Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 02:20

General

  • Target

    e8fd75e7902882be2b4fa1f0afad6010_JaffaCakes118.exe

  • Size

    334KB

  • MD5

    e8fd75e7902882be2b4fa1f0afad6010

  • SHA1

    181f24d5bcf5a9881e8c5e4038c3588ededcbe71

  • SHA256

    520d904fbb2b12504978bd9ee89f959e50355c8641bceab0353fa40a3a184c9b

  • SHA512

    bd71b5aba01c0c0a75d791b84d440b809f5cb081a9248edfe452341c207a46223319faa080c8fdf800be7dc9cf332311be5ae69b8bef415e48b8f1a7dc9857eb

  • SSDEEP

    6144:SI2SR8ub6cZDw6hlK3vSVkMK6jAjUw9o8k7FjyRyoKiFkaZsQpLa:S8OrcSGlMwjUMFjyRyovxZsQg

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8fd75e7902882be2b4fa1f0afad6010_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8fd75e7902882be2b4fa1f0afad6010_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\rZHem2bpRcbrsxA.exe
      C:\Users\Admin\AppData\Local\Temp\rZHem2bpRcbrsxA.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Users\Admin\AppData\Local\Temp\7zS8C6B0916\setup-stub.exe
        .\setup-stub.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Modifies system certificate store
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\nsyB67.tmp\download.exe
          "C:\Users\Admin\AppData\Local\Temp\nsyB67.tmp\download.exe" /INI=C:\Users\Admin\AppData\Local\Temp\nsyB67.tmp\config.ini
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Users\Admin\AppData\Local\Temp\7zSC25FEF36\setup.exe
            .\setup.exe /INI=C:\Users\Admin\AppData\Local\Temp\nsyB67.tmp\config.ini
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" https://www.mozilla.org/firefox/system-requirements/
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2756
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:864
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

    Filesize

    2KB

    MD5

    84695c96493bbb1e501034985da8629f

    SHA1

    3259e79683f8910c5c15e90ab53a62f1163fa105

    SHA256

    6e0727767a6965cf246c4856d5c3b291c5674b1606c0bc14ca958d573db562ed

    SHA512

    d59c6154b7af98221028dea530d9c5e1b180682de4cde624e6679295994df9942efe34844816a8035945dc17c8f895950a95a2a70b0202bff8675e8d74580cd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

    Filesize

    1KB

    MD5

    4d0ac441695159e547a5dc53bc66740f

    SHA1

    a843b46bd56ab2103d06dd2f4971ad05a3ba9f74

    SHA256

    b6f0b28a2a1d0d099cb0beec17bf68769b59a513668fd2d0a56e409bc1d6ee67

    SHA512

    f386a9aba1458e5ae06b06b0677f739d98850794b0c01868b3f6d0abed1b3b3889312037d42a3d802421de3cd64a31a3ec6d5efba8d460b5144b849eda17cd94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    2048440c50c6e0767e31ad9c73738c68

    SHA1

    bf2cd60ba3937f35ef6ef3444d316120eef4c785

    SHA256

    cf848ca3e957aac4fe6c73a6b905dc6c832350172312e4c114c98209e5dc894a

    SHA512

    1dbc034efaf9533a4f71fa420e336eeef927bbfd648fe0b37e28a0ba4b35e879d0b661a9b2727a874e32685f533456e22c58a06b38e80e4e84f99f4e394c865a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8b968b10cdd1134e5c193c03f38fe62

    SHA1

    ce50e3550daf0789f34a3b666f71fec7cf894d52

    SHA256

    c10a7f7cb11b11903ace0c4346af6d3dae4ea18b7f2cb0764867f9a2a40d5a47

    SHA512

    20911084a5d536d90002c5663b788c9afc0194fcb6cfbdd7a44cd295188376d17619e5054cd3b0c71ea5434ae175595d9bcf695d51f1b35fa23afd65f06ca62d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b7e550e7b9fa5f4c06e16e45c7930c5b

    SHA1

    1c58a27b45c894b3e104b41d63b81ae7d76dfe7b

    SHA256

    504350309c1efb64b24247c20f573165ef4c63490fa0634a5a77348462fc7c6a

    SHA512

    5233a3741016f3e8ff6a49e425a431eac7d462b3acec18519de8b5c1ddf8a4c696add58b27daa1b054c111b3f7b79a128d60d68cc088bb9f1e9235a813a93578

