Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 22:47

General

  • Target

    68e56acafcb0fe632ef7fc0d9d9a6588_JaffaCakes118.exe

  • Size

    326KB

  • MD5

    68e56acafcb0fe632ef7fc0d9d9a6588

  • SHA1

    99bd546220ff8fadee2335cff747c485c9d5c72e

  • SHA256

    7c4c29521545d8bb875e91b5ebbf342a39d336fbc77f566bc2cfaefc70454777

  • SHA512

    c42f673feab8c17fcacec2f0aa0a6f8bae92e1d984ae4325dfba50e13b4221b2b701a32313fc698a48951bfa51436e193b0daefde7e71d289cdbf0d656901069

  • SSDEEP

    6144:T3VTflVq72ECrYhiH6it/PMyWPC7EHwksThzkHY8AOoAt4qLTz754Z:T3VTdVq72ECrYhiH/t0a+wb9mY8OA7Ty

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 23 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68e56acafcb0fe632ef7fc0d9d9a6588_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\68e56acafcb0fe632ef7fc0d9d9a6588_JaffaCakes118.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://hostas.ga/bb/tds.php
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://hostas.ga/bb/tds.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1952
    • C:\Users\Admin\AppData\Local\Temp\WCInstaller.exe
      C:\Users\Admin\AppData\Local\Temp\WCInstaller.exe --silent --partner=AE190201 --homepage=11 --search=7 --campaign=292
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\7zS4B79CA38\WebCompanionInstaller.exe
        .\WebCompanionInstaller.exe --partner=AE190201 --campaign=292 --version=8.9.0.992 --silent --partner=AE190201 --homepage=11 --search=7 --campaign=292
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Modifies registry class
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:540
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" Create "WCAssistantService" binPath= "C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe" DisplayName= "WC Assistant" start= auto
          4⤵
          • Launches sc.exe
          PID:2044
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" failure WCAssistantService reset= 30 actions= restart/60000
          4⤵
          • Launches sc.exe
          PID:5092
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" description "WCAssistantService" "Ad-Aware Web Companion Internet security service"
          4⤵
          • Launches sc.exe
          PID:1340
        • C:\Windows\system32\RunDLL32.Exe
          "C:\Windows\sysnative\RunDLL32.Exe" syssetup,SetupInfObjectInstallAction BootInstall 128 C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\bddci.inf
          4⤵
          • Drops file in Drivers directory
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1328
          • C:\Windows\system32\runonce.exe
            "C:\Windows\system32\runonce.exe" -r
            5⤵
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:4468
            • C:\Windows\System32\grpconv.exe
              "C:\Windows\System32\grpconv.exe" -o
              6⤵
                PID:4572
          • C:\Windows\system32\net.exe
            "C:\Windows\sysnative\net.exe" start bddci
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:876
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 start bddci
              5⤵
                PID:912
            • C:\Windows\SysWOW64\sc.exe
              "sc.exe" Create "DCIService" binPath= "C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\DCIService.exe" DisplayName= "DCIService" start= auto
              4⤵
              • Launches sc.exe
              PID:432
            • C:\Windows\SysWOW64\sc.exe
              "sc.exe" description "DCIService" "Webprotection Bridge service"
              4⤵
              • Launches sc.exe
              PID:824
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\bridge_start.cmd"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2732
              • C:\Windows\SysWOW64\sc.exe
                sc start DCIService
                5⤵
                • Launches sc.exe
                PID:1504
      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\DCIService.exe
        "C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\DCIService.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:4480

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PROGRA~2\Lavasoft\WEBCOM~1\Service\x64\bddci.sys

        Filesize

        781KB

        MD5

        2a241af18d9f0466aff6cd77c1561f9b

        SHA1

        2c6bfc8e583ed026fdf9ec01265d99e22d39305a

        SHA256

        528804013487cdb1da617e512d1de68060602887bcc8a7822bdb1346a2995ffd

        SHA512

        6779667bb57c87fdbf4dee57682e7851b5ad5bea39deb09fcb596ae48eb571317749ff59e825f91bd57527dab7477deac5b24bdbd86471844fad36876c08dd28

