Analysis

  • max time kernel
    125s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:25

General

  • Target

    6cbdb9db0aab2140ad7ae5cbab932720_NeikiAnalytics.exe

  • Size

    5.8MB

  • MD5

    6cbdb9db0aab2140ad7ae5cbab932720

  • SHA1

    12ffa2fc762225a8d52974849cdef1d845b356df

  • SHA256

    a1554098c44ce3aaf06b1d482bab1b13ddae06ec489dc4241e31eda7cec993e1

  • SHA512

    0a360d43cf5d397f36f2a24585b714b5fcb6843237b8fdcd8e94b09c78aceb3c6f54c34e01006f7016ba926d30cbd9b8f56ba25dfabe852b1eee10a77ee4a459

  • SSDEEP

    98304:aLo5QTQrSjGzwbEwxCMPJVWlNKK31yzX6kPmh3ue7FH0oRVoiwhSi2BEiOfcCbEo:lkQujGjwxdBVxpHmj9nmhv2SiOfcCbFv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cbdb9db0aab2140ad7ae5cbab932720_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6cbdb9db0aab2140ad7ae5cbab932720_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2392
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3028
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1428
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2952
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1880
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1936
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:472080 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    5.8MB

    MD5

    08e87ba239ef9c0de68f7b72b1a2260f

    SHA1

    a8d887d6f31794146f325a23352fbd20efd10a3b

    SHA256

    9db5cbe8fafebd406da546dd3d5ed64462ffc5bcfffdd671aeab2d3f470390a2

    SHA512

    bc9ad28fb4f9d2b0cf1861a666dd6fa849de8fd1a07fb167fa13bfc1ac3a1af39d97bc103c8ab2572d0b25568caa530217d61abb2cee0edd3ad689210cb841a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    63773ccda4a016c5c19cd9a10a5b0f54

    SHA1

    5f7a08580d9df3d284ffa7e4dfb3eea804f0d62b

    SHA256

    417b3302aae36eaee925d1238e58119ac735d2b29abe69013083c31448ba56fe

    SHA512

    c1a9b7398a4de5dd8ff9f1533a243fa84b55b7e17022de2cc5a07e8a38a1ee5bb30629f35e62eea0133360528c310bd72de38a457d1f401d1cd793388a1acd2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5b98d938a056b514ac6ed51198dd7918

    SHA1

    9c65dbfd4bd581320fbb161e248ec35c300829fc

    SHA256

    8b635bd563617f5289489a5d3f64209223717e8ecd39e4ff99bbbcb8a2d0eb8a

    SHA512

    8d92b12444042b333da14fda702c3f69681e36335d094a038a41b4623ff985ab0553b82360390a1ce31b7c030305ac793ff47a01818c47b0d978fe84983c8c3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    38bbb3dd927e42a22438bdfde8b809c5

    SHA1

    e5b1a6bdf3d71d2811e4ded1572ac331085f459d

    SHA256

    ba07b5954752acd7330e437551c6db1c6fe7feed118125f1affe50d5d635a464

    SHA512

    c8454efd7283e8a86900fa55e730893f9df41bad7d227f7780e6cbdd4484119129a3242b782c0a97c888b9e02ae1435f6dce1b07cd03a10218d3d75795cdef15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e536b262f9dab05b96619eaf4720d43

    SHA1

    271666dabf101e59be544977a3fec35bb35b5917

    SHA256

    564c324cf3b201f3ce90cedfb4684e8db8716a305f5425ba3c2671dee4e37f43

    SHA512

    2d8a888ff527de7ba3de173fcf6cd86a7845488a41acf67bce306a891b661a374c682012f862fcb66e52785871524b82e59056b9c813766c1ed09716aa9f0d38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    322960b708cf6fbd52d2ea5e627bdcdb

    SHA1

    401ca0750010cb9a4174de5398b74903da810af7

    SHA256

    7f452d6fcd7d615c2dbf4b999e3571039de830507cf94dc85b762064528102ee

    SHA512

    6a6580a8db2a7deab7a6c39b1dbc474262c97f423e4cebc1d2fcf0da0566df6c705f1cc9a426c41d8ca7ce7a2d771f75484cfe1b872b0747aa8e5f9586ad8c44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f2acae070d0897bfa831da7b437677a3

    SHA1

    f5018af0484141baad5fe3d902fd3ea7cd26c9f6

    SHA256

    e767770a313d474ec546f4bbfc5da0c18fd7841123544e342a208e6375c5842c

    SHA512

    36912ab5f2b187b6dfb1d5304307af410e11b26d4921cfc40cfcc3a3f5deee2af59fa7a64386851483fc6f68b84ede018fc0884ffa95091acafcc19daa1f3f27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fa25a4e97281beeff9ff9e1dc52d25ab

    SHA1

    a2cf5c4fd56e3788b18ca85719f2e8633257bc0a

    SHA256

    9726f8c45a8184b494bcde0c7de0173105c0ee39cf8bf1b501e738683bedcf41

    SHA512

    7067782cee6558a084cc2eaa1b6c11a60343729ff9f407acadbdeccf28440676e0fdf1a1b898e9234151e6f2abd0acc3f0fcb2e3a88063aed76b15e2e0172642

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    749ae4b1a493a98c6ba3753238db4278

    SHA1

    16a857e3f1821734aedf103c99c1c4e13a2543f1

    SHA256

    ae1d1336c0efbf9c2b99c7f70dbfff5af10a961e76b677e9b475264e4e028297

    SHA512

    30afe22488c92bf884835cee61194e447cf115a75e4923bf8169b162b35523ffbc6078d45ced2989f8e4c602911498756fdfcbc411ec6e7e1c240205adb6daf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4dfd225819c2495ecf274d5840d28916

