Analysis

  • max time kernel
    50s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 16:58

General

  • Target

    TLauncher-2.919-Installer-1.3.3.exe

  • Size

    23.0MB

  • MD5

    38d4740072a8962d2301b482c96ad41d

  • SHA1

    f4058683b559f1a3cac9e19ff6121a3d990a5909

  • SHA256

    1127fd6ea53d54feb45168d7e98488387e11b0673123142cf8a8f84fbe73140d

  • SHA512

    77b981c49fdcb351a5b6cbe0a0feae3c702b98d68c71ae28b570f0e8a449c664f284059887fbf3f7d32d7e3ea0ae54ce63cd7c2c4ecfdcb89b9a9d0aab2179b7

  • SSDEEP

    393216:c25K22hvhyr4hQ5+kcOWyiGhtkNtdal39+ytpUcOy0rr6of5MJ7ZWqxPAIgtMIMo:5K2Q7m+QWpGEtgl3n3vObrrKJBH5lFRq

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Blocklisted process makes network request 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TLauncher-2.919-Installer-1.3.3.exe
    "C:\Users\Admin\AppData\Local\Temp\TLauncher-2.919-Installer-1.3.3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1773458 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-2.919-Installer-1.3.3.exe" "__IRCT:3" "__IRTSS:24067351" "__IRSID:S-1-5-21-3627615824-4061627003-3019543961-1000"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Users\Admin\AppData\Local\Temp\BrowserInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\BrowserInstaller.exe" /NOINIT /S:C:\Users\Admin\AppData\Local\Temp\setuparguments.ini
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2236
        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe
          "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe" /NOINIT /S:C:\Users\Admin\AppData\Local\Temp\setuparguments.ini __IRAOFF:1679762 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\BrowserInstaller.exe" "__IRCT:3" "__IRTSS:1708464" "__IRSID:S-1-5-21-3627615824-4061627003-3019543961-1000"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1716
      • C:\Users\Admin\AppData\Local\Temp\jre-windows.exe
        "C:\Users\Admin\AppData\Local\Temp\jre-windows.exe" STATIC=1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Users\Admin\AppData\Local\Temp\jds259430863.tmp\jre-windows.exe
          "C:\Users\Admin\AppData\Local\Temp\jds259430863.tmp\jre-windows.exe" "STATIC=1"
          4⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:636
          • C:\Program Files\Java\jre-1.8\bin\javaw.exe
            -Djdk.disableLastUsageTracking -cp "C:\Program Files\Java\jre-1.8\bin\..\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -getUserWebJavaStatus
            5⤵
              PID:2928
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Loads dropped DLL
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1088
      • C:\Windows\system32\MsiExec.exe
        C:\Windows\system32\MsiExec.exe -Embedding 2EFC38B27151E9BAF199CF4E91B65059
        2⤵
        • Loads dropped DLL
        PID:1976
      • C:\Program Files\Java\jre-1.8\installer.exe
        "C:\Program Files\Java\jre-1.8\installer.exe" /s INSTALLDIR="C:\Program Files\Java\jre-1.8\\" STATIC=1 INSTALL_SILENT=1 REPAIRMODE=0 ProductCode={71024AE4-039E-4CA4-87B4-2F64180401F0}
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Registers COM server for autorun
        • Installs/modifies Browser Helper Object
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Program Files\Java\jre-1.8\bin\javaw.exe
          "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Xshare:dump -Djdk.disableLastUsageTracking
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          PID:488
        • C:\Program Files\Java\jre-1.8\bin\ssvagent.exe
          "C:\Program Files\Java\jre-1.8\bin\ssvagent.exe" -doHKCUSSVSetup
          3⤵
          • Executes dropped EXE
          • Registers COM server for autorun
          • Modifies registry class
          PID:2288
        • C:\Program Files\Java\jre-1.8\bin\javaws.exe
          "C:\Program Files\Java\jre-1.8\bin\javaws.exe" -wait -fix -permissions -silent
          3⤵
            PID:2012
            • C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe
              "C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre-1.8" -vma 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 -ma LXdhaXQALWZpeAAtcGVybWlzc2lvbnMALXNpbGVudAAtbm90V2ViSmF2YQ==
              4⤵
                PID:704
            • C:\Program Files\Java\jre-1.8\bin\javaws.exe
              "C:\Program Files\Java\jre-1.8\bin\javaws.exe" -wait -fix -shortcut -silent
              3⤵
                PID:2696
                • C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe
                  "C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre-1.8" -vma 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 -ma LXdhaXQALWZpeAAtc2hvcnRjdXQALXNpbGVudAAtbm90V2ViSmF2YQ==
                  4⤵
                    PID:380
              • C:\Windows\system32\MsiExec.exe
                C:\Windows\system32\MsiExec.exe -Embedding BDEA17B6A47132851A518C86A71256A4 M Global\MSI0000
                2⤵
                  PID:2580

