Analysis

  • max time kernel
    300s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 22:47

General

  • Target

    32f238f4d46cc8bc50f8b635199e426438ff9ba894ce5120ad931e11a1dec485.exe

  • Size

    753KB

  • MD5

    21884164c40ed182195005228c032538

  • SHA1

    dd51fef15bfc4d2fe024427ede3ffca274594e37

  • SHA256

    32f238f4d46cc8bc50f8b635199e426438ff9ba894ce5120ad931e11a1dec485

  • SHA512

    1d694c00330c6fec201f571c0decbeb125fdb90f203e28c9c927b997d1c04a6cb84625148f8f1f94ffb487cd217c22b7cd423241e536cdc0f426ab5d79d98d6a

  • SSDEEP

    12288:8MwNHnV+ztWlIbp7HOTW0AC5x52I+m7n3lwXqhtFpBC/lZKfKY39pNaUiOp66w7s:8MwNmWAyTW45nJn1++tFjalZxKLJh

Malware Config

Extracted

Family

smokeloader

Botnet

pub3

Extracted

Family

smokeloader

Version

2022

C2

http://cellc.org/tmp/index.php

http://h-c-v.ru/tmp/index.php

http://icebrasilpr.com/tmp/index.php

http://piratia-life.ru/tmp/index.php

http://piratia.su/tmp/index.php

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry class 20 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\32f238f4d46cc8bc50f8b635199e426438ff9ba894ce5120ad931e11a1dec485.exe
      "C:\Users\Admin\AppData\Local\Temp\32f238f4d46cc8bc50f8b635199e426438ff9ba894ce5120ad931e11a1dec485.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k move Exceptional Exceptional.cmd & Exceptional.cmd & exit
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2700
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "wrsa.exe opssvc.exe"
          4⤵
            PID:2620
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2180
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
            4⤵
              PID:2520
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c md 55166055
              4⤵
                PID:2584
              • C:\Windows\SysWOW64\findstr.exe
                findstr /V "SpeakingIdentifyYeahWm" Afternoon
                4⤵
                  PID:2592
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b Mechanisms + About 55166055\a
                  4⤵
                    PID:1292
                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55166055\Yours.pif
                    55166055\Yours.pif 55166055\a
                    4⤵
                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:2984
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 5 127.0.0.1
                    4⤵
                    • Runs ping.exe
                    PID:1768
              • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55166055\Yours.pif
                "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55166055\Yours.pif"
                2⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:1064
              • C:\Users\Admin\AppData\Local\Temp\E13B.exe
                C:\Users\Admin\AppData\Local\Temp\E13B.exe
                2⤵
                • Executes dropped EXE
                PID:2748
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {87BAA087-356D-4004-850C-5372CF3E0189} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:1468
              • C:\Users\Admin\AppData\Roaming\sureuwi
                C:\Users\Admin\AppData\Roaming\sureuwi
                2⤵
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of SetWindowsHookEx
                PID:2004

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55166055\a
              Filesize

              218KB

              MD5

              a3f24c66573da6335b30ed36bad83a27

              SHA1

              6cd49a2d7d719b6a2f0de9f3708c23d0321e4d4b

              SHA256

              a9c11419a527ee978756038045ef3490d13d15dea4c0ee0ec39272c57cabba43

              SHA512

              ada835b44bfc6df3f3f69b6ed4a34102e063a8f1f10689168ebe4b20e8d1237517d9168f25f2d9e488c73330226c36f14996d4b089249ebb1f55f6d3c894578b

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\About
              Filesize

              65KB

              MD5

              355de775b9e4cab5d3096ac8c43ac9bf

              SHA1

              1d920f958a5e2b86158ca21e3e404ca6cf5d0108

              SHA256

              061f5d915ea25f33d06380766a3e422bb864661f37674128abd51ebd01047948

              SHA512

              86cce36a48b92e53a6785f56f8c812003ed62818d3059f3faf02ae7acb2dbe58b0966a560ed504d19bf9f6a9b041a76e615bd490b0acde731a6842daa5f00c41

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Afternoon
              Filesize

