Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 05:00

General

  • Target

    f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe

  • Size

    3.1MB

  • MD5

    f05e4420dfc79226b34b0f7e3d1a65f1

  • SHA1

    95c5fc288a628e2fba01879b0dbe0dbbd79ae74f

  • SHA256

    bd887a31360a06cf6094b3b889bf7ec9d835c9642bff6a0ed98bb248f225bf24

  • SHA512

    d427c45f260e9bd38fa5a843c4eeff5482c102ace9b3f083ce015e9ce303dd9c481b70a715764c3cec16c6dc0246ad66f251197945f52a13e4e5eab77542ce38

  • SSDEEP

    98304:qw3BM5HPz7UtPTkJY58taa7RTBQl50HeaCdRd9zojPGuH:qw3EHPzOTkJYla7RTBQl509CdRd9zojH

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.wygexde.xyz/

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

whiteshadows.ddns.net:9731

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    microsoft 2.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

gcleaner

C2

g-prtnrs.top

g-prtrs.top

Extracted

Family

redline

Botnet

UPD

C2

185.215.113.45:41009

Extracted

Family

redline

Botnet

Liez

C2

liezaphare.xyz:80

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 7 IoCs
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • Async RAT payload 1 IoCs
  • OnlyLogger payload 3 IoCs
  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 29 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f05e4420dfc79226b34b0f7e3d1a65f1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\3002.exe
      "C:\Users\Admin\AppData\Local\Temp\3002.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\3002.exe
        "C:\Users\Admin\AppData\Local\Temp\3002.exe" -a
        3⤵
        • Executes dropped EXE
        PID:2572
    • C:\Users\Admin\AppData\Local\Temp\askinstall54.exe
      "C:\Users\Admin\AppData\Local\Temp\askinstall54.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im chrome.exe
        3⤵
          PID:1520
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im chrome.exe
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:328
      • C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe
        "C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2116
      • C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe
        "C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2676
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
          3⤵
            PID:1720
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
              4⤵
              • Creates scheduled task(s)
              PID:1200
          • C:\Users\Admin\AppData\Roaming\services64.exe
            "C:\Users\Admin\AppData\Roaming\services64.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2796
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
              4⤵
                PID:1764
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                  5⤵
                  • Creates scheduled task(s)
                  PID:2464
              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2388
                • C:\Users\Admin\AppData\Roaming\services64.exe
                  "C:\Users\Admin\AppData\Roaming\services64.exe"
                  5⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2428
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
                    6⤵
                      PID:2012
                      • C:\Windows\system32\schtasks.exe
                        schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                        7⤵
                        • Creates scheduled task(s)
                        PID:1884
            • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
              "C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe"
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2444
              • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
                C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
                3⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1204
            • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
              "C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"
              2⤵
              • Executes dropped EXE
              PID:1668
            • C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe
              "C:\Users\Admin\AppData\Local\Temp\microsoft 2.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1624
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "microsoft 2" /tr '"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"' & exit
                3⤵
                  PID:2604
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /f /sc onlogon /rl highest /tn "microsoft 2" /tr '"C:\Users\Admin\AppData\Roaming\microsoft 2.exe"'
                    4⤵
                    • Creates scheduled task(s)
                    PID:2832
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp2452.tmp.bat""
                  3⤵
                  • Loads dropped DLL
                  PID:2448
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout 3
                    4⤵
                    • Delays execution with timeout.exe
                    PID:280
                  • C:\Users\Admin\AppData\Roaming\microsoft 2.exe
                    "C:\Users\Admin\AppData\Roaming\microsoft 2.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1208
              • C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe
                "C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2324
              • C:\Users\Admin\AppData\Local\Temp\setup.exe
                "C:\Users\Admin\AppData\Local\Temp\setup.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2688
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 868
                  3⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:3000
              • C:\Users\Admin\AppData\Local\Temp\updatenew.exe
                "C:\Users\Admin\AppData\Local\Temp\updatenew.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1360