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Config.Msi\f76af66.rbs

                Filesize

                962KB

                MD5

                60ca08fc46e0efece2a65b359dcdba6f

                SHA1

                7ec305e936ea53af8d372f0e35c0cc92fe59e453

                SHA256

                177ff6ade8d37985c8e67da0b560d6e44b54005fe8614f6b1fabc6b4cab6c3dd

                SHA512

                77902ee5ed68b2dcac8fa71131e8c9fc2fd8a9427168c7899032f6adda8fe461157c9a5d20fa140bee2f176eeeee90d17bd4e94c0be082cdfcb3b1a26f8678a6

              • C:\Program Files\Java\jre-1.8\bin\java.dll

                Filesize

                162KB

                MD5

                583e8b42864ec183c945164f373cb375

                SHA1

                5ec118befbb5d17593a05db2899ee52f7267da37

                SHA256

                9bc9178d3f4246433fe209a0f5ca70e77568e80c928268c78f8c8b00107ce6ed

                SHA512

                1feaac37bac19bde93171ebda2e76a65e9d5472a503b05939f6977b3a4d94d131298f3989dd048d7617ecd69cf09db7ac986fc39f0df9f56c84ea01726d0c898

              • C:\Program Files\Java\jre-1.8\installer.exe

                Filesize

                1.1MB

                MD5

                a37e992a94af15bfb71cdcecef1bd505

                SHA1

                c88f000a9e9cfcf880dbb047f1382f944b99b8e4

                SHA256

                cadab1c6fd4a55951f183054e65144d5b0761e485077df2c783ed6d654de0f65

                SHA512

                994647d0d40f8ab9ad676d03325106d6ea524d7441ce4206ee085f2aeb8ffddde1c24d9d48d5e978e10c8ec419a1a1fb6fb0dd219cdfda177c32365e59a6b5a7

              • C:\Program Files\Java\jre-1.8\lib\rt.jar

                Filesize

                53.3MB

                MD5

                644137cf0708bdcfadd32296f28c2c70

                SHA1

                f42ada87824f49449a94c5e3ff1e0cbcb3d445af

                SHA256

                bf417af0d7b3c7894d3515371fbbb7ea581e084bc2e4acb99709aff564f2a5c6

                SHA512

                b438cc97a3e18635a33681c5ca8aa680fd89b40557ae5f20b3715a43dad7d96d5be57e87e01acec2f849e51fbf4cdf6e88354cdae84e3f3b9b8e1e051c3acb0c

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java Development Kit\Reference Documentation.lnk

                Filesize

                197B

                MD5

                b5e1de7d05841796c6d96dfe5b8b338c

                SHA1

                c7c64e5b35d0cca1a5c98a1c68e1e5d4c8b72547

                SHA256

                062cb9dec2b2ce02c633fc442d1a23e910e602548a54a54c8310b0dde9ae074d

                SHA512

                963a89b04f34bc00fea5b8e0f9648596c428beac2db30d8b0932974b15c0eb90b7c801ba6fa1082ea9d133258f393ae27e61f27fd3b3951f5c2e4b8c6a212c2d

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Get Help.url

                Filesize

                177B

                MD5

                6684bd30905590fb5053b97bfce355bc

                SHA1

                41f6b2b3d719bc36743037ae2896c3d5674e8af7

                SHA256

                aa4868d35b6b3390752a5e34ab8e5cba90217e920b8fb8a0f8e46edc1cc95a20

                SHA512

                1748ab352ba2af943a9cd60724c4c34b46f3c1e6112df0c373fa9ba8cb956eb548049a0ac0f4dccff6b5f243ff2d6d210661f0c77b9e1e3d241a404b86d54644

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Visit Java.com.url

                Filesize

                160B

                MD5

                62ed33ed45788c600fd57baff9555e7b

                SHA1

                0e8ec983de468f506695480a0a62223a8645e694

                SHA256

                1305d513bdd452931512e0027a7464dce822c3d72ec4353a2c3b2468ed21f7ec

                SHA512

                304e9847922a287815e0b86385d23c976afeaf409676db287ea19e58ce733874f47d9908aefb17ebb4e8d7f920437836c8d0aecdac0709fbbe49550447f84e78

