                      1fec18f9e957195ef87f09d84e95d52e

                                      SHA1

                                      c719091345fe003455c39852629206e44bb2fd8b

                                      SHA256

                                      6ba4d6d3654ec4d8cc243442f42793766e8182fb032a24f13402a0f82025d294

                                      SHA512

                                      ae7b0ef9e9eb332cd53aaef6710b824a557e9742a9cf5ff8530e6ab73056f3935a599f023a4a6824b8bb777f950fa5fb0ac355c3c2fa9afe97048f0811225a0e

                                    • C:\Users\Admin\AppData\Local\Temp\sw53I.bat

                                      Filesize

                                      98B

                                      MD5

                                      ada787702460241a372c495dc53dbdcf

                                      SHA1

                                      da7d65ec9541fe9ed13b3531f38202f83b0ac96d

                                      SHA256

                                      0d0f600f95192d2d602dbda346c4e08745295f331f5a0349deae21705367b850

                                      SHA512

                                      c86091735b855691c89c7946145591dec6a6a6a36a2438d392587a9cc1f2d85c1ebe44fcff1cc9d94271a24ebbc2ca38639577a6f5c592e9e10517da26572708

                                    • \??\c:\users\admin\appdata\local\temp\ico.cab

                                      Filesize

                                      20KB

                                      MD5

                                      1319e9998cedc513c68fa6d590b6ad63

                                      SHA1

                                      ae95b333e88a13886994f320f5dfb4856168a710

                                      SHA256

                                      9a5b18efe243fbe9b9b0be3674a24080e9210436986988f3f85a4007905083bb

                                      SHA512

                                      d4052a899c6c310296e2f5fdf6c2031c22d2644be620cb34ddcc6b59789d82a6462daaeb34466c568be48ee975c4a5ab43143eab0792312a6cd0d49f9fbd8d3f

                                    • memory/4852-132-0x0000000000400000-0x0000000000536000-memory.dmp

                                      Filesize

                                      1.2MB

                                    • memory/4852-138-0x0000000000400000-0x0000000000536000-memory.dmp

                                      Filesize

                                      1.2MB