Resubmissions

22-02-2024 15:00

240222-sdrylsbh25 10

Analysis

  • max time kernel
    177s
  • max time network
    189s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-02-2024 15:00

General

  • Target

    Virus/MEMZ.bat

  • Size

    12KB

  • MD5

    13a43c26bb98449fd82d2a552877013a

  • SHA1

    71eb7dc393ac1f204488e11f5c1eef56f1e746af

  • SHA256

    5f52365accb76d679b2b3946870439a62eb8936b9a0595f0fb0198138106b513

  • SHA512

    602518b238d80010fa88c2c88699f70645513963ef4f148a0345675738cf9b0c23b9aeb899d9f7830cc1e5c7e9c7147b2dc4a9222770b4a052ee0c879062cd5a

  • SSDEEP

    384:nnLhRNiqt0kCH2LR0GPXxGiZgCz+KG/yKhLdW79HOli+lz3:nLhRN9t0SR4iZtzlREBWhuF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Virus\MEMZ.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Windows\system32\cscript.exe
      cscript x.js
      2⤵
        PID:3712
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5016
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:5036
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2712
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4960
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\SysWOW64\notepad.exe
            "C:\Windows\System32\notepad.exe" \note.txt
            4⤵
              PID:4524
            • C:\Windows\SysWOW64\mspaint.exe
              "C:\Windows\System32\mspaint.exe"
              4⤵
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:196
            • C:\Windows\SysWOW64\notepad.exe
              "C:\Windows\System32\notepad.exe"
              4⤵
                PID:4200
              • C:\Windows\SysWOW64\control.exe
                "C:\Windows\System32\control.exe"
                4⤵
                  PID:2120
              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:1276
              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:3516
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
            1⤵
              PID:704
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
              1⤵
              • Drops file in Windows directory
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:652
            • C:\Windows\system32\browser_broker.exe
              C:\Windows\system32\browser_broker.exe -Embedding
              1⤵
              • Modifies Internet Explorer settings
              PID:2832
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1564
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Drops file in Windows directory
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:4568
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Drops file in Windows directory
              • Modifies registry class
              PID:4452
            • C:\Windows\system32\AUDIODG.EXE
              C:\Windows\system32\AUDIODG.EXE 0x33c
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:4976
            • C:\Windows\SysWOW64\DllHost.exe
              C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
              1⤵
                PID:1580
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Modifies registry class
                PID:1448
              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                1⤵
                • Drops file in Windows directory
                • Modifies registry class
                PID:4212

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                Filesize

                4KB

                MD5

                1bfe591a4fe3d91b03cdf26eaacd8f89

                SHA1

                719c37c320f518ac168c86723724891950911cea

                SHA256

                9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

                SHA512

                02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

              • C:\Users\Admin\AppData\Local\MicrosoftEdge\SharedCacheContainers\MicrosoftEdge_iecompat\IECompatData.xml

                Filesize

                74KB

                MD5

                d4fc49dc14f63895d997fa4940f24378

                SHA1

                3efb1437a7c5e46034147cbbc8db017c69d02c31

                SHA256

                853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                SHA512

                cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\53INUE7L\recaptcha__en[1].js

                Filesize

                491KB

                MD5

                3e528c5bd4e8985f914f84bc5f86df5f

                SHA1

                34104ea645a6789dd9cb58c264e20ed6855ea1de

                SHA256

                e51e616d124133b0fb24968469097a4d311b972f78455143d940703ea0639ba6

                SHA512

                c59a1d40f649446f33ff0ff3fa9a8e997d3cff10f968d35226ba08bb91c9013ae937460cf2dab0888848abe1b693d4377fbd6904e3e03360b15035a8c3e9bc97

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\53INUE7L\styles__ltr[1].css

                Filesize

                55KB

                MD5

                eb4bc511f79f7a1573b45f5775b3a99b

                SHA1

                d910fb51ad7316aa54f055079374574698e74b35

                SHA256

                7859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050

                SHA512

                ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\HLCWQ0YB\favicon[1].ico

                Filesize

                5KB

                MD5

                f3418a443e7d841097c714d69ec4bcb8

                SHA1

                49263695f6b0cdd72f45cf1b775e660fdc36c606

                SHA256

                6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

                SHA512

                82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\53INUE7L\ASXaQ1z0KI3ZfklOIfMB5uxT7QXe_3xy1EhxeYl1sZs[1].js