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Execution

            Scheduled Task/Job

            1
            T1053

            Persistence

            Scheduled Task/Job

            1
            T1053

            Privilege Escalation

            Scheduled Task/Job

            1
            T1053

            Defense Evasion

            Subvert Trust Controls

            1
            T1553

            Install Root Certificate

            1
            T1553.004

            Modify Registry

            1
            T1112

            Credential Access

            Unsecured Credentials

            1
            T1552

            Credentials In Files

            1
            T1552.001

            Discovery

            Query Registry

            2
            T1012

            System Information Discovery

            1
            T1082

            Collection

            Data from Local System

            1
            T1005

            Command and Control

            Web Service

            1
            T1102

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
              Filesize

              893B

              MD5

              d4ae187b4574036c2d76b6df8a8c1a30

              SHA1

              b06f409fa14bab33cbaf4a37811b8740b624d9e5

              SHA256

              a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

              SHA512

              1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
              Filesize

              1KB

              MD5

              a266bb7dcc38a562631361bbf61dd11b

              SHA1

              3b1efd3a66ea28b16697394703a72ca340a05bd5

              SHA256

              df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

              SHA512

              0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              344B

              MD5

              344c3f7c7c13e87f2a2bca9163286834

              SHA1

              681c41a82ce89745ba8a0fa00e21b79eab0940c5

              SHA256

              32b8aa2d4341b583eb91ad4f928322d9dea7c0bb8879dfa54930b2c9cc52a7f6

              SHA512

              57fbca18cf39e2f26ade66e4f43b202daca5e4637cb675d1eac1fafb4425257210561d79156ae594654cb2da887f4d600fad8eff585aa9821a33a4423e17d54f

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              344B

              MD5

              cef59315be0d33d64dae84ca94cbb13f

              SHA1

              db0f62b58b0a69d57c14528817c67524d1a6f9ae

              SHA256

              177290d55f72c4ec00cc59b865270627998c60656a1db5cc4d1d64c31771aee9

              SHA512

              1dacb8bb9ee005c80849dba9750c400d7a55aca9c31246a1dd199f76e0cf80b85f419637baed4e61ba97bafbaecd00d9912d1860bb95fd38701d2f64aabca8cc

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              344B

              MD5

              39c02ba13d4c6d891ac3725a6d5538a8

              SHA1

              9f73b9f2747361cb7ebf1563e7200109f8b12251

              SHA256

              8a275653b8cdc973ac0f1da2afd2267fcd7e29d25d78114deb551d896aeede3a

              SHA512

              07e719849b23fb26c967cacd4e2552717a779ca4d96948243d2808f2382c766b2cbe4df6326bd2707664c968cb18962417c2db1b2836ebe4404ade74f9775e6b

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              344B

              MD5

              0c25e24e9125ee7756ccdbdd359b8680

              SHA1

              c304bb72e04015d56ab2416998c9ca291bea6fc4

              SHA256

              332e938e5c09c6054b44858b0337f62faa8244d7f2aff22894898627f7f9b9ae

              SHA512

              bd604f1cb620ffb1f164746f3c7288a0ae87a3f6cc996ad0a8b5758e9b65c2ea1d0c76cf0b0a50869168a9c8b5ad952e18add2de1d861263cbcf567c6a650ff2

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              344B

              MD5

              e1eb054358b4f837e9f7be7f98cd1915

              SHA1

              afae8a0d6698c246bdd614bf1a4d3b6dfa8b232a

              SHA256

              b2c22c2cff6020ad41585925dd23bb6ac0983fd6fb0fe86aec038283d6a734c6

              SHA512

              5ebef17ae92abfa7ae4545a2b90df2827ac3eab42150b23276fbe43870d6cdb4699f476fc46ce7366adbe2d9369bbb07d602c1029890d799c4002655a36b775c

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
              Filesize

              344B

              MD5

              0887ec2fcdd5182f92719f0353cdba07

              SHA1

              ac184a1e952fde7ab86cb22f8cba9c8f6435c683

              SHA256

              f139d729e23e6c0c37296e4930a8db410cb04392a19f5ca257604432b8d52eb9

              SHA512

              e14ee9bb605d1a531eece25fe4ad1f2a74f0e7d337401961ef26a90cf9d388d0bfc75ac1d88937a5c9e6394e8500083da3650887e7fc12aec582ff4de75ea546

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
              Filesize

              252B

              MD5

              4764c52f2e313a264dac2990102bb643

              SHA1

              af639d40780b131000a9f43134fbf1ca931ad81b

              SHA256

              ba23881e3d7acf17ae29dce412ea45d17fdf52102e88c1b990cdfd6d39a62439

              SHA512

              163ce0e03a9a3105e095d1ec7bcf9c8f04d8f187632ef056d579e87097c8eb140ffd6e05f352fa330912a82ae5201417056ed9f9a27c1822475d35bf29429261

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
              Filesize

              242B

              MD5

              4e062e7190b2c67030d488aabfeb6a3e

              SHA1

              8e299de3532c1c043acf9223648ca1bf801c6ef9

              SHA256

              d339f07ba46a31e7815cbebe7629705f6fe0b46e78ffe8c1e2922273a06dca97

              SHA512

              d431eb3941bd12c798c4c7893bae84d560e670cb3cb2389c73b0ddf64d509344dc9919cb7666a7bfc465922cb5a9da662a4464f06d724a6c9eb41cb1bb6109ff