              176B

              MD5

              c3a6072d3b000001a3d97ac4d7be95a1

              SHA1

              cb44903d04404ca0c244c237b3809cd4ea4d30d9

              SHA256

              1ca0ecef786b4c4586faece0c560273cbb51425b7d21516dcef4694ced4a7feb

              SHA512

              8e748e2fe13798e737adfeaa9dd1810860afd26f5b30934a2fd180b4b479b817edf79720fbda1174f787eb00d55836d9799f255e2d3419715ce87b5cce170822

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Attack
              Filesize

              13KB

              MD5

              cb7b2e1b5573eff84fae2ac8c56463e3

              SHA1

              c3245046e25fa5ad1bdd498b047e62faa99af87a

              SHA256

              093aa9ee4c9189103d62bcb5c2a00f536595434dc1b6edb0ef5403503b0c0989

              SHA512

              de88473db279ccb52c3e820f0e612bbb3db154c64a2e712cd75d8ac2cf1ed4032f32b0f1ab26f11b06b642e49603995777a1fb348a2fa90cac2ea70e812fedf1

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Barrel
              Filesize

              24KB

              MD5

              70761d44518b6c96276ed6b469ce586c

              SHA1

              e2c7a917f17fd2f7fbae1e8e5d017bca770b24ff

              SHA256

              293796a67d5caf0e682827a120010a045e5230d9e31ba8f654381ad514406743

              SHA512

              c33e4271b847445137503c190ffce128ceb354f6bea5341746a534c7a700cfdbf5201f5435df662c28eeed59f8b4c38d055d7cb0bedd06fad80a4a5db4b3d301

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Building
              Filesize

              8KB

              MD5

              c66ec27b5fd3b1462af0387163a5a7d2

              SHA1

              2c621191888dc29690404dcfbc5384df2efb50d1

              SHA256

              d421949bd4cd3854227c6164c05eac5faaec5be7e9684efc40bcb9fc9f35451d

              SHA512

              342f2143c01fb4f370080f29e608969e3c62c9bd4eba236d54fdce8a29031ebb659e4d283886f619096e4b7c2dae3f878a612ebea9427b788bf69b24e7016bf1

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Discover
              Filesize

              29KB

              MD5

              4370d767cff75549d6e0aadcbc46f431

              SHA1

              44570c6b8b824519bb37ebc59c24df669bbfae9b

              SHA256

              29070ac9a9b886a1cd1f64d34999c22141bfec35f7de95b84345c4bcde465f19

              SHA512

              9df73017273bd34a392e51821b85a822ae824759cff71d5109fd1daae188a260700b8c620595b817a9eab0bf8c258acd2cd94797eabd88cf1b97814027cfcad8

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Espn
              Filesize

              68KB

              MD5

              758057875cf0e1d1cc426528f143fffc

              SHA1

              20031d253b9a4dc0e374b4a6727d4f4987673c92

              SHA256

              56ca7f60de6372a21311c74dda66f1bb413a8025eb23ae5eecdf6757e8056f86

              SHA512

              d283531376a4e98fe31c4ff191d8ee4e9dd91166619c2f9a223aa1813d760ce9a0dc41364327648653617a33e05f75fc50cf3f134de6167c050a0034cbbce004

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Examples
              Filesize

              12KB

              MD5

              6bdf77915b441c858710f8583e14b011

              SHA1

              3ac23ec8233c6a2091294991d1f255d01a78e029

              SHA256

              f0c875bbc4437a67cf613d84e13fcc1d3596f7d296e1bb7afd4a11a64f9fa671

              SHA512

              b857ccba516a7e8500771199ed26c4ebb78044ff6f1dfc7d098dea862e0dd49205c930138b1d9918e7c62588fe6fee31880050ad1e21c9e579c45e5fa14eb63c

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Exceptional
              Filesize

              24KB

              MD5

              2002af3d347d6614f7a128e75681882e

              SHA1

              68daf193dbe63582f5a00a16dc6eac50f313a18a

              SHA256

              0435e78236c1b3058f709d4a0ccbf16626de16a32dd0f08bc6f770a7f64a79fe

              SHA512

              181935e76bc79e36e70b5326ed6eae4f1b2e310ec4acb8878781680345fb4f6c5a4bc926336764d45073012c4e1481d803924673f92d5318bd456818c314b4f6