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\DCIService.exe

        Filesize

        3.3MB

        MD5

        3827ca1c0ec114a29bb576bef431f070

        SHA1

        1189dd380f160046de9f5f2f1d74459958f31a4b

        SHA256

        dd45886108aa85350feaa6d9fcc6c922b0874dfa18bbfe23111cc8edcb37fcb1

        SHA512

        480b6a1fc02fdec7fc2316f01b239bce98a6d8152770d329ddc4bfb37e2e00a7987a702900523ccc0380caabbee38a404683dbb20fe9c9b9456083559afb8218

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\MSVCP140.dll

        Filesize

        576KB

        MD5

        e74caf5d94aa08d046a44ed6ed84a3c5

        SHA1

        ed9f696fa0902a7c16b257da9b22fb605b72b12e

        SHA256

        3dedef76c87db736c005d06a8e0d084204b836af361a6bd2ee4651d9c45675e8

        SHA512

        d3128587bc8d62e4d53f8b5f95eb687bc117a6d5678c08dc6b59b72ea9178a7fd6ae8faa9094d21977c406739d6c38a440134c1c1f6f9a44809e80d162723254

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\bddci.inf

        Filesize

        4KB

        MD5

        e8b58a307f96dc9ce1eb2729f86e13b0

        SHA1

        5cee60f070930dc971e4d35d48e30364f623aad2

        SHA256

        2c9a7118ef74c3b168663c8ec6f3a7b27653896e193129ed0bc5e9aa55a0afbb

        SHA512

        7cd9fe7bcc8c8ec1466acc1adc7ab8c9ab6bdaf7c7c27dcc6c0cb43bab741f2519a88647ce43f74d7e9caf4ae39ae172dc639ed1b2027b9e8f15f35353613d91

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\bddci_core.dll

        Filesize

        1.5MB

        MD5

        13efc649989e224c8346c52ae3cc9a93

        SHA1

        bf907fee6fce0745601219f3faa89bc2c08434b0

        SHA256

        f994e407e9f78d521f335f25b7a4217fdcc4a5e6dc050fdf90d7870fda1e0ef7

        SHA512

        7c6f65858e3803ab9abe075c2e257e322594b875bd6001be5a6c6bde0ab271844ccd7f869394666a2ce9b535abb46e0332697d2c19836f886241881a60697ce0

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\bddcihttp.dll

        Filesize

        2.6MB

        MD5

        53f6774df73cc44d29f354aecbdef948

        SHA1

        894158c553f39f8000c858c84ad772714e215d75

        SHA256

        d1130318e699b81f1918f468a8b49c9be7b8b4293c1078da4a17dac6ad999ec6

        SHA512

        5151804071c371fe2458c2fc67441441b01602a529582bed48b0e0226e051f933981dce1f84e3ac0f2ebe608b463fe1e9c226d058edd3bf6c5b35be9e8a9e234

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\bittorrent.dll

        Filesize

        106KB

        MD5

        74d7799c00c804296c0f1b99324b513f

        SHA1

        527380e0e44c9fd8ca5f73d103e8e9f56eb13142

        SHA256

        66c0b9d01afab9db8f87164c747dc6bdd05ffae25092ab4627a8a47857118ab0

        SHA512

        3140d32d4199cc246fddb292400ec31bcc098e18349d9991828fc1462f7cd6aa3a0666037e569511b37b1cb6baf34c94be2fdc70a9685125a72fdd44e427cdac

