Analysis

  • max time kernel
    101s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/04/2024, 17:30

General

  • Target

    TLauncher-Installer-1.3.5.exe

  • Size

    23.0MB

  • MD5

    1a2ce8f6f111d438d4467a84d8c74351

  • SHA1

    6f2b6d316eb820ae6875b84df9615e412ae0773a

  • SHA256

    9aaa326da7ca2d0d7015742e3ffe5bce7df63cae147166e52f094a1c20897856

  • SHA512

    8f276c77a73f4035513d463be939e056a67cfcfb28df078b7e63a3f524a5c66d02128ac6a267e84226dfc2916ae74d0f945a12f7326fa89fa97070329d828193

  • SSDEEP

    393216:y25KVUfIscQ5+LTc2rr6of5MJ7ZWqxPAIgtMIMlFRqUX0OT2Hx8HcAobUAKN+:jKVaIsN+LtrrKJBH5lFRq0RD1obUAK0

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Blocklisted process makes network request 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TLauncher-Installer-1.3.5.exe
    "C:\Users\Admin\AppData\Local\Temp\TLauncher-Installer-1.3.5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe
      "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1773458 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\TLauncher-Installer-1.3.5.exe" "__IRCT:3" "__IRTSS:24068259" "__IRSID:S-1-5-21-3627615824-4061627003-3019543961-1000"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Users\Admin\AppData\Local\Temp\BrowserInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\BrowserInstaller.exe" /NOINIT /S:C:\Users\Admin\AppData\Local\Temp\setuparguments.ini
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe
          "C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe" /NOINIT /S:C:\Users\Admin\AppData\Local\Temp\setuparguments.ini __IRAOFF:1679762 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\BrowserInstaller.exe" "__IRCT:3" "__IRTSS:1708464" "__IRSID:S-1-5-21-3627615824-4061627003-3019543961-1000"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2480
      • C:\Users\Admin\AppData\Local\Temp\jre-windows.exe
        "C:\Users\Admin\AppData\Local\Temp\jre-windows.exe" STATIC=1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Users\Admin\AppData\Local\Temp\jds259481642.tmp\jre-windows.exe
          "C:\Users\Admin\AppData\Local\Temp\jds259481642.tmp\jre-windows.exe" "STATIC=1"
          4⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1588
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Loads dropped DLL
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 965E5771241C20D0A5DC471729B70027
      2⤵
      • Loads dropped DLL
      PID:1696
    • C:\Program Files\Java\jre-1.8\installer.exe
      "C:\Program Files\Java\jre-1.8\installer.exe" /s INSTALLDIR="C:\Program Files\Java\jre-1.8\\" STATIC=1 INSTALL_SILENT=1 REPAIRMODE=0 ProductCode={71024AE4-039E-4CA4-87B4-2F64180401F0}
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Registers COM server for autorun
      • Installs/modifies Browser Helper Object
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Xshare:dump -Djdk.disableLastUsageTracking
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1056
      • C:\Program Files\Java\jre-1.8\bin\ssvagent.exe
        "C:\Program Files\Java\jre-1.8\bin\ssvagent.exe" -doHKCUSSVSetup
        3⤵
          PID:2804
        • C:\Program Files\Java\jre-1.8\bin\javaws.exe
          "C:\Program Files\Java\jre-1.8\bin\javaws.exe" -wait -fix -permissions -silent
          3⤵
            PID:2720
            • C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe
              "C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre-1.8" -vma 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 -ma LXdhaXQALWZpeAAtcGVybWlzc2lvbnMALXNpbGVudAAtbm90V2ViSmF2YQ==
              4⤵
                PID:2876
            • C:\Program Files\Java\jre-1.8\bin\javaws.exe
              "C:\Program Files\Java\jre-1.8\bin\javaws.exe" -wait -fix -shortcut -silent
              3⤵
                PID:764
                • C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe
                  "C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre-1.8" -vma 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 -ma LXdhaXQALWZpeAAtc2hvcnRjdXQALXNpbGVudAAtbm90V2ViSmF2YQ==
                  4⤵
                    PID:1760