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                Filesize

                68KB

                MD5

                29f65ba8e88c063813cc50a4ea544e93

                SHA1

                05a7040d5c127e68c25d81cc51271ffb8bef3568

                SHA256

                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                SHA512

                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

                Filesize

                471B

                MD5

                17965f5ac37a3d2a0e07c0d41f7d4196

                SHA1

                b82ccf16459772f471d2fe330dd3376d09bb6eec

                SHA256

                819ce2088812aa36c3ab0ad9884d57ce81db03be13aa1200c9ea6abe06d5f9d1

                SHA512

                0b84bbac81ace00a670ad65cc73edb6cd87234dc795d03263f1d4dacef440fbc424544ab1d3fa97b8766b01b44fdcef92f2ac9b0b258059fc223175b8f497492

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                Filesize

                1KB

                MD5

                a266bb7dcc38a562631361bbf61dd11b

                SHA1

                3b1efd3a66ea28b16697394703a72ca340a05bd5

                SHA256

                df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                SHA512

                0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                98adf1b1fb2f05e2ea7efdca4f583ab0

                SHA1

                904882d4d1ad72de3bb94843229e838eb985eb4c

                SHA256

                ed7adafa0bcf3ae5f32080b9c42601f4cd3a9bedcfe3bd2b71760d66e42cd042

                SHA512

                fd45fead032cd3dc1f3568d0316e0b1b1c9f18ee9f01ae4062486cefc10585ac0006e507213922fdcdea5d64b69532ae1133e2cf4983984e8f8d10eaca2f9f8a

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                82fe2c2f93c28d502f8dd5e2eeb80622

                SHA1

                e9f37ad8072507e1bb7f655caa967ce848331d09

                SHA256

                2e91c6ef34506c69df34bf9d466f7e54988cae9ab8831f305938f161d38cb812

                SHA512

                70f981793795ac5f223a787fe8dc95ee6ea0ac2143b581b80dca5f11c435764cf2261fd18a56b853d1c4627b733ba379d00fa698dce80f20abebd64229ddd173

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                Filesize

                344B

                MD5

                8059ed64d5f88ce5b240d198a945d4d2

                SHA1

                e3e54b7cf532f264fc212a0f5e78c2b1bddd5ebd

                SHA256

                55584dfdb7bd752596a3fe891bd96bacbaea5a69792ac4305c6a1f635a033b73

                SHA512

                e41788c138cbe2372b1ab61679962161e5df8de7855f32757cac280fa5c067639ab93e5ca30eb70daf35391da695a3c78f0c915ee9b8f9db2fa15f885706e767

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

                Filesize

                400B

                MD5

                b6c91e4310fe0856a1bce81ffd7ce72e

                SHA1

                091235d5b259296cd1d6163559f22d3db865fce1

                SHA256

                216b1416d81359759f2fb4e822c294e6c2a1c60f85d11d21f4a6574c03814f8d

                SHA512

                ed1f460493c3c975fcef88077d9c453f04f83243caa39ef5e5e1706934d6142d873dff0ed7f0f6bbd34ea252a952956d7ea93f69ffb86ee060993f9ec49f34be

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                Filesize

                242B

                MD5

                756fcc7baf05d263783cf73086aa56d5

                SHA1

                3ef25de375e12f8cb17b85f4b37c81422147a7de

                SHA256

                2ee4ab5b8bca4708d616dc58cb482a7fe316ef2026bfc8ae23a07c3e70ac3bec

                SHA512

                43d0dd466b904a2e630979f55cb4c69d40b054a8068833148819ffa6c6c370be7aecf9c3366b4c78b535195229e4d817dd440b13d143abbda1e9b8354d81f860

              • C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_401_x64\jre1.8.0_40164.msi

                Filesize

                60.9MB

                MD5

                4b80c230492aedab6757f904167b4e17

                SHA1

                ca169fc089c12341ac8a023e98e5f7d58a1d5d90

                SHA256

                0d961da2bc9f0fe029c31beb616d5069b718abd7f494f28a86fc6ace8e4718ea

                SHA512

                fcfbaa9c987bda1143f2596aca5bb3c04eebbb8ff7cacb9f855ef66d4c1b433a0a07c9694dcaff56f481df0234e8cc833e0c4b66aa52c2541db5fc562a741aca