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\bridge_start.cmd

        Filesize

        49B

        MD5

        95e8c6cd0a911f1ab4969c06b8cf77a2

        SHA1

        be1b1f8abd0420f59ecab7bcf8120cdc2ce34195

        SHA256

        de795f6d8591577054813bee79e7c5b4ee13360039d29aa73971c6b985d26ebd

        SHA512

        e5eefaf761be7bf3cea207e22e98398093fa0a9d3b459af7df22bfbf07755816737a7b8b261acf01aec8b10b5d8f0d90132a4ecdd83c242b2cde883039fac1ff

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\ftp.dll

        Filesize

        121KB

        MD5

        b7c081f03a50c391f5b22a0ee16b8a1e

        SHA1

        2fa63728dddb2e25f69adf0e02cbd75d053a9965

        SHA256

        42ccb6c597d0952042c3d3fdc0027634c3e9d118706a286277a32a7f6af6bd30

        SHA512

        8590e537d7df9523f934cd4bb18c7515d89e74fc8b3e8e35ce70b368c9a99659bf59dedb020fb470cf8577248f607ed271d52107015cdffc8a0a9f7e8ac2880b

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\http.dll

        Filesize

        189KB

        MD5

        c0d7a16ba0340ffaeadedb5fd82f6984

        SHA1

        63ac374a7322e4ecb9b8fed7e67ffcf01b71fc75

        SHA256

        e07a6f752e45e3240c95cbb890b22a154b1cca571c17fb57f11ef0b86108a7bb

        SHA512

        3e50f009b7a43d2fb58f28f0eaab4555d9fc68ed72af970f6a6bd875dab30b5ad32300e95ac570ddf0d925499e709457ea8757033580493f4bbae14a20d06c42

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\lsa.dll

        Filesize

        106KB

        MD5

        f89b978400b6c035f975efc6ab7303a8

        SHA1

        173f9f2bc814b19870c7b98057c948b0292340f9

        SHA256

        ca621b67c0aa1fe669c99abc0ee1a52807321f5be4092bad7c49d4291c194b7c

        SHA512

        d0fc9d302ee3b8be6c65ccb2a2d387a1a914ed9a453ce0cad6734f2c9d59a0ea8694e39b81382ee7b6f6c61b96db81f7ad1c227727b65a5a61c0471a35c39e33

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\pop3.dll

        Filesize

        108KB

        MD5

        4617113b1fa666e743f899d3781483d8

        SHA1

        0a1dadb7051c5a5ed9d108f78f83ac2b21419a84

        SHA256

        30af0cec58983ef5ccf2b30f074faad6ac348cd5fc88461c0b06977839a2c651

        SHA512

        92d0cd9e51de702a04bc2948e2966219b16c1bef93dadddccf801c58c2da1dd22ac5b9651583868957098959beeca2cfdd7465edece1120e364935ff65184675

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\rpc.dll

        Filesize

        107KB

        MD5

        fd8770a4368acd38c18ccb0298dcf587

        SHA1

        867772d872b84988bd7e9ea2271e470dd443874e

        SHA256

        e039a7e9bdecaf697bd73a47da557e5582fbffacc53f9a185790299156c85584

        SHA512

        e1123fa8cf304d082324cfaa5534ea34103226242cef1d6e1640bd2b343d19ae3bcec2302c3a6167c57f8196415190d86050fb55e2e6ba0d90aef189d5ca18c7

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\sav.dll

        Filesize

        726KB

        MD5

        47b40a1348a6eda7087a6241858ef9e1

        SHA1

        ca8ce0ba789baafc75b593fd8a98d4cf8afa4956

        SHA256

        cd83b1612c2823488ea267e88fe91a2aedf6b278bafdd39ff673bed3add39d6b

        SHA512

        dd43a1a08e0dd9386c0c4aa47c2e1a71a6ccd07dec1d70129c43845c5c32ec038efb617bec35320a467bbac77bad6abefd176c747b2a9113190d3e98d1b50130