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java Development Kit\Reference Documentation.lnk

              Filesize

              197B

              MD5

              b5e1de7d05841796c6d96dfe5b8b338c

              SHA1

              c7c64e5b35d0cca1a5c98a1c68e1e5d4c8b72547

              SHA256

              062cb9dec2b2ce02c633fc442d1a23e910e602548a54a54c8310b0dde9ae074d

              SHA512

              963a89b04f34bc00fea5b8e0f9648596c428beac2db30d8b0932974b15c0eb90b7c801ba6fa1082ea9d133258f393ae27e61f27fd3b3951f5c2e4b8c6a212c2d

            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Get Help.url

              Filesize

              177B

              MD5

              6684bd30905590fb5053b97bfce355bc

              SHA1

              41f6b2b3d719bc36743037ae2896c3d5674e8af7

              SHA256

              aa4868d35b6b3390752a5e34ab8e5cba90217e920b8fb8a0f8e46edc1cc95a20

              SHA512

              1748ab352ba2af943a9cd60724c4c34b46f3c1e6112df0c373fa9ba8cb956eb548049a0ac0f4dccff6b5f243ff2d6d210661f0c77b9e1e3d241a404b86d54644

            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java\Visit Java.com.url

              Filesize

              173B

              MD5

              625bd85c8b8661c2d42626fc892ee663

              SHA1

              86c29abb8b229f2d982df62119a23976a15996d9

              SHA256

              63c2e3467e162e24664b3de62d8eeb6a290a8ffcdf315d90e6ca14248bc0a13a

              SHA512

              07708de888204e698f72d8a8778ed504e0fe4d159191efb48b815852e3997b50a27ba0bc8d9586c6fb4844166f38f5f9026a89bbbc3627e78121373982656f12

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

              Filesize

              471B

              MD5

              62aea9fccdf7e4ee5f34ccc6fba42912

              SHA1

              34f8ab6d173b8d9b6a3e197c2877ee00261a65c5

              SHA256

              7e1555e09386d8c45dc2d028b539a253654f357230731e7550a38e18c94c646f

              SHA512

              b6797fc140701183e714c313571a17551e5423427831ff946c27c20bfc56eade9ae299a1c9476d1bc52da97bc004ddc5341eeb9e7f02625938327c5ee84d374a

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

              Filesize

              1KB

              MD5

              a266bb7dcc38a562631361bbf61dd11b

              SHA1

              3b1efd3a66ea28b16697394703a72ca340a05bd5

              SHA256

              df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

              SHA512

              0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              6e9c4cd9e9b0ed3f44b6695a65a5a618

              SHA1

              095edc1d6ec6889b670f97b39a02d2512d869166

              SHA256

              6778832cc78d974bce52334e3826d635d62ef6781175779466225f7b58043d15

              SHA512

              f25f49770480f97b56d3c06103c257ec0482d3dd0bbd6b8b343b89044c94870a3b3f71cd4df2bda83bf6ab03aa160938fed1f33b7443fdccfb5ac237c4b5dc41

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              b21e45a092907b9d298e64bfce7d2861

              SHA1

              b3575d45a5eb3e2a65630daf24a0f370724181fc

              SHA256

              3e7d392f1aa780c02674871e30aad7fa1a1bc1c08c4d274ad54e740442959898

              SHA512

              d5e114dc94ee294f1b2398b4b7289e87c0910b43fac33631795bed2fc816b3044d2e0abd210ca58ae928d955081ffdb2dafd712de6864151774b04abbc566952

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              ef71370c809e865dba5c78758e1852d4

              SHA1

              0ff2ef827ae658a1517957748e83ab7e65189560

              SHA256

              33cbe05c4ce9642bd17da9fa0bcf0bcbf3202b846877f52e14f5d755a7a6347f

              SHA512

              61b7ad5c3611aeccdfa65aa6694cfcbb67f6069f62c466c3fc4440c4e0e4e073cd0ed5a1cbfa0aa54b71e9c92bdc107b1813329092268523226e5bc20657ed58