              • C:\Users\Admin\AppData\Local\Temp\Tar198F.tmp

                Filesize

                177KB

                MD5

                435a9ac180383f9fa094131b173a2f7b

                SHA1

                76944ea657a9db94f9a4bef38f88c46ed4166983

                SHA256

                67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                SHA512

                1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\200.ico

                Filesize

                116KB

                MD5

                e043a9cb014d641a56f50f9d9ac9a1b9

                SHA1

                61dc6aed3d0d1f3b8afe3d161410848c565247ed

                SHA256

                9dd7020d04753294c8fb694ac49f406de9adad45d8cdd43fefd99fec3659e946

                SHA512

                4ae5df94fd590703b7a92f19703d733559d600a3885c65f146db04e8bbf6ead9ab5a1748d99c892e6bde63dd4e1592d6f06e02e4baf5e854c8ce6ea0cce1984f

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\BrowserInstaller.exe

                Filesize

                1.6MB

                MD5

                83a8f0546164c9ba1a248acedefd6e5d

                SHA1

                7652f353ed74015e7e78bc9f9e305a48d336b6d1

                SHA256

                e7c5072ec60d32022b3c818c527ad86f4985837a4f0e9fc6477f54ae86d9f1c9

                SHA512

                111d11acdaef0036ff5cabeb16ed55bf4c681fa6eb3c006af450a0ebadae3e213a8f3abb0f4a9aecc8e893af7a79b4eb7f74a5fc3743e338c3e3136b5d7f9f2d

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG1.BMP

                Filesize

                12KB

                MD5

                3adf5e8387c828f62f12d2dd59349d63

                SHA1

                bd065d74b7fa534e5bfb0fb8fb2ee1f188db9e3a

                SHA256

                1d7a67b1c0d620506ac76da1984449dfb9c35ffa080dc51e439ed45eecaa7ee0

                SHA512

                e4ceb68a0a7d211152d0009cc0ef9b11537cfa8911d6d773c465cea203122f1c83496e655c9654aabe2034161e132de8714f3751d2b448a6a87d5e0dd36625be

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG14.PNG

                Filesize

                43KB

                MD5

                75decfe97d92fa34481d3b502316fd2f

                SHA1

                b98065fcacb2e19cb67eec0bf6f2fce53403b38b

                SHA256

                247a19e724dc8cf8ff5d3dce60fdc12c839e55149670d0366b362d827f7d0a91

                SHA512

                10dfd147f5366143357de272b0f2ff2db517c0a9b6b5da2956b52a5bd141c8d6898d0575d3efec3b146fe194eafa3b8cc968bbc5dcf6776de2d16cb62eb85aea

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG15.PNG

                Filesize

                644B

                MD5

                e9f67b64d881a992b1cfd8e3530cca32

                SHA1

                2a94600e58d1d88e7ddd19419b98c58cb3202be3

                SHA256

                b1b65f3ef3b45ea3d98a19c8b1b2dcc25c54a2a5887525724434ec64d7677089

                SHA512

                0d1bf5b51368132b9bae5510227e15ff9d4c68716b2760950adef49735553f4c721067ee4867255607d492a9f756e5501ea1095dd0ed35b65aba6a7122b16635

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG17.PNG

                Filesize

                40KB

                MD5

                7c707de88ac21b3c96714ec7518a23e3

                SHA1

                c0ad9f5ad7e0584a1734c6c8123883c3c938a3e8

                SHA256

                a4ea28436ddb281bd848406fc8136a15738ff86ebf5f7e1925f69accb97d6dc2

                SHA512

                403fd9ef1071ed76fd25a9d67e8084de0f5954d1864bc49cdfd68b24c6869c5b079f46a11ee086c57f831a61db27394f7b96c5355f0fe111ddc1284971e53ad1

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG2.BMP

                Filesize

                12KB

                MD5

                f35117734829b05cfceaa7e39b2b61fb

                SHA1

                342ae5f530dce669fedaca053bd15b47e755adc2

                SHA256

                9c893fe1ab940ee4c2424aa9dd9972e7ad3198da670006263ecbbb5106d881e3

                SHA512

                1805b376ab7aae87061e9b3f586e9fdef942bb32488b388856d8a96e15871238882928c75489994f9916a77e2c61c6f6629e37d1d872721d19a5d4de3e77f471