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Functions
              Filesize

              63KB

              MD5

              dc2216f10415f9b7b1d9c786da8314f9

              SHA1

              004f5caf9641051d3fcffd2f038513d1e872b0a1

              SHA256

              9afc7e9c980797a0d373df1b6365b190f0624635793b15739d2c69889543b4f3

              SHA512

              abeea4773779fe452d910f561991763641ce81094133343f16db5aa95d0022f01ce79a16ed23ee5eed2774c5e6bef4faef6ec5f44581731a1bc44a3bac52e49c

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Funding
              Filesize

              30KB

              MD5

              91feeb2e3469c4928ea90674e8116b17

              SHA1

              d63d57558e6539eecec5cc8e5e247fb30b5a5b2a

              SHA256

              4a452d003f576885b98e06b8b6933285983dc2f3941e1a9e1b34451f7c6810d5

              SHA512

              d7dbe1f432509f0a0412c21dbabb1503bc3f3dc256b4921012aaac9811beed9674a96b33f5133d17e7b079d7d2f93e561bb9925cab38b0750988dff85f735439

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Gl
              Filesize

              37KB

              MD5

              4ce704064b36b63f1e193a9216b61f6a

              SHA1

              b6cfa4a9f0631992bb1c216f871676fce5cd7e8d

              SHA256

              61cc980258cb215ca30b9259d4576008ac469721820c2242be4b570a80e05ae9

              SHA512

              7847597bcb78a2cc0e348e59e7e1482dd940190b4d2097cc19aeb51df3a3b61ea8f79f6ef2a5ac8b219803a442a192ce690ce3f8e9681d8b4acb09e15d0f8372

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Guarantees
              Filesize

              18KB

              MD5

              12680fb7abe29cc1c28dd767389a1a9a

              SHA1

              03ab552f6e2718a9693520defa6f6e57857ba408

              SHA256

              19d318d759c2d6c0d9449d4d8872641df3796ccc7f06f6e962bfa67ca975f36a

              SHA512

              164a313d485839aeec8c4e3507e6134b0dd40efeca3d733336dc471e94b8355f4b7d8a30e6bab68ecab6d70f5adad346806b311fdd092eb7cf76fc4c4a75800a

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Javascript
              Filesize

              61KB

              MD5

              111c83eb67a74c7e2e1671e0ab02aa69

              SHA1

              cbd5dabda64b45c3d58469e69a031e029d6d8e41

              SHA256

              8e243237bf1a3431d399a2418b22c3082b2e29a38eafc7bfa03d12c7153466fa

              SHA512

              ab5758f8292b49440ec2170256eeef17e44095cbd1188102a86e88f6abd0998c58519b1278ff0b15a06da8d614e2eeaa1070e2f93bdbb124cac2c23b695c7d5c

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Mechanisms
              Filesize

              153KB

              MD5

              814324f8c49776cdfc80d2aa63ac249d

              SHA1

              f0b2a623b26b5e1028fb94226c259b055101104f

              SHA256

              815616302e29068fb7bdb7744de097217ff4d325eae02aa0a48f06838b3437d0

              SHA512

              418e25319a5b80652dae623dc0f810d42dd976a7c9a758c34e81a635958a95bb9a1ca14f804d403814b9484a0cd75ee0f069b41e7f96fd4daafa82e496eebe2b

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Multiple
              Filesize

              8KB

              MD5

              edfa760ac5a7f813444ee17a80d6ebae

              SHA1

              2b958f284ef1c11b8d78ad2753ee75c4f83cc4cc

              SHA256

              fb020dcb03059c3e9f45bee0432a058a57eb7c1d3f17d1436a8271090a1cfe8a

              SHA512

              7532751990aa6b1cb71363df0aed3dd9b35d6d5c13a728f607cc5be289a4236b34a5050e96fcad03c89211473d7acb773a08a642befba9f5956c28a07b5802c7

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Nicholas
              Filesize