            • C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe
              Filesize

              6KB

              MD5

              e4ff121d36dff8e94df4e718ecd84aff

              SHA1

              b84af5dae944bbf34d289d7616d2fef09dab26b7

              SHA256

              2a019bc6bace686b08286ee7d8e2e66c18283b162d27774c486037c940dc60cc

              SHA512

              141f12468cfe737b3694a4ece8f17c5d35bbade05ee0538fe4ef4fccf61584374f79a474fd4bf82685a4840afd94e9a9bbd9c9f357cb342dda9f89109c4da5f4

            • C:\Users\Admin\AppData\Local\Temp\Cab1F94.tmp
              Filesize

              65KB

              MD5

              ac05d27423a85adc1622c714f2cb6184

              SHA1

              b0fe2b1abddb97837ea0195be70ab2ff14d43198

              SHA256

              c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

              SHA512

              6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

            • C:\Users\Admin\AppData\Local\Temp\Chrome3 2.exe
              Filesize

              43KB

              MD5

              58eea186f52da3256cc01e3856bca5c0

              SHA1

              35e8b3f570d572ea56fdf0dfb480e9cc4a36d986

              SHA256

              26021efed039139a1c40ad7125a380e166321c65bc7354ea45d74ece6b0c692f

              SHA512

              0d69916dde2e6a24a7addb9f1b21b51ff4b9d0b2052a719af431c6a382647bb01fdd96aedf89dc9c531faf3d2849fd2dc505385b929df23d8e7b1c3c5a9d740a

            • C:\Users\Admin\AppData\Local\Temp\GLKbrow.exe
              Filesize

              390KB

              MD5

              a186a0ef26742808b75c2ef534ece63c

              SHA1

              d79062c6c9c039831e54c88fb67cd64e8146048c

              SHA256

              18bc677465a6195706664788be8d88acd5cfd4abdad074aa1e1f0b2fbfed2b76

              SHA512

              f5d2304750011a920bf1c219185bf9963fb47ab52e1fec96ce98cd15853fe6b592356b638f2f3628d3f5a1a45c47e85db1fb2d5a00a85840ad3e296ff130c21b

            • C:\Users\Admin\AppData\Local\Temp\NGlorySetp.exe
              Filesize

              120KB

              MD5

              bf08a1385317518360e2fd24e25a67e2

              SHA1

              00b5d4aa063217b31755c4a698135915671f231f

              SHA256

              d06d7d96e973671151438fe57a33c2834f7427c6c39501c22e0fbf1bd38de227

              SHA512

              802750549a8302a69255e48ffe9b293babf26693e533484050449993e5c9365bf4b137013cbb7ae75359abe3a557bd4cc67b143be7dccad41b02a3ff5c0af5dc

            • C:\Users\Admin\AppData\Local\Temp\Tar201F.tmp
              Filesize

              171KB

              MD5

              9c0c641c06238516f27941aa1166d427

              SHA1

              64cd549fb8cf014fcd9312aa7a5b023847b6c977

              SHA256

              4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

              SHA512

              936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

            • C:\Users\Admin\AppData\Local\Temp\Tar2065.tmp
              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
              Filesize

              239KB

              MD5

              1fa531c00decf91ca71f207cac84eaf7

              SHA1

              8131ac8c897ba6f76175cfed34cbd7b1c96d1e19

              SHA256

              81613cf7f25302f85a8f6e80cea1fee589e6b05828ed6b0946b3855f7c70233f

              SHA512

              5b2c27bc949f618dbb8bd94339f35ca5f55c0fd7f347463c79d3d1ec0b033322be65542429397fdbcccf9e92163b82505f5113c48ff111ec08ca050fb9812be7

            • C:\Users\Admin\AppData\Local\Temp\tmp2452.tmp.bat
              Filesize

              155B

              MD5

              cfbd79782efa10d148aee27035298282

              SHA1

              677a078a7fccad991172b1d0640d26fd43d0bcdd

              SHA256

              268e3462c9baca85a2f786e7553ee5aa2262af5eda2de96f6ed656405b3cf09a

              SHA512

              b54a1d3b2411989ea9123bdff1f3e58b08750e4dfd69b82d0ba55e8929a2e31d138c6ede90e9cc474817ade82a82b5b68aec4d6762797fb182627ab358b73683