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    974886519b0b90be2f0b80609a15a95c

    SHA1

    ca6ddea276234d2e94b411b429d180cfa51b048f

    SHA256

    93d2bfc2f862032bdad33478b5e53d4cb009953680ace46881a9a24fa27198f5

    SHA512

    a27aefad314ad15d65d90aaa191d724fe6695de3f885b7beccb571ada76e1c553fec016f0776c3ad9ec940a61259bd396d6225706169eee81323895c5b78efef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8386ef9d0727dcbbc38bd52fc32260ec

    SHA1

    82da3e8da1fae711a6ad097dda4bd6a3cf81bedb

    SHA256

    25745d8563c9689a538d6f8c09509d9550183db1c2b0570c59281aecef68ff95

    SHA512

    381a3cf054945054ebe4ff1051c00844b3adaf75c434ab364feabda38d52d4ecd36be22f2903e68294c799e06a2a7c1660e84e7d504cd7e86a26496fe0fe12dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7df157798488153dcd225112578658e0

    SHA1

    7e0e50ef6dafe0afa23f3bd0435617a4c2c2e9d9

    SHA256

    1f0bf6422027a82a7e3b0da6a4942e400974d0cb547889357773cf3e3efff972

    SHA512

    43f097d65efbcad096f8f12febe6d59aaaeae3a9befeaedc55d434032e1934ecc028259c8094e36e5ab3b0d437c58384c79c06d87dc4a0910e8e50e6f0b8afde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c56209960e715124bc8ae0d110dd3059

    SHA1

    b51ccf35884047c4dcec8cdf6f31f971b68e635e

    SHA256

    e9f40b3fe8f0e4937a897ca469e6dd9d730ef220bdf0c3e31c95ede5295322d3

    SHA512

    8c846c36bae0f7d558b4fc2776a103dcaba4fa4f66b260490b39d35313310abf87e4c4449f50288498439d694b0cd8ce77d8011e5d3973014e12cc0f723ff51e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a6fcbbe6bd6a3ee410fed701d2b71217

    SHA1

    2bba2628809fe291b3832fa72af0bff20bcabff1

    SHA256

    39196ed089235d6c83c447a80f440232c8af1681afa5d5421f982e1e7a0dc28b

    SHA512

    9cbb4f25b647f26b18d44a400d127c259a9249ceef72a5c133e287cabf41560399f192a1aba76553296584f4e3237adc44dd4674f46905c2d9931c330db60f44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01a1aa9c418f5520c7baec535c4e81b4

    SHA1

    ecbfae5911bbd586d0c9d5294bb3323e3004e9c8

    SHA256

    c0ecbb95246ad02716d7000e0b2be20c85d91b865e926fff214c14f27735f949

    SHA512

    8206e3f10c4bc60621b8f4496567af783b0c21357e5955f10435fa4d9dbd393e2e9658969e4921e74bab63bc64e7ed2333e12ec764245064a2781af9d960dd8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7a1c911120bef0ec40e7f5a5a2bbd8f

    SHA1

    83e520cb6a2b2dfe67b3e712a8ab58b85dcfa9ae

    SHA256

    1233b4f83ffe983532cefe855c945d85ad52a57691a270eafbf26a4ee06159c5

    SHA512

    bd9780ecd1c1ddb32e06c263aca1a5accc08e71dc3a0915006710cf53eb417b842beb877e4045c7ff4d7e101f94e2e7c31be48f1e8cebac1764f36d609f5d473

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52464c22371cfdb722be87632b48f2b6

    SHA1

    bd9acf895f3e1356521a9dcfc5321075c04f70c5

    SHA256

    5cc7bedf3bfbe8059f3e009c7c643b52b22998d9e695012b6206b369a63cc331

    SHA512

    a2a74ee220f7953801aeb2177fd926f85b0b722d22c326b4aa5e2f762dbda89e5fa5b3bb875952df708e026dcdcacd1175641db1818f9b9335edd91e68720328

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f17a018854d281072fe12b3e5d9445ab

    SHA1

    eac7693e65abaac22a2912d300194d96fc70ecab

    SHA256

    3967dedfdcf033ed100963f2210e664aa3e096e4472ac6ad7db3aa80f449d453

    SHA512

    ef43df6c1fc4e1da1dee3c4358dbe801c7190704250f490b347d62a0042868d22a19f0801ea3790aa8aad989ab056eaf9e6592a1c76644607f800939bab12505