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

              Filesize

              400B

              MD5

              3ce03e374e651b27f2542459afafbf39

              SHA1

              20ea9b70797dd5f3e1102ed889b2a1580a9cbc0a

              SHA256

              a94554efb1af1279439a57331f0df71f559df5631161f929ceffc22c1c037661

              SHA512

              7b8ff1581a060cfea042a4f97b77566711560ff525adf9d723643d45b9cd0ffb68cb234be508343d78ba2d39697edab5c03e7a3b05815eafec10e16de5316e4e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

              Filesize

              242B

              MD5

              003ace5b3dc2297939b40c2f04dd11dd

              SHA1

              10b56e9dc842385dea39b335a909816a16869052

              SHA256

              459ae133a3d89ab29b72b20f5d1ff666dd783b4de4f07c00a8dc04eddfd4f6e7

              SHA512

              dc8c256d17922b10feab875fdbe7ca3f54f0e8deb48a64c04090b08cb0c6cb617579cab76eb478d631844c28c2e3cce72425039036ee3b160652bbd8dd2a856e

            • C:\Users\Admin\AppData\LocalLow\Oracle\Java\jre1.8.0_401_x64\jre1.8.0_40164.msi

              Filesize

              60.9MB

              MD5

              4b80c230492aedab6757f904167b4e17

              SHA1

              ca169fc089c12341ac8a023e98e5f7d58a1d5d90

              SHA256

              0d961da2bc9f0fe029c31beb616d5069b718abd7f494f28a86fc6ace8e4718ea

              SHA512

              fcfbaa9c987bda1143f2596aca5bb3c04eebbb8ff7cacb9f855ef66d4c1b433a0a07c9694dcaff56f481df0234e8cc833e0c4b66aa52c2541db5fc562a741aca

            • C:\Users\Admin\AppData\Local\Temp\Tar22C3.tmp

              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\200.ico

              Filesize

              116KB

              MD5

              e043a9cb014d641a56f50f9d9ac9a1b9

              SHA1

              61dc6aed3d0d1f3b8afe3d161410848c565247ed

              SHA256

              9dd7020d04753294c8fb694ac49f406de9adad45d8cdd43fefd99fec3659e946

              SHA512

              4ae5df94fd590703b7a92f19703d733559d600a3885c65f146db04e8bbf6ead9ab5a1748d99c892e6bde63dd4e1592d6f06e02e4baf5e854c8ce6ea0cce1984f

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\BrowserInstaller.exe

              Filesize

              1.6MB

              MD5

              83a8f0546164c9ba1a248acedefd6e5d

              SHA1

              7652f353ed74015e7e78bc9f9e305a48d336b6d1

              SHA256

              e7c5072ec60d32022b3c818c527ad86f4985837a4f0e9fc6477f54ae86d9f1c9

              SHA512

              111d11acdaef0036ff5cabeb16ed55bf4c681fa6eb3c006af450a0ebadae3e213a8f3abb0f4a9aecc8e893af7a79b4eb7f74a5fc3743e338c3e3136b5d7f9f2d

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG1.BMP

              Filesize

              12KB

              MD5

              3adf5e8387c828f62f12d2dd59349d63

              SHA1

              bd065d74b7fa534e5bfb0fb8fb2ee1f188db9e3a

              SHA256

              1d7a67b1c0d620506ac76da1984449dfb9c35ffa080dc51e439ed45eecaa7ee0

              SHA512

              e4ceb68a0a7d211152d0009cc0ef9b11537cfa8911d6d773c465cea203122f1c83496e655c9654aabe2034161e132de8714f3751d2b448a6a87d5e0dd36625be