                Filesize

                16KB

                MD5

                4bde1b32d064b00b24eeea516ffa9aa6

                SHA1

                8982f143c3516f8590fd244c8879b53f67a8b38c

                SHA256

                0125da435cf4288dd97e494e21f301e6ec53ed05deff7c72d44871798975b19b

                SHA512

                f25b75b81db219154c337ed01d72ee4196980714a5f8d5a5d8b80f806e0b9dc9e95d105e9c8df3ca5efb5b136c0549a2c02cc7245eb65b180bf328e24a8029f6

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\53INUE7L\api[1].js

                Filesize

                850B

                MD5

                8631a151ef23de877d89a889add9f7ce

                SHA1

                261282f887bfdade4832899b35481d67e5242326

                SHA256

                408791ea3484d7ccc3a26ccbfd9a66966a9b17be998b58db233933966c40d7c6

                SHA512

                16e14a64e853d800fa3603d2d585970e72e35f01b8e4d5ee077f0510e1b8c929d909a868c6bf226defd8d5023c8b305d3265becea66a0660a522658aa717d84d

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\53INUE7L\webworker[1].js

                Filesize

                102B

                MD5

                7e005bc0107fe8dd6255d4253228ef02

                SHA1

                718501672a9b00affe1d688d7b3f2f6202e3e96e

                SHA256

                80663b7d03f283b27d8d833ca725a43d5cd3d5b5a7dd6487970dca9469f9c139

                SHA512

                3f17b8ccef75b49e01343a33d14744d589c87ec2a574b529e7ec65ed921c47d6d4a6f768ca4229b4a0b9e87d6624d76e0b4241ad214014305a9aa8e766433156

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmEU9fABc4EsA[1].woff2

                Filesize

                9KB

                MD5

                df648143c248d3fe9ef881866e5dea56

                SHA1

                770cae7a298ecfe5cf5db8fe68205cdf9d535a47

                SHA256

                6a3f2c2a5db6e4710e44df0db3caec5eb817e53989374e9eac68057d64b7f6d2

                SHA512

                6ff33a884f4233e092ee11e2ad7ef34d36fb2b61418b18214c28aa8b9bf5b13ceccfa531e7039b4b7585d143ee2460563e3052364a7dc8d70b07b72ec37b0b66

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmEU9fBBc4[1].woff2

                Filesize

                15KB

                MD5

                285467176f7fe6bb6a9c6873b3dad2cc

                SHA1

                ea04e4ff5142ddd69307c183def721a160e0a64e

                SHA256

                5a8c1e7681318caa29e9f44e8a6e271f6a4067a2703e9916dfd4fe9099241db7

                SHA512

                5f9bb763406ea8ce978ec675bd51a0263e9547021ea71188dbd62f0212eb00c1421b750d3b94550b50425bebff5f881c41299f6a33bbfa12fb1ff18c12bc7ff1

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmEU9fBxc4EsA[1].woff2

                Filesize

                7KB

                MD5

                207d2af0a0d9716e1f61cadf347accc5

                SHA1

                0f64b5a6cc91c575cb77289e6386d8f872a594ca

                SHA256

                416d72c8cee51c1d6c6a1cab525b2e3b4144f2f457026669ddad34b70dabd485

                SHA512

                da8b03ee3029126b0c7c001d7ef2a7ff8e6078b2df2ec38973864a9c0fd8deb5ecef021c12a56a24a3fd84f38f4d14ea995df127dc34f0b7eec8e6e3fc8d1bbd

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmEU9fCBc4EsA[1].woff2

                Filesize

                1KB

                MD5

                52e881a8e8286f6b6a0f98d5f675bb93

                SHA1

                9c9c4bc1444500b298dfea00d7d2de9ab459a1ad

                SHA256

                5e5321bb08de884e4ad6585b8233a7477fa590c012e303ea6f0af616a6e93ffb

                SHA512

                45c07a5e511948c328f327e2ef4c3787ac0173c72c51a7e43e3efd3e47dd332539af15f3972ef1cc023972940f839fffe151aefaa04f499ae1faceaab6f1014f