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG3.BMP

                Filesize

                12KB

                MD5

                f5d6a81635291e408332cc01c565068f

                SHA1

                72fa5c8111e95cc7c5e97a09d1376f0619be111b

                SHA256

                4c85cdddd497ad81fedb090bc0f8d69b54106c226063fdc1795ada7d8dc74e26

                SHA512

                33333761706c069d2c1396e85333f759549b1dfc94674abb612fd4e5336b1c4877844270a8126e833d0617e6780dd8a4fee2d380c16de8cbf475b23f9d512b5a

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG9.PNG

                Filesize

                438B

                MD5

                121558ff4a60cbdd63a2c563f64e3a8d

                SHA1

                c5a58189193a6dd14ecea5e8f9abfa534182afab

                SHA256

                57e4e472dd3e5a8d82a63b607d79e9d96ed42c69bca5d3f9aa4b1a338ff7318c

                SHA512

                36b2366bd1fa8597c20ff43b041c5dc1c62183ba536dea31ca1125cc1f99ff1dcb7e907959d6f0672e57ed82be585615ceaa6b963a8b5e540510d329c610a267

              • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.dat

                Filesize

                136KB

                MD5

                1ffd93751bc3400074dc0affa49ddfaf

                SHA1

                81be618514bdb88161333386f326cfcac2075517

                SHA256

                e65cc17886b8632c1ff12ff8a97128d3ca379a6b9ad2c0300788f43958c458be

                SHA512

                b2aefcf3a2f3e4da57c3507f7b419d229985cee88c782232dd90a96a6e9dbe46c18a7a58c7c4d1a3fe4b8b4b187f884fa09ac9e9a70d179e941704d7cbfddb30

              • C:\Users\Admin\AppData\Local\Temp\jds259430863.tmp\jre-windows.exe

                Filesize

                64.0MB

                MD5

                96d622d62567def49ad8999324a66709

                SHA1

                5a4749631631d97e9db816f5cca2392e69d0b7d9

                SHA256

                953b06705f72bfffac774c41ceb359fe1d3f8a0c5d6a44f93597ce9c39399994

                SHA512

                c2d350895f47c5164138d2e3befbeb0acda8097a7904a28d9ad9db70ea0aabb3ec54a476dcb2746a41308fb79616d810305c53f7e23a4856a3f9eb656896de0d

              • C:\Users\Admin\AppData\Local\Temp\jusched.log

                Filesize

                3KB

                MD5

                5c828e989fead49e07c8d457a91d5430

                SHA1

                7f3d22b0c4b91106928093276622524175812d03

                SHA256

                4f929e04f0c160defa83893066427c0f165e5c76261c257c598216ebcc3ed456

                SHA512

                0c7cdccceb589baeff68d8534611ffebdabde95cdb8e63cb95c7bd00d7472d96defc2105acf9b5dbf04d6c53a7d93f9c50e25341a1e584a665fdc54a685c24c2

              • C:\Users\Admin\AppData\Local\Temp\jusched.log

                Filesize

                5KB

                MD5

                b9b4077242860e1e6caf3859cd3ba66c

                SHA1

                8f4a72bb602f403572ed1ae2288e965307c18308

                SHA256

                36c5c399d3cf63ae38da73ecbebec9f5b77db4fe1cf40c70902cfa622e4db9db

                SHA512

                71b4ac984ef4978f4e05f79cef383251a692c3ea4191a9f055f3aa9f0c36a9352e6e7c38e87e8c17f96626e25ec3ef18a783b9ddbb895075b1d650667e0400f4

              • C:\Users\Admin\AppData\Local\Temp\jusched.log

                Filesize

                52KB

                MD5

                d5892a2b71d779c9ca2f8c65657f57d0

                SHA1

                d15b253693caec79d0bd92c4eed4bd5e706a94fd

                SHA256

                79a2fc298a551521a6801febf602a1ffe39853972ae4f26ebed289c8f02ae0f9

                SHA512

                e3dab487b47c683ec19fba27ba52c37e52ece22119a90d773ed7af6291a2324810dfc5baa1d503fd3a055e00f73e42aa89c674af1204704ca21aa28f819ad35c

              • C:\Users\Admin\AppData\Local\Temp\setuparguments.ini

                Filesize

                741B

                MD5

                390e3528cc96e591b57b8e3d367fb329

                SHA1

                dced322bbc44700fe664d645fc9824624a3160be

                SHA256

                6695dfad09c47dc004be8cd16e6dfe5ef8239b36f7f3df2b1631917b8afbed20

                SHA512

                0dd831a5c273caa286deb34c10865867e00e723d5b556ee7d60d50466838ef9540c125ded5d3f09f23c3f2328dacd0ea795c3de90f0b596989dd0306a9e3c394