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG14.PNG

              Filesize

              43KB

              MD5

              7d26a524b09feacb9db695415e1a66b2

              SHA1

              724f925c2663b623a9755bf722b3f297c8ff605a

              SHA256

              867072872533f9000508dafdd49f5b83e03de7b611b454290e062034a423dc74

              SHA512

              6adae2bb7c7e390f5e50df048fb3417c31b025c4d32abcb97ef8206ae3f0769997650cdba178bbad8c34f07a4e613666388e4b9bc465549b47a8f01f0dec4a57

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG15.PNG

              Filesize

              644B

              MD5

              859d53eb6f971993774da3bccee533a4

              SHA1

              c51f8e6a9cbd749b77edfeb324ef18ffdfc8e4fc

              SHA256

              768c5aa62161f6ddcab82911e727bf7d902c8d3d24d7c62726542b32ae70f3e7

              SHA512

              5e2f6cd3ffd37a02b5d198046e422bd7c19acca91675a6c38f58d0a985dcc640aedbdab969df9afbc8be6367df071d8e77663c42d5529d9c798602e6c97d246c

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG2.BMP

              Filesize

              12KB

              MD5

              f35117734829b05cfceaa7e39b2b61fb

              SHA1

              342ae5f530dce669fedaca053bd15b47e755adc2

              SHA256

              9c893fe1ab940ee4c2424aa9dd9972e7ad3198da670006263ecbbb5106d881e3

              SHA512

              1805b376ab7aae87061e9b3f586e9fdef942bb32488b388856d8a96e15871238882928c75489994f9916a77e2c61c6f6629e37d1d872721d19a5d4de3e77f471

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG3.BMP

              Filesize

              12KB

              MD5

              f5d6a81635291e408332cc01c565068f

              SHA1

              72fa5c8111e95cc7c5e97a09d1376f0619be111b

              SHA256

              4c85cdddd497ad81fedb090bc0f8d69b54106c226063fdc1795ada7d8dc74e26

              SHA512

              33333761706c069d2c1396e85333f759549b1dfc94674abb612fd4e5336b1c4877844270a8126e833d0617e6780dd8a4fee2d380c16de8cbf475b23f9d512b5a

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRIMG9.PNG

              Filesize

              438B

              MD5

              b7b32e3aeb677124b236d776ef443489

              SHA1

              3249a596e03148836131988b8ca9392f677a7470

              SHA256

              f60847a54bde74835d80bb41bc3c57ad211ca30d69c2eb48ef7bffc7c6b44d0c

              SHA512

              f9044d9da82099a0747b3de0382db0999a9f80cbfe894ed9c4961498c41c5db9055c32d699424b6c5835230a2d74df491151beb90f0ff959b580164b2defab2a

            • C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.dat

              Filesize

              136KB

              MD5

              1ffd93751bc3400074dc0affa49ddfaf

              SHA1

              81be618514bdb88161333386f326cfcac2075517

              SHA256

              e65cc17886b8632c1ff12ff8a97128d3ca379a6b9ad2c0300788f43958c458be

              SHA512

              b2aefcf3a2f3e4da57c3507f7b419d229985cee88c782232dd90a96a6e9dbe46c18a7a58c7c4d1a3fe4b8b4b187f884fa09ac9e9a70d179e941704d7cbfddb30

            • C:\Users\Admin\AppData\Local\Temp\jds259481642.tmp\jre-windows.exe

              Filesize

              64.0MB

              MD5

              96d622d62567def49ad8999324a66709

              SHA1

              5a4749631631d97e9db816f5cca2392e69d0b7d9

              SHA256

              953b06705f72bfffac774c41ceb359fe1d3f8a0c5d6a44f93597ce9c39399994

              SHA512

              c2d350895f47c5164138d2e3befbeb0acda8097a7904a28d9ad9db70ea0aabb3ec54a476dcb2746a41308fb79616d810305c53f7e23a4856a3f9eb656896de0d