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmEU9fCRc4EsA[1].woff2

                Filesize

                14KB

                MD5

                79c7e3f902d990d3b5e74e43feb5f623

                SHA1

                44aae0f53f6fc0f1730acbfdf4159684911b8626

                SHA256

                2236e56f735d25696957657f099459d73303b9501cc39bbd059c20849c5bedff

                SHA512

                3a25882c7f3f90a7aa89ecab74a4be2fddfb304f65627b590340be44807c5c5e3826df63808c7cd06daa3420a94090249321a1e035b1cd223a15010c510518df

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmEU9fChc4EsA[1].woff2

                Filesize

                11KB

                MD5

                16aedbf057fbb3da342211de2d071f11

                SHA1

                fdee07631b40b264208caa8714faaa5b991d987b

                SHA256

                7566a2f09ff8534334b7a44f72a1afaba6bdbb782209be8804636ee8b963c75f

                SHA512

                5cd45dfb0d0ee44afd9b3ffd93c2942c2f04e359d067d4631edd67a2ee09149766294b29c75aaab7436dacc775a8ca02392c5e4cfb8d7fede19c028448507e0e

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmEU9fCxc4EsA[1].woff2

                Filesize

                5KB

                MD5

                6bef514048228359f2f8f5e0235f8599

                SHA1

                318cb182661d72332dc8a8316d2e6df0332756c4

                SHA256

                135d563a494b1f8e6196278b7f597258a563f1438f5953c6fbef106070f66ec8

                SHA512

                23fb4605a90c7616117fab85fcd88c23b35d22177d441d01ce6270a9e95061121e0f7783db275ad7b020feaba02bbbc0f77803ca9fb843df6f1b2b7377288773

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmYUtfABc4EsA[1].woff2

                Filesize

                9KB

                MD5

                797d1a46df56bba1126441693c5c948a

                SHA1

                01f372fe98b4c2b241080a279d418a3a6364416d

                SHA256

                c451e5cf6b04913a0bc169e20eace7dec760ba1db38cdcc343d8673bb221dd00

                SHA512

                99827a3fab634b2598736e338213e1041ef26108a1607be294325d90a6ba251a947fd06d8cb0a2104b26d7fe9455feb9088a79fe515be1896c994c5850705edc

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmYUtfBBc4[1].woff2

                Filesize

                14KB

                MD5

                19b7a0adfdd4f808b53af7e2ce2ad4e5

                SHA1

                81d5d4c7b5035ad10cce63cf7100295e0c51fdda

                SHA256

                c912a9ce0c3122d4b2b29ad26bfe06b0390d1a5bdaa5d6128692c0befd1dfbbd

                SHA512

                49da16000687ac81fc4ca9e9112bdca850bb9f32e0af2fe751abc57a8e9c3382451b50998ceb9de56fc4196f1dc7ef46bba47933fc47eb4538124870b7630036

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmYUtfBxc4EsA[1].woff2

                Filesize

                7KB

                MD5

                585f849571ef8c8f1b9f1630d529b54d

                SHA1

                162c5b7190f234d5f841e7e578b68779e2bf48c2

                SHA256

                c6dcdefaa63792f3c29abc520c8a2c0bc6e08686ea0187c9baac3d5d329f7002

                SHA512

                1140c4b04c70a84f1070c27e8e4a91d02fda4fc890877900c53cfd3a1d8908b677a412757061de43bc71022dfdd14288f9db0852ef6bf4d2c1615cb45628bebc

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmYUtfCBc4EsA[1].woff2

                Filesize

                1KB

                MD5

                7cbd23921efe855138ad68835f4c5921

                SHA1

                78a3ae9ec08f2cf8ebb791a2331b33a03ab8cc76

                SHA256

                8eaae4c8680e993b273145315c76a9a278f696467c426637d4beab8cb3dc4a3d

                SHA512

                d8a4db91d2063273d31f77728b44557612b85f51143973caa3cfd60ab18f8c3e4b8cdaab43af843fe29441cd1d8299bf2f139a78e47bf740277b33a377377177