              24KB

              MD5

              18118ba182b208ee32f87b599c6b55c7

              SHA1

              053bb6653d5f2f8ed28bfab93df6c06f5dca73b7

              SHA256

              fa42690a8cde1dba5482d11ba8b1e53a74c1aa0ade39ec05679f13428ddb270e

              SHA512

              4e7ceb7d5b63b5d16cc616e48a0b648a92a04720d78856d01a45e9c58a619b6725a8c2ec6e75367509763b8655e215b7b4685ff1a7b74d28f672e5553014fcd7

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pen
              Filesize

              52KB

              MD5

              f0b1b22cee863e660bcbd76b8a7b39f9

              SHA1

              5b441adb68f3de4d4bde1d4767838baa7f45fddd

              SHA256

              b4532cec467b0d53d58fd3ec9168a863566343a7417218671c6422c388bb2fea

              SHA512

              735d5012cce589412235399668cc5edbeafd6827d54cbc8a18de402e9b92656bdfdb14548f8b6f4b8263f2f71771833bddd84f7ac9a7b699ed93c6df56ab24d9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Pin
              Filesize

              39KB

              MD5

              c3e217fb0a392cd5e6203d217aa561f6

              SHA1

              3643b19a7c7428b6334ee420ac93414093dd9448

              SHA256

              36c03439ed11881fbb9405e1c607a3f435da056a6c38f8893d2ff5658c2473c3

              SHA512

              05bf32081431ffbd142f52e54c7ca11bb3ad95dbfe14cb1ed7ea6d6b0aea17e6c47a8247ab77624a73162bad5ef88c35a5279e57537755bc33ae22d96ff74988

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Please
              Filesize

              27KB

              MD5

              849a9fa93eb14c66d3d651d45cae0b7a

              SHA1

              ef652431e35ac26489a99c7523be2061822e24bb

              SHA256

              32aa0b57b89b0f4460e72d6575e4330064799f2f788d8a6f8d377db79aefd482

              SHA512

              6ec5cde13d32580031d43f5e88218551e7272f14fec81a6cc12eeff78e8a4badce52a4817344c9ecec8a89de015083e82a854c639e3e6b1b695d7c48b25617fa

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Poll
              Filesize

              57KB

              MD5

              b707c6e7077b8796a68d6e4a7d149b0a

              SHA1

              18ff8d328033923500c134758bf141cc872a0965

              SHA256

              92cc4bcee1ae08139f168ae2e2e0a7b2527e92ec6706256e5257e4f5065b19ed

              SHA512

              dc87ef81ec9c8f3750f66f89e04b6fa26cdde1e2b2c4cc45f9e62e34fbd733212179ce0d8109418915215f8cca13cf922e020dd644b7879913cc110f7f60e746

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Premier
              Filesize

              33KB

              MD5

              4585963123499f797c6109f52a76adf4

              SHA1

              9a39d202ae01bfebdce3b1f79f4f2a673ffe0adf

              SHA256

              a2c12fc2ac4e7726df7fe29a136a05e121c9066d1c65c6069833c1db3941733e

              SHA512

              5aa7ff08ac0034f38ad52ae46fb9a4f19808f807625081f26d90be7cb10a77b6a064e669fe19fab32b728f4ca555170ec2ee18a4a48ff27e545f4c00b660e3f9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Quarterly
              Filesize

              23KB

              MD5

              6872702acdce54aa0ac47180e571fb48

              SHA1

              eddd50620b9bf477c16c0a665f2e46e0d864830a

              SHA256

              308dc4e9e8f7997fbffb1831d5cea2a129e26a5ba314b1b18b73d6883b85477e

              SHA512

              a4af9cda9c134602539e052caf939dfde8fe92c11bba2e93d7dcceaad770ff350b3861dbf49e69ee89cc8364d0c1f2a88bffd1ebf50b2115cf8c2c9567a0e9f2

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ra
              Filesize

              34KB

              MD5

              47e01fc0dc1e0ba15c3e8e7dfb90adb5

              SHA1

              8bbe57972141ff6df257ae4e65ab86d4842a4660

              SHA256

              79f372549399f315d27acd6031b40888c43fb86dd9267d4d28b08e5e69c711a6

              SHA512

              598726112cd2fa81027826eef3ae02ace5be195d209b150363d67c23d9881d9a9d50b785a80f88be098679724fd36fdbff351af1aabf027d275a3eee32fc2832