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a0c78fb8e294a83e2affa946118fc8c

    SHA1

    5364504439246767665afcd76ed291e23dd29e3a

    SHA256

    b3c9629cbfab973ec4d1645712350279d594f226d15a549c904fb596ca9b1e6c

    SHA512

    e8955d751469e868e2c2aa630a343052526a1f964fb5b39a83590c7c93a6c7c888df27e771106edf2199bb50df06552989fa209f4165696dbe919045bcb13f62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cdc9f0fdef948ceed4b72e72bbb1ab6a

    SHA1

    675fdd02759b8d2546b24b3c7c14cf60a57a5130

    SHA256

    0946c493f10b1b14f46a103d97c1cdc95a510c427694637dd6861e27bb66ec93

    SHA512

    90214dd0ca3ef5160e19ab4370b613c5cece19a8c79fdb37023e59cc4c468e1ddfd76b09d086c0bc324e62d20ac2717d81f045ccf251bfcf7b2874bec41810a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d318a97dacc65d93a02582fad381f0d8

    SHA1

    8a19ada5130fe640ac6a7c44098ed68f0c7bc8c9

    SHA256

    f6321dbb1e5beb8d222b8cca6d056d64ab061397ebb070f2369e892eb142970a

    SHA512

    6c4be1f46a288bad11dc11ac0fa7992b2abc83a1fc476bd78dc527e0a97a02b4535c0ea82167e42c85a90396592e975d88aeb4aadcf01f8de5ba1dfb744490b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6cd3c8374325d285d5052b3c0a666ad7

    SHA1

    2c79d3d78d41ea12c81b4d1d23e4eba104b073a6

    SHA256

    95940ee27c86dfedc0e42a2850b33a682b415e9a3e7c78b6a45613411a4a701b

    SHA512

    f05fea9309d2c96346b587623b812cdd1303cfa80b3df274f221cf43bb073e1eb885db4b14af1201ee7167e440f79ff60281f451c6f0acae2dc10cd53952163d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97e335a48db4c50e404bfeafddcd0127

    SHA1

    c636e0edb6d98934f0cf1c84617342f8f116758d

    SHA256

    c2ef81ded8fc5222abfd82dda4370bf534cb1d5d05aa50e6993bf62259fd6f02

    SHA512

    31666271a93ad2b2d564cc62663c1e425d228ba522e50b905ed9bb204477f9b90cd8aa7a920329fd0651eea812c6e83a8c4d3465be1ad928024be147f0a53a26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7d2ac8b2c288557a33bc45b325d26652

    SHA1

    5beb4489d9ee8a87d608af5917dc10aaff2fb77b

    SHA256

    257c25dcb6a8b2d7beb4bad687a8ae3f9c01dc3d6f7c624ce04b438b0cb8e974

    SHA512

    dc3f5766d55a0c7ca5f0e6f20d752a92b58219ca8c438b23f9a2627ade5424de267361e98fcdc3ed27ab7af2e41af805a4584a2ee01dcdaab1dd1e9415a3774e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4e9fe0476e00ee64796119a9ced5d50d

    SHA1

    67aaef89e7ae580248af1207cbce2b35cb1cf3bd

    SHA256

    8ae2203dfd04e26173f374d0037cb5b7b395d456bd1542607c540851882468c3

    SHA512

    f1edb7913f9221b9070c91beec6f021cefa021411cc0ae6c412ecfaf7639e29820bcac3144c31f22a9f567d9cdc2aae1de056ffdeaee758d5e6ee63bfe031834

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ebc5a3473baf9f8c14aca105f933b54e

    SHA1

    d0b3bb90d0c42c1b31e201dfba7107fe63bf8439

    SHA256

    9670ae9d0498bcee3a617e398ed7f4d7d70357570120c940234d3b9a75db1048

    SHA512

    3b1bd41200a1ce26cc029ba353ae74908ae26e3d0f6ec4fa053235a12269e7b47418a66358371e9ca8edfc00e3bdffb283852564bfeec851fcb7dda33dfbfcb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    455b33b3fa6b98f46359ec43af304fe2

    SHA1

    4198f20eae6e197d86a97f7effd6e929c00d5777

    SHA256

    78b30485f8e65ccb07a361a5d0b89f306ba64b764180cde2424a15b39168d823

    SHA512

    071508dee505fac1114b93ccdbce54df463e4874a6a4690e8109d60d8b7768d6775547f1fa13436763582c8334ea03d1d8344db932aeadd04a0f62e9dfa66b3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    57ed27131430000ac37c7a6dd2327aff