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmYUtfCRc4EsA[1].woff2

                Filesize

                14KB

                MD5

                e904f1745726f4175e96c936525662a7

                SHA1

                af4e9ee282fea95be6261fc35b2accaed24f6058

                SHA256

                65c7b85c92158adb2d71bebe0d6dfb31ab34de5e7d82134fe1aa4eba589fc296

                SHA512

                7a279d41c8f60806c2253cba5b399be7add861bd15bf0ac4fa7c96fa1eee6557bf1ebd684e909086d9292739f27fa18947af5c98f4920fe00da3acf209c6260a

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmYUtfChc4EsA[1].woff2

                Filesize

                11KB

                MD5

                29542ac824c94a70cb8abdeef41cd871

                SHA1

                df5010dad18d6c8c0ad66f6ff317729d2c0090ba

                SHA256

                63ef838f895e018722b60f6e7e1d196ff3d90014c70465703fc58e708e83af64

                SHA512

                52f91e02b82f9f27d334704b62a78e746c80023ee8882b96cb24cb4043f9a256f395d24830b1f4513bd7597f8c564af20db9c715ab014eb2ab752fd697156591

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOlCnqEu92Fr1MmYUtfCxc4EsA[1].woff2

                Filesize

                4KB

                MD5

                133b0f334c0eb9dbf32c90e098fab6bd

                SHA1

                398f8fd3a668ef0b16435b01ad0c6122e3784968

                SHA256

                6581d0d008bc695e0f6beffbd7d51abb4d063ef5dedc16feb09aa92ea20c5c00

                SHA512

                2a5a0956ecc8680e4e9ef73ec05bc376a1cc49ddb12ee76316378fe9626dccedb21530e3e031b2dae2830874cc1b6bfd6cce2d6d0dce54587ff0fc3780041ace

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOmCnqEu92Fr1Mu4WxKOzY[1].woff2

                Filesize

                7KB

                MD5

                7aa7eb76a9f66f0223c8197752bb6bc5

                SHA1

                ac56d5def920433c7850ddbbdd99d218d25afd2b

                SHA256

                9ca415df2c57b1f26947351c66ccfaf99d2f8f01b4b8de019a3ae6f3a9c780c7

                SHA512

                e9a513741cb90305fbe08cfd9f7416f192291c261a7843876293e04a874ab9b914c3a4d2ed771a9d6484df1c365308c9e4c35cd978b183acf5de6b96ac14480d

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOmCnqEu92Fr1Mu4mxK[1].woff2

                Filesize

                14KB

                MD5

                5d4aeb4e5f5ef754e307d7ffaef688bd

                SHA1

                06db651cdf354c64a7383ea9c77024ef4fb4cef8

                SHA256

                3e253b66056519aa065b00a453bac37ac5ed8f3e6fe7b542e93a9dcdcc11d0bc

                SHA512

                7eb7c301df79d35a6a521fae9d3dccc0a695d3480b4d34c7d262dd0c67abec8437ed40e2920625e98aaeafba1d908dec69c3b07494ec7c29307de49e91c2ef48

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOmCnqEu92Fr1Mu5mxKOzY[1].woff2

                Filesize

                9KB

                MD5

                efe937997e08e15b056a3643e2734636

                SHA1

                d02decbf472a0928b054cc8e4b13684539a913db

                SHA256

                53f2931d978bf9b24d43b5d556ecf315a6b3f089699c5ba3a954c4dde8663361

                SHA512

                721c903e06f00840140ed5eec06329221a2731efc483e025043675b1f070b03a544f8eb153b63cd981494379a9e975f014b57c286596b6f988cee1aaf04a8c65

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOmCnqEu92Fr1Mu72xKOzY[1].woff2