              • C:\Users\Admin\AppData\Roaming\.minecraft\TLauncher.exe

                Filesize

                9.1MB

                MD5

                4f7fa4dee62924a4fd3b726cc150c256

                SHA1

                684319e7c90f8101980c88e9b327eaf3e00c3aa1

                SHA256

                16ee6b2cb0ad4b9e862bc8511dc916c6fcfa3e1898e4f8d96ee3ce98a1e84401

                SHA512

                a3a38b96e7376d083edeef681a5eec21baee2e736547840ed6e41397f85c917e25c57d9201df9fdc9c0140a7fac4cf775d7af2d218646cd921d5b468b21a1c66

              • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG1.PNG

                Filesize

                45KB

                MD5

                300bf5341502ba7eee93c2b16c63af7a

                SHA1

                c0b30be839455dfe2f514c07c52dd085392bb022

                SHA256

                046d24487296987dd7126d52df2bcf36040bb573f8fa695018e255b48200f7b2

                SHA512

                7720d9e1b94bcd4480100d430bb103d332214b7062212a33e066e60457659645251b86c1e331b1afd872ac5cae1835b826c94f9400c56bc40fd43ba1c4daa6a7

              • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG10.PNG

                Filesize

                206B

                MD5

                e5d58eadbf836dd10e686eebc3a5be5c

                SHA1

                d1ca91793d766019ddb08e92e8734b0dcc866c46

                SHA256

                1d55e1a2619072c43fde1846479bdf096de360fe157939569965e75bebd1a4b2

                SHA512

                c52187077ef449bcd85424cd629390752998e4fc492dbe22ad3a9ec1b757e68d2901d491dffdfaed1269f8c8022adafa3987c4c2b55428262d0dc9052b6ce60d

              • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG13.PNG

                Filesize

                41KB

                MD5

                44b7f88f828cb198ef4d3bb74c491da9

                SHA1

                e152b950eae01d9f8a3255bfc1576f63239d73ea

                SHA256

                4f0d9bddf74090d9deaf5fa332e93ce98ab673ca9d4a7ae722a8641bfb572c2f

                SHA512

                9d97e8d8e93112f93d21428fbb8170d699973bcb28604b49541c0f20d6b0b803fcc9bb4ce0c55f03912675c08963d33490c0dabc9bba9524f2d6bc224e95ec78

              • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG3.PNG

                Filesize

                475B

                MD5

                ff54bcac65743e803865f43f041284b2

                SHA1

                4ab743a7d2a0a9a5237c1d503f134339e4d31f7a

                SHA256

                c0506574d1b5b01f7906fd8c6baf99e9631f6a204d1ab5b8c5bd8f6bbd907743

                SHA512

                3b21c743ffdec316597c143cd293bb98fb58da911ba9af5c1df8e602082b75b131ec3d8bb3b07d89bbe589f3e062fbe1bb70e57176ee1de10bfc5f30b76f63c6

              • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG4.PNG

                Filesize

                368B

                MD5

                9a922807c184a7f18f808735ac851f3b

                SHA1

                142c5e76464e31ce99795f0126e284c25d11040c

                SHA256

                a576357ae47d4bb1aa07fb6a503c1f88e55467c97275e85f48792c0351f7e408

                SHA512

                38f2c9c5881ba07fccebcef28c5a7b75b72fea8d30e7049b62142868c803be6e01409d8bd6e371c5bb6188eef505e268274894a9a8ebd65053f35f8d53f1ed3a

              • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\uninstall.xml

                Filesize

                18KB

                MD5

                28491631d1231ae19400403b5c0b94ea

                SHA1

                a82a23096907f4816bd70a0317329fdf5d31af24

                SHA256

                7f411676c07c5c4a5ca8cfde36f0313d2b8c3d6535b47f8391135eb7c59c4231

                SHA512

                61248d3fb8458742ca32a428af9d3ec5340192d18e74af1ff3c5d4740b518f892ac6539c9960711d8bd5f2af7e3b76d50f43bfdd6cd18b7e0305809f45fdba34

              • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\uninstall.xml

                Filesize

                4KB

                MD5

                714b278dfe83d88edaf8ed94f5d143e3

                SHA1

                f589e54df9b91be010dc7a99502afad5a2ddb1a9

                SHA256

                10dad5e5de70ac93cd78dbc5287deb8bd3d1eee2beccc97cdf4f3e4e59409c42

                SHA512

                3262357f3aef6e76827a124e28a9429f9cf5c6efbaa26705299a368542bc0396203bafa71a9e93c4cfd993e7e79ef0589a2fd9ebbc39d149eef0b0d6fd0cbe0d

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7QVKD5JE.txt

                Filesize

                867B

                MD5

                522be6bb60f1204436764b828ddc4d70

                SHA1

                e1edb8ec72f5b9221319d00f119a0c000907fd75

                SHA256

                9a328e018f72e348b68d7adc5472a3e6777d8911dfa462380c51047fc10c0bca

                SHA512

                d41d7fc9ec93136ecc822715fe74c7fe03ba99b53cba0e5bd848105622f5b6dc0f53139a66fbb24d4dc63718bd93f61b18b61666f951acb1fd5207c549eb0283

              • \Program Files\Java\jre-1.8\bin\javaw.exe

                Filesize

                285KB

                MD5

                122e34bfa3146ef9ae5a51fdc744353f

                SHA1

                f0cc2294fe150a4cceca8a3da8615edcc4eb20e4

                SHA256

                dd2169db3358ccdf4a4a185e4a22955c989eaa3b9d3e0e6025599b8fa173c968

                SHA512

                306341e00598f02a70d3edc6ef666cb64982f1e31e5c0a1304977a1700c95395c1c7f0857ae8056853370eced0bd2aeafc72da804a65f98c1422929b7c431700

              • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRZip.lmd

                Filesize

                1.7MB

                MD5

                dabd469bae99f6f2ada08cd2dd3139c3

                SHA1

                6714e8be7937f7b1be5f7d9bef9cc9c6da0d9e9b

                SHA256

                89acf7a60e1d3f2bd7804c0cd65f8c90d52606d2a66906c8f31dce2e0ea66606

                SHA512

                9c5fd1c8f00c78a6f4fd77b75efae892d1cb6baa2e71d89389c659d7c6f8b827b99cecadb0d56c690dd7b26849c6f237af9db3d1a52ae8531d67635b5eff5915

              • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\Wow64.lmd

                Filesize

                97KB

                MD5

                da1d0cd400e0b6ad6415fd4d90f69666

                SHA1

                de9083d2902906cacf57259cf581b1466400b799

                SHA256

                7a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575

                SHA512

                f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a

              • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

                Filesize

                1.2MB

                MD5

                85772cc6142fd068e316f5bcdfb9fa18

                SHA1

                2b6169f71860685189abef7c46a271b43a6af36b

                SHA256

                b5e561a9e6aa55cdde55a182aa753b726dd9ce299d1734824ea4ef4f0a1775a8

                SHA512

                0f03c69813b366ee352c5fc0209fe4a7dc257230f82afdda75d97d7676ff1abf30bc09cb900ce28916e9ee07e5b9f850c4f3ec803c0d23cd572ffee928d0418d

              • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

                Filesize

                325KB

                MD5

                c333af59fa9f0b12d1cd9f6bba111e3a

                SHA1

                66ae1d42b2de0d620fe0b7cc6e1c718c6c579ed0

                SHA256

                fad540071986c59ec40102c9ca9518a0ddce80cf39eb2fd476bb1a7a03d6eb34

                SHA512

                2f7e2e53ba1cb9ff38e580da20d6004900494ff7b7ae0ced73c330fae95320cf0ab79278e7434272e469cb4ea2cbbd5198d2cd305dc4b75935e1ca686c6c7ff4

              • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe

                Filesize

                1.2MB

                MD5

                a266e0ae1001da0023f9664afbcaee99

                SHA1

                f943c180e5221a5943039c21b21f394dd99cbe14

                SHA256

                819b9a02a788445ad6c4d8f38e05abe911e289e71e4d2c2e37923c9f66f576cf

                SHA512

                525b8473b17732ba94942df63b0e43b26ee0157b137a1a39f52034b04ce686097e92ec8d9ea422acf02edc4385863c0179a6af73af01dfcfc1cb6d7c9dad1e7c

              • \Users\Admin\AppData\Local\Temp\jre-windows.exe

                Filesize

                64.4MB

                MD5

                af1d24091758f1e02d51dc5f5297c932

                SHA1

                dc3f98dded6c1f1e363db6752c512e01ac9433f3

                SHA256

                e52a8d0337bae656b01cb76c03975ac3d75ac4984c028ba2a6531396dea6dddd

                SHA512

                8d4264a6b17f7bbfd533b11ec30d7754a960a9f2fbef10c9977b620051c5538d8eb6080ea78e070904c7c52a6ce998736fad2037f6389ad4c5c0ce3f1d09e756