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\smb.dll

        Filesize

        192KB

        MD5

        b4a0352a49d7661e64693765707a0a1a

        SHA1

        888f7e14cc08ef0ff4f6557bc8ec3a4ac36d18f3

        SHA256

        4295bbc2ce2ccb68b17df07b2364ef90b3bb802fc2f44c710b13c1477f424caa

        SHA512

        8647121a5cfc25fb7ff46308cebe3c261927bac40d2fafe89c01945346993e31ff6b0369e2a686f9f4a16cc61b74c887ed670f30a1a21252e04cd1ba781bb712

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\smtp.dll

        Filesize

        121KB

        MD5

        2b8265dfa5b53b61e875f7a83dde8680

        SHA1

        fa3c87c02750700ac0d20d21b88a90b8122be8e1

        SHA256

        748bac0cddaa20c4967f6f495db6b58f88fb675790c2039e211e42468afbe2eb

        SHA512

        9011bc9b204db910f7a06f89928986f03df234df39309b183b3fe226677eb0c435f0b8c3efaad9689a5fa44bee034ec99b7af2c6fc3a2056bc0a4c0d4d9d5de2

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\ssl.dll

        Filesize

        178KB

        MD5

        9592f5912b31b62193656497e67a2d9b

        SHA1

        b8a92656880a7016edcba43b1e206d83fe3847e0

        SHA256

        5978dd53996bc3856d01010e4ddc41215dc9d7fe046961feabec419972ce94bd

        SHA512

        ffab48be1db5cc30f61d88b3bc02e2ea30c8dcd44bfe9bed786bb7cd699dac8c456c1d390925c9a9ff2994a54cf98eee0e76984eba318792ec9838db1954b98d

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\vcruntime140.dll

        Filesize

        99KB

        MD5

        8697c106593e93c11adc34faa483c4a0

        SHA1

        cd080c51a97aa288ce6394d6c029c06ccb783790

        SHA256

        ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833

        SHA512

        724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987

      • C:\Program Files (x86)\Lavasoft\Web Companion\Service\x64\vcruntime140_1.dll

        Filesize

        43KB

        MD5

        21ae0d0cfe9ab13f266ad7cd683296be

        SHA1

        f13878738f2932c56e07aa3c6325e4e19d64ae9f

        SHA256

        7b8f70dd3bdae110e61823d1ca6fd8955a5617119f5405cdd6b14cad3656dfc7

        SHA512

        6b2c7ce0fe32faffb68510bf8ae1b61af79b2d8a2d1b633ceba3a8e6a668a4f5179bb836c550ecac495b0fc413df5fe706cd6f42e93eb082a6c68e770339a77c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        01409a92b179c99711ea8c28d307d0c4

        SHA1

        a9cc2b0c5727e2af14819f3908c4693f8e891392

        SHA256

        3034962a4c308ef5e66a2de7faf1ed2439b7e59086a8c07ad59ce3669b8ee01c

        SHA512

        8e86173a54d253f3e05443c603222b9018d63a3fb8e3a26b2b5602c083c07b117d5c53ede08056b6aa4503380562444c6704de32b2cce76f146478616b7278c9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        404B

        MD5

        c8996040a0fc0c2f1736a6150db29c42

        SHA1

        c2ed49ba4fa98486db1a32c6d145c66a9b92a885

        SHA256

        311847473020f741ffe5d47f9792cee698d44f21f1c3a9b97dedc00babc78c6c

        SHA512

        54f85316f3dc8936d02ec41cc5808c428c28ecdf502583391a5ca9bc64697eab795ff60dd4eb897f3bb7b0f9c9e1e21a93815a8fa335e4f616ead845f5583d74

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verA44A.tmp

        Filesize

        15KB

        MD5

        1a545d0052b581fbb2ab4c52133846bc

        SHA1

        62f3266a9b9925cd6d98658b92adec673cbe3dd3

        SHA256

        557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

        SHA512

        bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Q7QYTB89\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Temp\7zS4B79CA38\ICSharpCode.SharpZipLib.dll