                Filesize

                15KB

                MD5

                e3836d1191745d29137bfe16e4e4a2c2

                SHA1

                4dc8845d97df9cb627d9e6fdd49be1ef9eb9a69c

                SHA256

                98eec6c6fa4dcd4825e48eff334451979afc23cd085aea2d45b04dc1259079dd

                SHA512

                9e9ec420cf75bf47a21e59a822e01dc89dcf97eec3cc117c54ce51923c9a6f2c462355db1bc20cdf665ef4a5b40ffcfa9c8cee05bb5e112c380038bfef29c397

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOmCnqEu92Fr1Mu7GxKOzY[1].woff2

                Filesize

                11KB

                MD5

                15d8ede0a816bc7a9838207747c6620c

                SHA1

                f6e2e75f1277c66e282553ae6a22661e51f472b8

                SHA256

                dbb8f45730d91bffff8307cfdf7c82e67745d84cb6063a1f3880fadfad59c57d

                SHA512

                39c75f8e0939275a69f8d30e7f91d7ca06af19240567fb50e441a0d2594b73b6a390d11033afb63d68c86c89f4e4bf39b3aca131b30f640d21101dc414e42c97

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOmCnqEu92Fr1Mu7WxKOzY[1].woff2

                Filesize

                5KB

                MD5

                a835084624425dacc5e188c6973c1594

                SHA1

                1bef196929bffcabdc834c0deefda104eb7a3318

                SHA256

                0dfa6a82824cf2be6bb8543de6ef56b87daae5dd63f9e68c88f02697f94af740

                SHA512

                38f2764c76a545349e8096d4608000d9412c87cc0cb659cf0cf7d15a82333dd339025a4353b9bd8590014502abceb32ca712108a522ca60cbf1940d4e4f6b98a

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Q0HKQZHK\KFOmCnqEu92Fr1Mu7mxKOzY[1].woff2

                Filesize

                1KB

                MD5

                57993e705ff6f15e722f5f90de8836f8

                SHA1

                3fecc33bac640b63272c9a8dffd3df12f996730b

                SHA256

                836f58544471e0fb0699cb9ddd0fd0138877733a98b4e029fca1c996d4fb038d

                SHA512

                31f92fb495a1a20ab5131493ab8a74449aabf5221e2901915f2cc917a0878bb5a3cbc29ab12324ffe2f0bc7562a142158268c3f07c7dca3e02a22a9ade41721e

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\Y35G6NZ5\logo_48[1].png

                Filesize

                2KB

                MD5

                ef9941290c50cd3866e2ba6b793f010d

                SHA1

                4736508c795667dcea21f8d864233031223b7832

                SHA256

                1b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a

                SHA512

                a0c69c70117c5713caf8b12f3b6e8bbb9cdaf72768e5db9db5831a3c37541b87613c6b020dd2f9b8760064a8c7337f175e7234bfe776eee5e3588dc5662419d9

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\F29QFFBG\www.google[1].xml

                Filesize

                99B

                MD5

                b13797cca74210a35edf3d3054ff3e7f

                SHA1

                c3fd5a02ac9feb558cdb3dd711197dc45a486532

                SHA256

                6696f44f03c08b9ccdd0ab0fc1939cd14e82046d57b7c2a21e127bcd8bb780e1

                SHA512

                2b52eb92d57c2811c39a353b86c8cd5ad61375616e090d7bcf87e3fc2a34a47464542be9ff52ec2dae02bc38c6dd3621b1db9169980f4040ba92c32f1c806eba

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                Filesize

                1KB

                MD5

                04e1c0fb7c50efaf86ba32ac99af0cd4

                SHA1

                844aeeaba2b3c0a23a3f3580ee9eafde8eee9aa0

                SHA256

                59cd12f0b76ce31550e9068fed1da5c917f8b4361ef4f3c62c9522473162705a

                SHA512

                3394f7025fe90250bc8ae1caeba12ec23019a31c1762e5ab757cd874ff33160b1596be9bb079b5641b7476c306c8ebd520fab5f00a0dca06372c67387f21ce40

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_BA974EC2321113703C85B15FC3D91B9B

                Filesize

                471B

                MD5

                56306976b3a5e2280fc4f357450ddf7a

                SHA1

                7b32246bfdf74788fe5b86bf2d0aecad587bdc5c

                SHA256

                cf60fd1d3a84d06c1bc47d55a0060b09ec239d1b3de08e5cbbf13dc19808f26d

                SHA512

                52397dd6882d5625f219afdd47465348eeef8dde414479d204e1bc171276427eb1ed9e927be04a7a24495048cd25361bfe82cf8e23625721cbe6a84eac23bc2a