            • C:\Users\Admin\AppData\Local\Temp\jusched.log

              Filesize

              3KB

              MD5

              f5885e284ad42a888e788cb2aacead24

              SHA1

              309979cb7fdd32ff4f76bec8fd972cafb8102f7d

              SHA256

              a9e4a6fc7e1afcace83969cc5b9cf6a48e3dffdd4ba39a348731417fd655d4bd

              SHA512

              e7023b69efdc042cacf54ff4f28be7d05d17ed531335b757bbf1f1165dc93088a8c7bf4689260cb3762833cc94502c6a2eb3b3ce0ece705d911e7dff3a3b1590

            • C:\Users\Admin\AppData\Local\Temp\jusched.log

              Filesize

              4KB

              MD5

              ff94863ceec8adfded1da480720c6e87

              SHA1

              cc8d87e7cd0b076c4dd9c417b52125aafc5fbcf2

              SHA256

              3416237a0ca5a69a8da4405ab9f9595babc0f56ce39fb731437235eefd221065

              SHA512

              6826c406150c8c857fc8f50236f30b28cfb98118b01c125dd69397dd757c978460818c061279636ad83a02f40a9961a139c2a069c51cb558726c878015120790

            • C:\Users\Admin\AppData\Local\Temp\jusched.log

              Filesize

              23KB

              MD5

              5a5c9cd67ea526efdb65e150937f0b0b

              SHA1

              f37b08f6f4679cfab3f8d804179dab4d7215f8f4

              SHA256

              8a2e15d42fa3215042d00cc6ed09b3471190c77977d7764ffc6c32c9ea9769ae

              SHA512

              c25b7e063616729858446bef6eaa69bd3d47f7d61ce7f767fdbfcc81cce4acbe2ce5b7057957708090511e1759f3a3b4ebb8b8b381b75cb580bc61c7129c9752

            • C:\Users\Admin\AppData\Local\Temp\setuparguments.ini

              Filesize

              741B

              MD5

              d7017546b65b37ce6e646f486c54a6a2

              SHA1

              734e5ae6b4431a127b013617ba2a2b089f9d4482

              SHA256

              9115a362fa3fc608a47cfd6b6f58d0a4d09e199df8e124fa85acc0b69a6a8b87

              SHA512

              dca0c3bf90e36cca2c54016a6aadb66723b004a97dd09e2a3f500761f7ed311b7a6ff6cdd267bcb777316a676b96f1ece8f3fe2c7101765a3bc24080c943aaab

            • C:\Users\Admin\AppData\Roaming\.minecraft\TLauncher.exe

              Filesize

              9.1MB

              MD5

              fa9848f3cff6d80b5704c6d2ccb10c2b

              SHA1

              714c93f3fc2b915efae0cac6028d317711d59264

              SHA256

              63ff7897d3a90de887c1baebb2ef7b87e596f1749e07322090786c902bdd8d16

              SHA512

              9078f5e3583a2b2cd43f63f023908f652a4c6eb647b1bd8988d33e8f2f1d34d44192ce50b795ffd9764d94a343bdc2ecdb94483ceef79739a92ff8d6a0f9a41b

            • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG1.PNG

              Filesize

              45KB

              MD5

              d1172f72e8fec2b8ddbfe964b7197dd6

              SHA1

              91b86d380b4cf7f3fc6dba2be364551f0194ceab

              SHA256

              a8f33799d6ea706548917b5686b7bd1c6f077fcb344cbd51e9af8d7b4ffbb7d3

              SHA512

              afa1b94831188a4d15314a9c2a7c528e7c748a51030bbf6dfb735de5288f5a5fbcd6db3c275a0346c69dd6e999b50df81c7bf63a0cc5cc5c563c49844d363acb

            • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG10.PNG

              Filesize

              206B

              MD5

              982b81691cac850c2b98b252e4064660

              SHA1

              0c284934268046484921afa55587d863a3a241a3

              SHA256

              3aca81c52680324664bf3128976503ce73931444b956cb3127810661dccd1687

              SHA512

              5be188c92fd6dc8ff014f4f4ff3195edc69edb6142833a42ad49d45807ccb6bc5e7309a91d5a7f822f96f2951872f85d7a48328d123d2df59158af64a15e9f69

            • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG13.PNG

              Filesize

              41KB

              MD5

              2fe88aedf465ed13678cdbc685e44fa0

              SHA1

              624f5a00e7cb017e9bfdfab79f6594a7e02171db

              SHA256

              4351cce19e5189a474a3e5dfba8c1c33e51bd875c1d574e5069b49a752f9f665

              SHA512

              6fbff486e7064d083ba8d12d0bffa102fdd61a3f818bc85516ed12b287b582adfe7d358d6ace18b45978bbafd9d9a1df2e08dde8291cabb35677314e99ab299c

            • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG3.PNG

              Filesize

              475B

              MD5

              b0a5a3db3901023adfc16cff5a381ead

              SHA1

              dfa2662d731eba223ede334a6f875b33e0da964e

              SHA256

              88812d618bc05aea2f43fe26cc7fb24953883418e51d6ca14d6a57fead9b97fd

              SHA512

              8eb6e90e6884b6ae0fdf943f4326d3ecf34eb9cc5e73d87137ffdea7caaf11cbf48bb7571096d7ed1e0de6c5627cddc9e018eeab2bfbe6639b573ac4b5209960

            • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\IRIMG4.PNG

              Filesize

              368B

              MD5

              9d399665b43d4310c637b43ae523da04

              SHA1

              5984f23773322e93fb762168cc1924fdab9cca0b

              SHA256

              c64efebdbee0cba76aa97b61953cfeab0097443bafdddc840feeb81ab0b4f2f7

              SHA512

              b881e136b499b8a32a68273d476daa5b258823cceaccf73740341f2af366458e66e1e91d5da8cf8bb07dd8f67665774caef58f15031c3bcc0a2ddad41d0c6145

            • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\uninstall.xml

              Filesize

              18KB

              MD5

              cbe93431002eb60bd61bd4891b3f1c12

              SHA1

              a32f8cb7d48aa15e711bfa1d465c5a296bb2fe23

              SHA256

              9e9e29429539af91d760038bfbf8454af9dba5790d988992ef039e410badc036

              SHA512

              5da73bd6258909613ec28067bfc14af0ce8df9b0aa0341c88c094c99fadb620fc07d847db040b371c2f6fdcbc67015a84a79bf01b3a3fcc127e675029fc99e27

            • C:\Users\Admin\AppData\Roaming\.tlauncher\Uninstall\uninstall.xml

              Filesize

              4KB

              MD5

              054aecf886611935c82cb961eb3ac31c

              SHA1

              7c79d08bd6cbaa60db2a645ebe542f670dd18fd9

              SHA256

              d92b458492dc534ee4d0ba3c24166164b14955c45329401885f64a2fb8e6ecb3

              SHA512

              0b82aceaec2a2a6528b22639d924cf1b21b5cb43f3a78026c020bed4e170398a5382951c1d043a2b976915aeca6f6f9ddfdc2a1d2ba143c7203b8eaa9f29b656

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VE9PTUA9.txt

              Filesize

              869B

              MD5

              1253feb3b4e6c6432ff1b3b881dd0e9d

              SHA1

              2c84431b6da5cffa484af2604b3c072af4459530

              SHA256

              07301cb3d2d094ed2bdc9f562b395eadf2fca72703b779d60bdf74b14f6fa916

              SHA512

              8cdc643a96b4b00c620c87141c51fcf89a951b69f97ab10dd93a0f4bcc751d3be58b678ee94481f205d6b5d2b8f04e808ffaffa3ee8f38735c04299b088c8da6

            • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\IRZip.lmd

              Filesize

              1.7MB

              MD5

              dabd469bae99f6f2ada08cd2dd3139c3

              SHA1

              6714e8be7937f7b1be5f7d9bef9cc9c6da0d9e9b

              SHA256

              89acf7a60e1d3f2bd7804c0cd65f8c90d52606d2a66906c8f31dce2e0ea66606

              SHA512

              9c5fd1c8f00c78a6f4fd77b75efae892d1cb6baa2e71d89389c659d7c6f8b827b99cecadb0d56c690dd7b26849c6f237af9db3d1a52ae8531d67635b5eff5915

            • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\Wow64.lmd

              Filesize

              97KB

              MD5

              da1d0cd400e0b6ad6415fd4d90f69666

              SHA1

              de9083d2902906cacf57259cf581b1466400b799

              SHA256

              7a79b049bdc3b6e4d101691888360f4f993098f3e3a8beefff4ac367430b1575

              SHA512

              f12f64670f158c2e846e78b7b5d191158268b45ecf3c288f02bbee15ae10c4a62e67fb3481da304ba99da2c68ac44d713a44a458ef359db329b6fef3d323382a

            • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe

              Filesize

              1.2MB

              MD5

              d795ef2a7b1d60d78cf3d4d083346a7c

              SHA1

              68a623b6b821476e543ea8dadb02ee3a78c55762

              SHA256

              c367e0f3b55b16ff6f167f19a3885b9dc7e9e34c0ccdf1df06af5ce7656bd61a

              SHA512

              bbc4161586240074989c56c9abed3bb36cc68516f03a741438a07633c21343a2a3c2ce43d741f83096e28a541ffb58e56c348cf8ebaa3dc91ae8953bb72c1666

            • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll

              Filesize

              325KB

              MD5

              c333af59fa9f0b12d1cd9f6bba111e3a

              SHA1

              66ae1d42b2de0d620fe0b7cc6e1c718c6c579ed0

              SHA256

              fad540071986c59ec40102c9ca9518a0ddce80cf39eb2fd476bb1a7a03d6eb34

              SHA512

              2f7e2e53ba1cb9ff38e580da20d6004900494ff7b7ae0ced73c330fae95320cf0ab79278e7434272e469cb4ea2cbbd5198d2cd305dc4b75935e1ca686c6c7ff4

            • \Users\Admin\AppData\Local\Temp\_ir_sf_temp_1\irsetup.exe

              Filesize

              1.2MB

              MD5

              a266e0ae1001da0023f9664afbcaee99

              SHA1

              f943c180e5221a5943039c21b21f394dd99cbe14

              SHA256

              819b9a02a788445ad6c4d8f38e05abe911e289e71e4d2c2e37923c9f66f576cf

              SHA512

              525b8473b17732ba94942df63b0e43b26ee0157b137a1a39f52034b04ce686097e92ec8d9ea422acf02edc4385863c0179a6af73af01dfcfc1cb6d7c9dad1e7c

            • \Users\Admin\AppData\Local\Temp\jre-windows.exe

              Filesize

              64.4MB

              MD5

              af1d24091758f1e02d51dc5f5297c932

              SHA1

              dc3f98dded6c1f1e363db6752c512e01ac9433f3

              SHA256

              e52a8d0337bae656b01cb76c03975ac3d75ac4984c028ba2a6531396dea6dddd

              SHA512

              8d4264a6b17f7bbfd533b11ec30d7754a960a9f2fbef10c9977b620051c5538d8eb6080ea78e070904c7c52a6ce998736fad2037f6389ad4c5c0ce3f1d09e756

            • \Windows\Installer\MSI84B0.tmp

              Filesize

              953KB

              MD5

              64a261a6056e5d2396e3eb6651134bee

              SHA1

              32a34baf051b514f12b3e3733f70e608083500f9

              SHA256

              15c1007015be7356e422050ed6fa39ba836d0dd7fbf1aa7d2b823e6754c442a0

              SHA512

              d3f95e0c8b5d76b10b61b0ef1453f8d90af90f97848cad3cb22f73878a3c48ea0132ecc300bfb79d2801500d5390e5962fb86a853695d4f661b9ea9aae6b8be8