    SHA1

    d61cc3f0cf15fc792d655fcc01ef9b2a3afe58b9

    SHA256

    862adc77c861e391d127b046ab0ea0948ed6b68c91326472014784e1959c8a5d

    SHA512

    8f4623c8d536acf9602090fd3e4faab5029e525594c0c0fe87044d1c979d1687165334cb04322337d03edaac0e10e3d0c54796786b85bfac85b6b53961d22e4f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    98d73a99a3e02b0b5e0cf7b642b02e7d

    SHA1

    740438244da10ca2b6b82c15fc7e46ac3a8f3329

    SHA256

    ace7e39b916225ed6c1936dba8b3b931847fa3c4a8752c7cc99da2cc3fb09648

    SHA512

    8e243774c35f78c734df0ad3f08b6207712c8c2c11cbf224719a94bf0ccc7af424c879a020b5014f332ae934e4e5f5712a62fa36f6cbe67da30e966a2be7b545

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62

    Filesize

    458B

    MD5

    b8c05a30c504b639bdd665540cf836f2

    SHA1

    0b0a03cdd27e71044cbc0914bd7cc59a9ee27d0a

    SHA256

    e4e411fd5af0f4113c5583b7836a91e900cd5b546d5b0021e37be53e63896c55

    SHA512

    8806d4e832c4fecba7a2a2e5384fbc88b0de3ed79889565c2561b67e303ba9387b7e9ce9e33f1fa9feac95942c0833edeb55d73d93c317f8031c7e387bb77801

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894

    Filesize

    432B

    MD5

    dbfd93b08423f1a7551e9adca3b03bc2

    SHA1

    6194d837fa4a350e992321e9191e746e3e612455

    SHA256

    12934366509b0ea48c69666a94b276175ba96a19eafb8f053455cc710f716fa9

    SHA512

    17a103cc44df3009326cc293143440f7ea7b286569dca8e9649de758aa7225be72103076cb9dcd182689618b90a86bf4f8acf43c99855bacc617d775267b0fbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    fc6ac488eed27cd8b33e4a87a91fdce7

    SHA1

    57f80639fae011ca49f0f765247591f0ab89bfe1

    SHA256

    e6df8265303d09dcd7ac0c331a3ffa57d9bc9f89323b2e8d6fb4efd1253a595b

    SHA512

    cf7f94f08aeff687732665323b1b99225a066d591cb005b21c699fc0539c2fb765cd4348ea2443734424be6964cfb85297a431d8a1830fc9e1ceefdf87d9b4f5

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\jw2rl61\imagestore.dat

    Filesize

    8KB

    MD5

    2fb16a44c66af65a5646b88b54fae44c

    SHA1

    d411115a12620ea7e72b8cddeb2b74dfe08a1413

    SHA256

    e8064383e7b95518a18fcc44b0c9e4966923c16275aef0bd9d77e4ecbac7fba0

    SHA512

    326d59cd8dce6060b7cadc46f4b5db7e924553ace73ce80fbad1edfd1579e345471a13e1bdf5a5a8193cf6f2958dec4dacfa4bd48263bc5a640a068a06e681c4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\favicon-196x196.59e3822720be[1].png

    Filesize

    7KB

    MD5

    59e3822720bedcc45ca5e6e6d3220ea9

    SHA1

    8daf0eb5833154557561c419b5e44bbc6dcc70ee

    SHA256

    1d58e7af9c848ae3ae30c795a16732d6ebc72d216a8e63078cf4efde4beb3805

    SHA512

    5bacb3be51244e724295e58314392a8111e9cab064c59f477b37b50d9b2a2ea5f4277700d493e031e60311ef0157bbd1eb2008d88ea22d880e5612cfd085da6d

  • C:\Users\Admin\AppData\Local\Temp\7zSC25FEF36\setup.exe

    Filesize

    939KB

    MD5

    43947976824aa63f057de1ac7a99c377

    SHA1

    5f6d978b9bd3ad7e435848090d7d53e27edcf66a

    SHA256

    c57ccd8514fe77530c62f67b5a069afb0a912a11892e890dccfdb5a64b1f9531

    SHA512

    2c812802b5c1150c406e8dae2857d13783f8aeaf2a29acdc65f8d86ba1f3e0f9164823a414a868b51a98f94f41f784659b39c0d9451deae756f93af144134ada