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                Filesize

                724B

                MD5

                ac89a852c2aaa3d389b2d2dd312ad367

                SHA1

                8f421dd6493c61dbda6b839e2debb7b50a20c930

                SHA256

                0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

                SHA512

                c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_FA6E4B522C9C404D38E1A6F1BB26EC85

                Filesize

                472B

                MD5

                2b1f595630453c48bc1779fd375750e3

                SHA1

                2c45ab44bb483b1ed85289348f58d5b57b4c970f

                SHA256

                5bb14ddefa2282db03690caa802c30d7c465e2c4146dc00a741d5cff6a3ea0d4

                SHA512

                429d28918f2369c40859de4c2c0c79a64dbedd2e2308e60e57715cd01c5fef3da989724d7ab2db9e62f73bbb68d8dc6d085c118113ab3d0da478be5fdaaceeba

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

                Filesize

                410B

                MD5

                3adf5ccfa3564b9cb4b8000a7d3e6061

                SHA1

                7ef5b1a0272146fd41286c8cd4902ea952462886

                SHA256

                f6beb80bb3f5443ac934ab6d056352d9b66b31571db62f921243a5547a4d4e9f

                SHA512

                212c2a21084bdc6cc6bb515a874efc5d629a727b31f3907a5cbb09d4075665c9ad35ba7b57931a2be85d9b6c6bd668f204c029af6465e8031d36fba7374d8f7b

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_BA974EC2321113703C85B15FC3D91B9B

                Filesize

                406B

                MD5

                78bc4d269168b8fe1d8b0ae9ebcc4690

                SHA1

                a32113c4d66a4418fc9ed8e50a929e332ea6fa01

                SHA256

                f454692b1ee8f39a59597e4160b2b7c67dc2859d423ca4302a42478acb71a437

                SHA512

                df4fa71db95f63931608d7ca9e2d0297075c1d3ac9f5d7b4f7b4199e4b3b1359df7be739eccc2bb0577a3de84e63fd6fa46a9bc57b36d4db29fde5b08e4c0d0e

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

                Filesize

                392B

                MD5

                399e5c157b713519981bbda715c562ad

                SHA1

                f71ca8b5f9a380923b5fc4dc592add1492700143

                SHA256

                174caf655f693c31b9ca0a5eaf60953542368e9e967e1f96031ee79aa61c77d0

                SHA512

                0e2931e0bb67329371fc63018bfc49bfb641f8eb2893c45d0f9a6f742bdd2edc80119f47877be7fedce80b494de614e24fbfe89fa7f8afbc339fa94decf6ae49

              • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_FA6E4B522C9C404D38E1A6F1BB26EC85

                Filesize

                402B

                MD5

                dfaafd5a241c4c8c68fae23fa471a923

                SHA1

                6a93a2a1910bf2161db5970152e509b6aeaf2314

                SHA256

                93284c96adc0855b81cf21e1e912abd9f122e017b8c238e80d6760228b4252e8

                SHA512

                ff39ebdf50805cbd9c050614d1b4a8b62d22707b51deeacf98a93601eac63500a599b6fd22a0bb475dab10118411161a9c2e1f37b1c616b81ee2a7678c636f52

              • C:\Users\Admin\AppData\Local\Temp\Virus\x

                Filesize

                10KB

                MD5

                fc59b7d2eb1edbb9c8cb9eb08115a98e

                SHA1

                90a6479ce14f8548df54c434c0a524e25efd9d17

                SHA256

                a05b9be9dd87492f265094146e18d628744c6b09c0e7efaabf228a9f1091a279

                SHA512

                3392cfc0dbddb37932e76da5a49f4e010a49aaa863c882b85cccab676cd458cfc8f880d8a0e0dc7581175f447e6b0a002da1591ecd14756650bb74996eacd2b1