            • C:\Users\Admin\AppData\Local\Temp\updatenew.exe
              Filesize

              394KB

              MD5

              f0524f49b7826d4a1ec521784e18a159

              SHA1

              a9a60c3e40fe80153091a51c182bb80134eaadaf

              SHA256

              30eaf7331e0e7e4323f35fb5c6b0744aec2dc0f18d1eb9a1f842b006926c1a83

              SHA512

              7cad9f36d3564b7e673738251322ae8888cba17e324c7c34e312b0550e5549b257aaa1b3c9cb947b013f5ac0d21019ef1bf20421a851787a65ab97cac5711472

            • \Users\Admin\AppData\Local\Temp\3002.exe
              Filesize

              56KB

              MD5

              e511bb4cf31a2307b6f3445a869bcf31

              SHA1

              76f5c6e8df733ac13d205d426831ed7672a05349

              SHA256

              56002017746f61eee8d8e9b5ad2f3cbb119dc99300c5b6d32c1be184d3e25137

              SHA512

              9c81de34bf3b0eb75405c726d641ef6090054e9be8e0c0ab1bb2ed095e6477ce2fa8996868bf8a77a720b210a76b5f4e1b3b086d7f40449d79498681b367199c

            • \Users\Admin\AppData\Local\Temp\askinstall54.exe
              Filesize

              1.4MB

              MD5

              f15409c47e5eb9ef4b316c3c8d2d3936

              SHA1

              32df482df77e5ef84560ff814a725831acb89b42

              SHA256

              ec860b4ca9a08990622bc7fd0606383c965de9dd58bcf2022de601988fb7e3a4

              SHA512

              2e8ba5d6b6d599f4df23365f0f93eee65f51ad369794b0d43d4e56a9060700a038e7af9dc15bca3034c20cfadc2300dff526ec64fb08c9499cb2fa24943949fc

            • \Users\Admin\AppData\Local\Temp\microsoft 2.exe
              Filesize

              45KB

              MD5

              96e4aa05fbaf3ee4aa018be285821cb0

              SHA1

              8152a37db98c8b4cd96e66ae5942a5c0afce2fa1

              SHA256

              b8957cff3e10c9e25e2fb62a044646e153a22d5b1943613270568dccef3a4fcd

              SHA512

              51e8e0e041d8ceb6e889ede1ac2b3a0d4979cc8eff1a1216f5d5caa67cacba7563c3bb8f4c98d5c9b9ef3d95dbd9a839ff532d79109a208ba70e9f61d9d026d8

            • \Users\Admin\AppData\Local\Temp\setup.exe
              Filesize

              370KB

              MD5

              9e71e05b637b04dd7ea315b4ac6feb4a

              SHA1

              78dbe6d8fe1af0009fdc803cdf40a7101422fa94

              SHA256

              733693a304149939abc2dba1857e2f37111eba29b3c5d47dc3cf5243dd3dbb1a

              SHA512

              dd31ac2fdfde46b5ade917bf102732bcf5c193de4060a9813b750f907051e822731273a8ab2ea999903354bf434132f6a7176da2ea1988a08c06714ff4a1445b

            • \Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
              Filesize

              7KB

              MD5

              eb723528b6a8d2fb095868a1eeb5f83f

              SHA1

              936e74ece3d80e9d48998d888bb124ad3136140d

              SHA256

              c14011ba46b4c67c818da5b011ab0b82fdb481f24cbb217caa0825b59116e094

              SHA512

              a9665ea57fe31b093a030c7c9a3b5253e636ff1c09c3e914a32e8747964e1de5fba301052a1e396e3bd5270ff4991b88379920636d29e7e70cfa9e2da6a982af

            • memory/1204-231-0x0000000000400000-0x000000000041E000-memory.dmp
              Filesize

              120KB

            • memory/1204-320-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/1204-321-0x0000000001EE0000-0x0000000001F20000-memory.dmp
              Filesize

              256KB

            • memory/1204-238-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/1204-235-0x0000000000400000-0x000000000041E000-memory.dmp
              Filesize

              120KB

            • memory/1204-237-0x0000000000400000-0x000000000041E000-memory.dmp
              Filesize

              120KB

            • memory/1204-229-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
              Filesize

              4KB

            • memory/1204-228-0x0000000000400000-0x000000000041E000-memory.dmp
              Filesize

              120KB

            • memory/1204-225-0x0000000000400000-0x000000000041E000-memory.dmp
              Filesize

              120KB

            • memory/1204-227-0x0000000000400000-0x000000000041E000-memory.dmp
              Filesize

              120KB

            • memory/1204-224-0x0000000000400000-0x000000000041E000-memory.dmp
              Filesize

              120KB

            • memory/1204-239-0x0000000001EE0000-0x0000000001F20000-memory.dmp
              Filesize