            • memory/668-759-0x00000000034F0000-0x00000000038D9000-memory.dmp

              Filesize

              3.9MB

            • memory/668-760-0x00000000034F0000-0x00000000038D9000-memory.dmp

              Filesize

              3.9MB

            • memory/756-19-0x00000000031E0000-0x00000000035C9000-memory.dmp

              Filesize

              3.9MB

            • memory/756-686-0x00000000031E0000-0x00000000035C9000-memory.dmp

              Filesize

              3.9MB

            • memory/756-6-0x00000000031E0000-0x00000000035C9000-memory.dmp

              Filesize

              3.9MB

            • memory/756-15-0x00000000031E0000-0x00000000035C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1056-2146-0x0000000000230000-0x0000000000231000-memory.dmp

              Filesize

              4KB

            • memory/1056-2145-0x00000000024C0000-0x00000000034C0000-memory.dmp

              Filesize

              16.0MB

            • memory/1636-599-0x00000000007C0000-0x00000000007C3000-memory.dmp

              Filesize

              12KB

            • memory/1636-1372-0x0000000002C40000-0x0000000002C50000-memory.dmp

              Filesize

              64KB

            • memory/1636-685-0x0000000010000000-0x0000000010051000-memory.dmp

              Filesize

              324KB

            • memory/1636-2313-0x00000000011E0000-0x00000000015C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1636-597-0x0000000010000000-0x0000000010051000-memory.dmp

              Filesize

              324KB

            • memory/1636-1413-0x00000000011E0000-0x00000000015C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1636-1572-0x00000000011E0000-0x00000000015C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1636-21-0x00000000011E0000-0x00000000015C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1636-1373-0x00000000011E0000-0x00000000015C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1636-684-0x00000000011E0000-0x00000000015C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1636-688-0x0000000010000000-0x0000000010051000-memory.dmp

              Filesize

              324KB

            • memory/1636-718-0x0000000002C40000-0x0000000002C50000-memory.dmp

              Filesize

              64KB

            • memory/1636-827-0x00000000011E0000-0x00000000015C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1636-829-0x00000000011E0000-0x00000000015C9000-memory.dmp

              Filesize

              3.9MB

            • memory/1760-2388-0x00000000004D0000-0x00000000004D1000-memory.dmp

              Filesize

              4KB

            • memory/1760-2402-0x00000000004D0000-0x00000000004D1000-memory.dmp

              Filesize

              4KB

            • memory/1760-2399-0x00000000004D0000-0x00000000004D1000-memory.dmp

              Filesize

              4KB

            • memory/2480-761-0x00000000003C0000-0x00000000007A9000-memory.dmp

              Filesize

              3.9MB

            • memory/2480-826-0x00000000003C0000-0x00000000007A9000-memory.dmp

              Filesize

              3.9MB

            • memory/2876-2307-0x0000000002780000-0x0000000003780000-memory.dmp

              Filesize

              16.0MB

            • memory/2876-2337-0x0000000000150000-0x0000000000151000-memory.dmp

              Filesize

              4KB

            • memory/2876-2343-0x0000000002780000-0x0000000003780000-memory.dmp

              Filesize

              16.0MB

            • memory/2876-2365-0x0000000002780000-0x0000000003780000-memory.dmp

              Filesize

              16.0MB

            • memory/2876-2369-0x0000000002780000-0x0000000003780000-memory.dmp

              Filesize

              16.0MB

            • memory/2876-2373-0x0000000002780000-0x0000000003780000-memory.dmp

              Filesize

              16.0MB

            • memory/2876-2372-0x0000000000150000-0x0000000000151000-memory.dmp

              Filesize

              4KB

            • memory/2876-2374-0x0000000002780000-0x0000000003780000-memory.dmp

              Filesize

              16.0MB

            • memory/2876-2334-0x0000000000150000-0x0000000000151000-memory.dmp

              Filesize

              4KB

            • memory/2876-2321-0x0000000000150000-0x0000000000151000-memory.dmp

              Filesize

              4KB

            • memory/2876-2320-0x0000000000150000-0x0000000000151000-memory.dmp

              Filesize

              4KB