              • C:\Users\Admin\AppData\Local\Temp\Virus\x

                Filesize

                4KB

                MD5

                b6873c6cbfc8482c7f0e2dcb77fb7f12

                SHA1

                844b14037e1f90973a04593785dc88dfca517673

                SHA256

                0a0cad82d9284ccc3c07de323b76ee2d1c0b328bd2ce59073ed5ac4eb7609bd1

                SHA512

                f3aa3d46d970db574113f40f489ff8a5f041606e79c4ab02301b283c66ff05732be4c5edc1cf4a851da9fbaaa2f296b97fc1135210966a0e2dfc3763398dfcaf

              • C:\Users\Admin\AppData\Local\Temp\Virus\x.js

                Filesize

                448B

                MD5

                8eec8704d2a7bc80b95b7460c06f4854

                SHA1

                1b34585c1fa7ec0bd0505478ac9dbb8b8d19f326

                SHA256

                aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596

                SHA512

                e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210

              • C:\Users\Admin\AppData\Local\Temp\Virus\z.zip

                Filesize

                7KB

                MD5

                cf0c19ef6909e5c1f10c8460ba9299d8

                SHA1

                875b575c124acfc1a4a21c1e05acb9690e50b880

                SHA256

                abb834ebd4b7d7f8ddf545976818f41b3cb51d2b895038a56457616d3a2c6776

                SHA512

                d930a022a373c283f35d103e277487c2034a0b0814913b8f6ec695b45e20528667aa830eeab58e4483d523bd6a755a16a5379095cb137db6c91909a545a19a2f

              • C:\Users\Admin\AppData\Roaming\MEMZ.exe

                Filesize

                12KB

                MD5

                a7bcf7ea8e9f3f36ebfb85b823e39d91

                SHA1

                761168201520c199dba68add3a607922d8d4a86e

                SHA256

                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                SHA512

                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

              • C:\note.txt

                Filesize

                218B

                MD5

                afa6955439b8d516721231029fb9ca1b

                SHA1

                087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

                SHA256

                8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

                SHA512

                5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

              • memory/652-190-0x000001F1C6900000-0x000001F1C6910000-memory.dmp

                Filesize

                64KB

              • memory/652-280-0x000001F1CD2C0000-0x000001F1CD2C1000-memory.dmp

                Filesize

                4KB

              • memory/652-277-0x000001F1CD2B0000-0x000001F1CD2B1000-memory.dmp

                Filesize

                4KB

              • memory/652-209-0x000001F1C65F0000-0x000001F1C65F2000-memory.dmp

                Filesize

                8KB

              • memory/652-174-0x000001F1C6420000-0x000001F1C6430000-memory.dmp

                Filesize

                64KB

              • memory/4452-528-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-246-0x000002B696350000-0x000002B696352000-memory.dmp

                Filesize

                8KB

              • memory/4452-529-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-531-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-533-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-252-0x000002B6963B0000-0x000002B6963B2000-memory.dmp

                Filesize

                8KB

              • memory/4452-526-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-527-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-532-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-525-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-524-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-523-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-522-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-530-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-407-0x000002B6A9700000-0x000002B6A9702000-memory.dmp

                Filesize

                8KB

              • memory/4452-377-0x000002B6A8E10000-0x000002B6A8E12000-memory.dmp

                Filesize

                8KB

              • memory/4452-371-0x000002B697B90000-0x000002B697B92000-memory.dmp

                Filesize

                8KB

              • memory/4452-357-0x000002B685C00000-0x000002B685D00000-memory.dmp

                Filesize

                1024KB

              • memory/4452-248-0x000002B696370000-0x000002B696372000-memory.dmp

                Filesize

                8KB

              • memory/4452-250-0x000002B696390000-0x000002B696392000-memory.dmp

                Filesize

                8KB

              • memory/4452-536-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-535-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-534-0x000002B6856B0000-0x000002B6856C0000-memory.dmp

                Filesize

                64KB

              • memory/4452-256-0x000002B6963F0000-0x000002B6963F2000-memory.dmp

                Filesize

                8KB

              • memory/4452-254-0x000002B6963D0000-0x000002B6963D2000-memory.dmp

                Filesize

                8KB