              • \Windows\Installer\MSIB1B9.tmp

                Filesize

                953KB

                MD5

                64a261a6056e5d2396e3eb6651134bee

                SHA1

                32a34baf051b514f12b3e3733f70e608083500f9

                SHA256

                15c1007015be7356e422050ed6fa39ba836d0dd7fbf1aa7d2b823e6754c442a0

                SHA512

                d3f95e0c8b5d76b10b61b0ef1453f8d90af90f97848cad3cb22f73878a3c48ea0132ecc300bfb79d2801500d5390e5962fb86a853695d4f661b9ea9aae6b8be8

              • memory/380-2289-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/380-2324-0x0000000002920000-0x0000000003920000-memory.dmp

                Filesize

                16.0MB

              • memory/380-2303-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/380-2298-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/380-2295-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/380-2288-0x0000000002920000-0x0000000003920000-memory.dmp

                Filesize

                16.0MB

              • memory/380-2284-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/380-2283-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/380-2275-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/380-2265-0x0000000000140000-0x0000000000141000-memory.dmp

                Filesize

                4KB

              • memory/488-2028-0x00000000026B0000-0x00000000036B0000-memory.dmp

                Filesize

                16.0MB

              • memory/488-2029-0x0000000000130000-0x0000000000131000-memory.dmp

                Filesize

                4KB

              • memory/636-2411-0x000007FFFFF70000-0x000007FFFFF80000-memory.dmp

                Filesize

                64KB

              • memory/704-2217-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2222-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2237-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2236-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2233-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2232-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2206-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2213-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2224-0x0000000000350000-0x0000000000351000-memory.dmp

                Filesize

                4KB

              • memory/704-2223-0x00000000027D0000-0x00000000037D0000-memory.dmp

                Filesize

                16.0MB

              • memory/804-1403-0x0000000010000000-0x0000000010051000-memory.dmp

                Filesize

                324KB

              • memory/804-708-0x0000000000CA0000-0x0000000001089000-memory.dmp

                Filesize

                3.9MB

              • memory/804-2227-0x0000000010000000-0x0000000010051000-memory.dmp

                Filesize

                324KB

              • memory/804-2189-0x0000000000CA0000-0x0000000001089000-memory.dmp

                Filesize

                3.9MB

              • memory/804-19-0x0000000000CA0000-0x0000000001089000-memory.dmp

                Filesize

                3.9MB

              • memory/804-601-0x0000000010000000-0x0000000010051000-memory.dmp

                Filesize

                324KB

              • memory/804-602-0x0000000000940000-0x0000000000943000-memory.dmp

                Filesize

                12KB

              • memory/804-1401-0x0000000002F10000-0x0000000002F20000-memory.dmp

                Filesize

                64KB

              • memory/804-723-0x0000000002F10000-0x0000000002F20000-memory.dmp

                Filesize

                64KB

              • memory/804-718-0x0000000010000000-0x0000000010051000-memory.dmp

                Filesize

                324KB

              • memory/804-1364-0x0000000000CA0000-0x0000000001089000-memory.dmp

                Filesize

                3.9MB

              • memory/804-1360-0x0000000000CA0000-0x0000000001089000-memory.dmp

                Filesize

                3.9MB

              • memory/804-1561-0x0000000000CA0000-0x0000000001089000-memory.dmp

                Filesize

                3.9MB

              • memory/804-1402-0x0000000000CA0000-0x0000000001089000-memory.dmp

                Filesize

                3.9MB

              • memory/1716-817-0x0000000000EA0000-0x0000000001289000-memory.dmp

                Filesize

                3.9MB

              • memory/1716-751-0x0000000000EA0000-0x0000000001289000-memory.dmp

                Filesize

                3.9MB

              • memory/2236-727-0x0000000003400000-0x00000000037E9000-memory.dmp

                Filesize

                3.9MB

              • memory/2356-18-0x00000000033D0000-0x00000000037B9000-memory.dmp

                Filesize

                3.9MB

              • memory/2356-822-0x00000000033D0000-0x00000000037B9000-memory.dmp

                Filesize

                3.9MB

              • memory/2356-5-0x00000000033D0000-0x00000000037B9000-memory.dmp

                Filesize

                3.9MB