        Filesize

        208KB

        MD5

        b4ecb8001f71894c1a17860476981441

        SHA1

        72d28f2aa50082a152cb6b3e25895855188fe9b8

        SHA256

        e6133baa62122e214ab9c114e9fff73bf25956518907a88577a85c8fb88c561f

        SHA512

        930e1b8181048790fffc1a5bd7f9dde91eeb757f1f8f35e01373f9414794963a53c03239b4ccc60b5c38049aba9e4db0ef5c166e278751c15c136a331ae495b0

      • C:\Users\Admin\AppData\Local\Temp\7zS4B79CA38\Newtonsoft.Json.dll

        Filesize

        428KB

        MD5

        eb259a0e2377f4c0bfb8712b773456fe

        SHA1

        d9123b055df58e33aa2ab2f242b30fc6a37f1cad

        SHA256

        4f9d1e187920dadd4e7693897f8240621e498ffd1709915c3b8394aaa1a34b43

        SHA512

        1f6e7c2233307a90dda68eaaa4ac08848b0499b464d3a307390a4b95ec1751d00b923572f92588b55f049ae6f4282d4126d2425e5caf8a95c8260f7600dc574a

      • C:\Users\Admin\AppData\Local\Temp\7zS4B79CA38\WebCompanionInstaller.exe

        Filesize

        456KB

        MD5

        994672c2aa0d63930a0d8614bafeac09

        SHA1

        94dc5848fd00f05589707fece3f60b8840aed26a

        SHA256

        c5a088842a698f1938c22f6314a141251282e32f263d99a6854c2d58fdee9272

        SHA512

        47a0d7bf14b46cddc90cc1dab0add345e40621fcd11d97786b3947a04bf9acf1cd4cc304562a51c1f83b7b8422302bdf7f8dd23dd949ee6847850f5e911d6e4e

      • C:\Users\Admin\AppData\Local\Temp\7zS4B79CA38\WebCompanionInstaller.exe.config

        Filesize

        2KB

        MD5

        8faad08d58b1207cff53b7dc1a35af91

        SHA1

        e74f806a6cfea16c2e5c6c90ff6a66111b61cea8

        SHA256

        091d2aae6d9f4a9b403e45ebc578e0cf27a08d16e9b8784e614c8710080f2cca

        SHA512

        dc0cfe69c6a3f715875f1badbf44eb90aeb97ebb5fc7b9f3dd4b4f4561de4c403b086709730f4f11de0815828f212591bf63b0fc591e8445ba7a320c574ea2ea

      • C:\Users\Admin\AppData\Local\Temp\WCInstaller.exe

        Filesize

        552KB

        MD5

        bc4c25ffc19286961d5cc54dd79a6d2d

        SHA1

        d1ca4a578a51946d38b0ceaf63a3a75c4b8fff5a

        SHA256

        409960971e9e9e31121d10d5033f27ec07ac228e52c32873292f2ee8567a8eaa

        SHA512

        0c4fc53d6d5fe5fa478f436616022a3c509d70a2d99714badfb945d88c6da9e005961b2d3409a124abdf5b5858001a0e385c58169c822f3b0d4cbd70327044a1

      • memory/540-48-0x000000006FAF0000-0x00000000700A1000-memory.dmp

        Filesize

        5.7MB

      • memory/540-326-0x000000006FAF0000-0x00000000700A1000-memory.dmp

        Filesize

        5.7MB

      • memory/540-325-0x000000006FAF2000-0x000000006FAF3000-memory.dmp

        Filesize

        4KB

      • memory/540-324-0x000000006FAF0000-0x00000000700A1000-memory.dmp

        Filesize

        5.7MB

      • memory/540-45-0x000000006FAF2000-0x000000006FAF3000-memory.dmp

        Filesize

        4KB

      • memory/540-47-0x000000006FAF0000-0x00000000700A1000-memory.dmp

        Filesize

        5.7MB