              256KB

            • memory/1208-300-0x0000000004DA0000-0x0000000004DE0000-memory.dmp
              Filesize

              256KB

            • memory/1208-325-0x0000000004DA0000-0x0000000004DE0000-memory.dmp
              Filesize

              256KB

            • memory/1208-291-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/1208-290-0x0000000000D90000-0x0000000000DA2000-memory.dmp
              Filesize

              72KB

            • memory/1208-322-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/1360-114-0x0000000000400000-0x000000000047D000-memory.dmp
              Filesize

              500KB

            • memory/1360-113-0x0000000000290000-0x00000000002BF000-memory.dmp
              Filesize

              188KB

            • memory/1360-306-0x00000000005D0000-0x00000000006D0000-memory.dmp
              Filesize

              1024KB

            • memory/1360-112-0x0000000000580000-0x00000000005A0000-memory.dmp
              Filesize

              128KB

            • memory/1360-118-0x00000000005D0000-0x00000000006D0000-memory.dmp
              Filesize

              1024KB

            • memory/1360-317-0x0000000004D60000-0x0000000004DA0000-memory.dmp
              Filesize

              256KB

            • memory/1360-116-0x0000000000860000-0x000000000087E000-memory.dmp
              Filesize

              120KB

            • memory/1624-220-0x0000000004260000-0x00000000042A0000-memory.dmp
              Filesize

              256KB

            • memory/1624-248-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/1624-117-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/1624-62-0x00000000003F0000-0x0000000000402000-memory.dmp
              Filesize

              72KB

            • memory/1888-1-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/1888-0-0x0000000001180000-0x0000000001494000-memory.dmp
              Filesize

              3.1MB

            • memory/1888-83-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/2116-30-0x00000000008A0000-0x00000000008A8000-memory.dmp
              Filesize

              32KB

            • memory/2116-44-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/2116-49-0x0000000004760000-0x00000000047A0000-memory.dmp
              Filesize

              256KB

            • memory/2116-226-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/2324-71-0x0000000000FA0000-0x0000000000FC8000-memory.dmp
              Filesize

              160KB

            • memory/2324-115-0x000000001AF70000-0x000000001AFF0000-memory.dmp
              Filesize

              512KB

            • memory/2324-286-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2324-108-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2324-92-0x00000000002C0000-0x00000000002DE000-memory.dmp
              Filesize

              120KB

            • memory/2388-464-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2388-465-0x000000001B440000-0x000000001B4C0000-memory.dmp
              Filesize

              512KB

            • memory/2388-335-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2388-333-0x000000013FA00000-0x000000013FA06000-memory.dmp
              Filesize

              24KB

            • memory/2428-480-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2428-479-0x000000013FC80000-0x000000013FC90000-memory.dmp
              Filesize

              64KB

            • memory/2428-538-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2428-483-0x0000000000870000-0x00000000008F0000-memory.dmp
              Filesize

              512KB

            • memory/2444-106-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/2444-234-0x0000000074590000-0x0000000074C7E000-memory.dmp
              Filesize

              6.9MB

            • memory/2444-51-0x0000000000860000-0x00000000008C8000-memory.dmp
              Filesize

              416KB

            • memory/2444-107-0x0000000004840000-0x0000000004880000-memory.dmp
              Filesize

              256KB

            • memory/2676-315-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2676-52-0x000000013F450000-0x000000013F460000-memory.dmp
              Filesize

              64KB

            • memory/2676-305-0x00000000007D0000-0x00000000007DE000-memory.dmp
              Filesize

              56KB

            • memory/2676-307-0x000000001AC90000-0x000000001AD10000-memory.dmp
              Filesize

              512KB

            • memory/2676-105-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2676-303-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2688-301-0x0000000000400000-0x0000000000477000-memory.dmp
              Filesize

              476KB

            • memory/2688-109-0x0000000000590000-0x0000000000690000-memory.dmp
              Filesize

              1024KB

            • memory/2688-110-0x0000000000270000-0x000000000029E000-memory.dmp
              Filesize

              184KB

            • memory/2688-111-0x0000000000400000-0x0000000000477000-memory.dmp
              Filesize

              476KB

            • memory/2688-304-0x0000000000590000-0x0000000000690000-memory.dmp
              Filesize

              1024KB

            • memory/2796-459-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2796-316-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp
              Filesize

              9.9MB

            • memory/2796-326-0x00000000008D0000-0x0000000000950000-memory.dmp
              Filesize

              512KB

            • memory/2796-314-0x000000013F5D0000-0x000000013F5E0000-memory.dmp
              Filesize

              64KB