  • C:\Users\Admin\AppData\Local\Temp\TarECD.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\nsyB67.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    1b446b36f5b4022d50ffdc0cf567b24a

    SHA1

    d9a0a99fe5ea3932cbd2774af285ddf35fcdd4f9

    SHA256

    2862c7bc7f11715cebdea003564a0d70bf42b73451e2b672110e1392ec392922

    SHA512

    04ab80568f6da5eef2bae47056391a5de4ba6aff15cf4a2d0a9cc807816bf565161731921c65fe5ff748d2b86d1661f6aa4311c65992350bd63a9f092019f1b8

  • C:\Users\Admin\AppData\Local\Temp\nsyB67.tmp\config.ini

    Filesize

    187B

    MD5

    ed23468cb20f1f37a967eb26f639faef

    SHA1

    5707e3d394b6a3e36e8b1e23317ec115bafa1e9c

    SHA256

    812217f840657b7d310c406d7224eb1c339079ad48541d922e3f15f1b2e3d913

    SHA512

    9a7d3073b2d7d234eee56464df7b58be4466171c3cad47ebf0d4742c0ed05555ac890a18991ef59bf8b0751a207ea04f86a728fe3b0cb19607b9f6e4f45e76f9

  • C:\Users\Admin\AppData\Local\Temp\nsyB67.tmp\download.exe

    Filesize

    57.8MB

    MD5

    1e27e7745bba839a11fde43ee09614fb

    SHA1

    8ea7d0013e5f4327adef0384427f14adf8d2e9e6

    SHA256

    3d60842520fdca462a8c9e3c998eb2e3a267dc801af1100953910038b0da0906

    SHA512

    bce358d57a36bc1d9326f944b7aa3b3f59c3174b8a5d4c7e2ee7b4fe90b1ac3cfb49e79ffb68564359680f6920cf32ac889252aff2a13424bc252d412504f40e

  • C:\Windows\CTS.exe

    Filesize

    28KB

    MD5

    e6150447c894ade7b2b9ee88d5933922

    SHA1

    dc62f7f9ff1a492adadbc8b6321c0b7b9cd973d1

    SHA256

    b612d46644d0e4a3829c4d6715f71d979103aa487624805363b36f5b4f92b118

    SHA512

    d6db2b459723005662a646357bd60ab6e5cf77ab4f83868c91e725e45c32b44900c32724883df6aa4a0e85cbf7441bea159334f3080cfe8e7acec540aa996ff0

  • \Users\Admin\AppData\Local\Temp\7zS8C6B0916\setup-stub.exe

    Filesize

    407KB

    MD5

    27eba7c268114cde294ba56de94c1814

    SHA1

    0a0bbce1beaadb36e92bbcd1ed7de601e79528c1

    SHA256

    958aaac6fec9912ff65b7fa3ee87df665ee38ded11c90222b82efe8569847c9e

    SHA512

    5879384d9d22771b96db3b37ff9fb625f5c09ef3aea75919889b4450cd1efaa73c61f017d4a32802acfe8c0c90a1ed585062eec1b1331ac0cef8c45e31fffb98

  • \Users\Admin\AppData\Local\Temp\nsd3BF8.tmp\System.dll

    Filesize

    22KB

    MD5

    b361682fa5e6a1906e754cfa08aa8d90

    SHA1

    c6701aee0c866565de1b7c1f81fd88da56b395d3

    SHA256

    b711c4f17690421c9dc8ddb9ed5a9ddc539b3a28f11e19c851e25dcfc7701c04

    SHA512

    2778f91c9bcf83277d26c71118a1ccb0fb3ce50e89729f14f4915bc65dd48503a77b1e5118ce774dea72f5ce3cc8681eb9ca3c55cf90e9f61a177101ba192ae9

  • \Users\Admin\AppData\Local\Temp\nsyB67.tmp\CertCheck.dll

    Filesize

    4KB

    MD5

    837429ef2393bd6f8d7ae6ab43669108

    SHA1

    bc1a6e461de60db2f3036778c761103c02374082

    SHA256

    9e1831bf44b75980903eff8446960f21ab323b9f8249ddb49519718d873135d5

    SHA512

    c9b464377720799030e7303ea98acd38dc56ef0ae613ec540a5d9907d84bb7c455f6e02b38073901ee717bfdbf92137ab095aa9ce047971b6a2e6d3bc9d039d1