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Summary
              Filesize

              4KB

              MD5

              dbca0b5fd123530408b73683a4d549c6

              SHA1

              b7e9d6f79ef82296fff2fbf74b5b3c4e35ca577b

              SHA256

              948b6158137df0ba6fe5b51e42fb44890011385c77e63e54401b0ac53ee56500

              SHA512

              16ac086ca13aa42e2bcd8b9464a6e001cc1dea46ce37e1ef0584b97ce24fd0fbbc430ad01ad7f6b207b54c26b5c8fe878f44a83f26bdcdb711603078bae2eed8

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Table
              Filesize

              65KB

              MD5

              6cdf168c2dbd7d3161cddda8860b0493

              SHA1

              56f0954496b344f9f2fe7371c285cb45975f4276

              SHA256

              cf33976078fcb4f17d1445dc0c2d79445243f8232312a74857e40d5e4b9eee0e

              SHA512

              f553e8ec68e92f73638e96fbc54959b8fd924c44fd377857bdd22313e3583388001c5ca9abe9cdbda7649c9542801beaf0abac2b6a83706b32310813dc3432ce

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Until
              Filesize

              69KB

              MD5

              67594eb959c1183685e2da02159868cf

              SHA1

              e0048d64846449bfe4992abe8bc39305e9797ce2

              SHA256

              41026568d92e70e1903ee713f4dd9f45f5f2b9da7e371cf124e99f3ebda27654

              SHA512

              624f370745d47ad5294f1e2855e51e4a810438bac91808f05b794240f76ca2085843ea48875e83ccc4764d46301e1c89dd8c6c45b56cfb1ed8d35d101d6f2ffb

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wives
              Filesize

              64KB

              MD5

              c56a833b03dfb63ea2cc23bc2503750a

              SHA1

              a990094bf7991b336f9ba1820d2c04742c01a5e5

              SHA256

              ec1543ad4cdc0d52799e2ce453fa7a4d6a6f74e5cee60bea302356e33568c292

              SHA512

              c836c1d8784d95216a6c30926bee411647cf5e3ccde9d4126f749ce9f73a8493283a4070c8f8f3c72d7c2ddd2fbc860b51c7876894757f9e6d8d22b0feebf6f9

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wonder
              Filesize

              62KB

              MD5

              59ed0159b5db274f9f27f8ba96cc8afa

              SHA1

              a9eb0bc4639c8f55a9aac04bcb26164cc7491571

              SHA256

              aff5fc0415edb571e54e64cd288d34aefb603e069b15b275f08d0632e7615a4b

              SHA512

              887cf614f557f83eab771648f8302024efa72c8b3d4932df9309f9168a8318cb2d6f910df4978735c0d04ac2233cdaebf62b47c51bd32ad1fc9b40c24c68f47b

            • C:\Users\Admin\AppData\Local\Temp\E13B.exe
              Filesize

              311KB

              MD5

              bd4fecd7009225a2618b2a47d9bcf6e5

              SHA1

              e63e0638e75840a70d83073aa5ca54e8465ab1a3

              SHA256

              4bd5755f9f0f468a1f8996b8bc3b916ea5e5b83a802240617b39cd392021c669

              SHA512

              afe89ea4e1915c2cf60231392435b4ffd30b93d227e66fb141b527b0ea1c9d3437ad116e316010e3a5e036c532973a2f33422cc7f40629ae45f599fb89af6ee0

            • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\55166055\Yours.pif
              Filesize

              925KB

              MD5

              62d09f076e6e0240548c2f837536a46a

              SHA1

              26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

              SHA256

              1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

              SHA512

              32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

            • memory/1064-68-0x0000000000400000-0x000000000040B000-memory.dmp
              Filesize

              44KB

            • memory/1064-69-0x0000000000400000-0x000000000040B000-memory.dmp
              Filesize

              44KB

            • memory/1356-71-0x0000000002E20000-0x0000000002E36000-memory.dmp
              Filesize

              88KB

            • memory/2004-88-0x0000000004C70000-0x0000000004C72000-memory.dmp
              Filesize

              8KB

            • memory/2748-85-0x0000000000400000-0x000000000258A000-memory.dmp
              Filesize

              33.5MB