  • \Users\Admin\AppData\Local\Temp\nsyB67.tmp\InetBgDL.dll

    Filesize

    33KB

    MD5

    73a0bec837004bc5ae5cd0a5b0d3bcf8

    SHA1

    92cb463841b6adeecb8cc9cc8eb5f39a61dc7edd

    SHA256

    0dd38281a824298100b2bc89ee5b8a5c9cd9ec7a3b051dff42037a891fa7c534

    SHA512

    f7aa18261fb4ef99b66e9a16e2df6323d34444de84a5bdabd3890154b0207f8509f34f2fe115b00e2396d33df778be6456a7fd754cc00271f8189e5a4420b6d2

  • \Users\Admin\AppData\Local\Temp\nsyB67.tmp\System.dll

    Filesize

    11KB

    MD5

    17ed1c86bd67e78ade4712be48a7d2bd

    SHA1

    1cc9fe86d6d6030b4dae45ecddce5907991c01a0

    SHA256

    bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb

    SHA512

    0cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5

  • \Users\Admin\AppData\Local\Temp\nsyB67.tmp\UAC.dll

    Filesize

    18KB

    MD5

    113c5f02686d865bc9e8332350274fd1

    SHA1

    4fa4414666f8091e327adb4d81a98a0d6e2e254a

    SHA256

    0d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d

    SHA512

    e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284

  • \Users\Admin\AppData\Local\Temp\nsyB67.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    42b064366f780c1f298fa3cb3aeae260

    SHA1

    5b0349db73c43f35227b252b9aa6555f5ede9015

    SHA256

    c13104552b8b553159f50f6e2ca45114493397a6fa4bf2cbb960c4a2bbd349ab

    SHA512

    50d8f4f7a3ff45d5854741e7c4153fa13ee1093bafbe9c2adc60712ed2fb505c9688dd420d75aaea1b696da46b6beccc232e41388bc2a16b1f9eea1832df1cd7

  • \Users\Admin\AppData\Local\Temp\nsyB67.tmp\nsJSON.dll

    Filesize

    18KB

    MD5

    e89c7cd9336d61bb500ac3e581601878

    SHA1

    45b2563daa00ba1b747615c23c38ef04b95c5674

    SHA256

    431fc2ed27d0b7a1ce80de07989595effcc3ffb1dea1af6c0e178b53f6bd2f1e

    SHA512

    09485a354ac4ace6084cb6fcbd92eee8488074763c8443638f78e655e45e8aa0fe40a45d4ce0dff116ed3a4bb7bc4d7d845a6ccf0e0bf35533ce81626a8db06f

  • \Users\Admin\AppData\Local\Temp\rZHem2bpRcbrsxA.exe

    Filesize

    306KB

    MD5

    b1ec7bff4192f75a0a53608047a190e9

    SHA1

    7686a580333e8d60e1806418c8467e85beab4d2a

    SHA256

    134e9f12545c3300eedc7a5644c28f390e00918a15fbcf2143492810ab4a5474

    SHA512

    2af2d71ef3f292888adbe9836ae8bb3b1a8f99f4c95be0565515adf544c989e4ff722342721500b0aefc5f57178a1de9a916c4096c3f6722b42dcd0063cd6067

  • memory/1324-276-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/1736-401-0x0000000000400000-0x0000000000443000-memory.dmp

    Filesize

    268KB

  • memory/2008-13-0x00000000003E0000-0x00000000003F7000-memory.dmp

    Filesize

    92KB

  • memory/2008-0-0x00000000003E0000-0x00000000003F7000-memory.dmp

    Filesize

    92KB

  • memory/2008-9-0x0000000000070000-0x0000000000087000-memory.dmp

    Filesize

    92KB

  • memory/2008-4-0x0000000000160000-0x00000000001A3000-memory.dmp

    Filesize

    268KB

  • memory/2192-17-0x0000000001190000-0x00000000011A7000-memory.dmp

    Filesize

    92KB

  • memory/2652-1057-0x00000000046D0000-0x0000000004716000-memory.dmp

    Filesize

    280KB

  • memory/2652-210-0x0000000002ED0000-0x0000000002EDB000-memory.dmp

    Filesize

    44KB

  • memory/2652-274-0x00000000046D0000-0x0000000004716000-memory.dmp

    Filesize

    280KB