    SHA1

    b0454126eec9809412f664c0342c0abc4ffec0f0

    SHA256

    83a712e66533d0a3f77c6c5b6833e4b34fbcb482677f0d238dff395f47b061c5

    SHA512

    3b94d233b0aec3d5117e1b5f107ada932f498dfdc20c5ef4e00ca78f6564378274d7e07bbae94c8ddd349c5004bf41daeaf463c320f2c34b759feb6483072e51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f946c64d1ffc48eecd31fddf524355b6

    SHA1

    0219c9297e1a683ca2ea1362f390a5cf5e7ad910

    SHA256

    fcccdf6ba6f9f47876a17a6d2771b5d9e65f5b9b265b8c829bd7375f92e50604

    SHA512

    50050244f1e4cc83000a119aed80d9e5a6149b21c6f24d1f5857d8d47396823ccf6a7889a399762b42ce610402209175fd6906808a6e58ef6cbbef74dcb7abac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    040c396479c15c33df011bd983e9e153

    SHA1

    c52f7bb0f83ff639479b9a1423a20536a45ed1bb

    SHA256

    cc0104e66d9e400385734746800955232e4a2984d54f2af4f2239f96902c1f29

    SHA512

    8ef974c82b2b82fe3dac3d54b00daaa5715698a8c195cd613cbd22cb59f147cd627a45749b9eda801644ced58be4a01eef620bca23b897ee36b443d07aad7a3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e7c3e78c43d23034191c9b4e7136815

    SHA1

    011873a29946212e68eea205a3f1e296c165516d

    SHA256

    f0c5f0a2cd88d51f329a8addacc760e9cab06d9aa5ffcfd74517e45071367748

    SHA512

    dc4c105f1eea121a7d5e4204ec6e952dc4266a657c5575ef1e8e48d44d70f783f8cf0774cd5fcfd93449fe352963c2a3a001e99e48cc00011eeb6568b4229c29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a7ef717ee6abbab163e6e102a5bb7ac

    SHA1

    2f7a15040736d804d16b218baec1eb6a98b1ace5

    SHA256

    83736683daae103422ad7241e6853d41e9f19242bec2dc9385759a9677e7681e

    SHA512

    e7ef22b2c23ae1d53768377c3ac01d5a093f7d7a08a9197c8c0ffac0c1ff62ddd7c3a8f68caeefddc47e76138d0bdbb9cb82a48766886e44e937b68ad625e9ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    488c01836f859a6501d41b9d4b61ab04

    SHA1

    ef64c0a7e6e62aec679667d4ea61867f4bd195d7

    SHA256

    4c0b2fb10736324ce74f6cc420c95e84ad780220193c21a8b1bbbaed299e78e3

    SHA512

    96969452d3c0fc9ddf20acae82e99d933b9320d2c261794ebe2f06f6f93bdba145bf8d0e76d367a5e98cd024893f255f3581618742a367008dcadf675c06a6ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    07ffa7d79266b0fc50e9dd7ef9902c15

    SHA1

    585a2b8d6f5d107fb547f3e6367777cc25479e5a

    SHA256

    5f478bbcfca9b7995ed4dc60277480788c1ff246607716c49c6d47c9b3ab9046

    SHA512

    ccfee037b9bcfb37bc7853ab1e3c8ecd263d54cf84ec1a241b007583c12368cf39c837f757a42a91eccdb57c2e50f67e18f022bee4251fac5ec2ed6fe5ef80a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f256e4a57136b16c5173799d5fcb18e1

    SHA1

    8dec0095524702b6bcad3463fa132dd5929b8a54

    SHA256

    ee379810607b4af4d9fcd55a0f811a646338699eb79e54bf0a7d5e0b3d6300b2

    SHA512

    9883323c135f387674a1338caf499d292a2b2fd14864370cebc84b6bbb8f52b95a8f0afe5bf7ad922b5e69f022159d2a9ed10d64dc89b9b0a64592d7b9675d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f43398580362cbdd05d2c1b7ecd8a232

    SHA1

    5de796972b8f4f292b7c13fc3f4ff852a298ded9

    SHA256

    0bb9d46ca5c171d7ddba49b99d7df0bb0ce040dca8587cd882a567cc8e4cc31f

    SHA512

    541e16844d4bd94f937bad0db5aeac919516242605e2d6b7f66df7991c1101ab42befe09f821fa9152b68fd8e7b32395cb5a06cddbcf128ecf3d3ed97998ae9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b533a41ed4fbfb28a54367d4cb5d587f

    SHA1

    2ac1c3ffa32301fdea391c86bfda00abc96ea046

    SHA256

    b2bf7b9017cc8c5fe89530deba4bd6618220f868370d8ac107b532034b957c4c

    SHA512

    0f1faf1571e4c624dd781324e591f89f45ab309b6793110b7f5560f8c48af033a3fe8cc637ebb4fc5acdc62309164ebee3a1c9b964013cf1d17dc63b8cc2cfab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1f8b5ea155b9b71497752a25da0b34c6

    SHA1

    390cca6e987b37af4abc0cbcf5a8c1b90de19576

    SHA256

    1478bf2e7d998779bf85b54f8bfc05e41923e5d583dfad5f67e8c518e6718710

    SHA512

    bc9411fc1ef684d6a96c4e15b1052c043780662dc478708e407d7b0c2694a47f7323b2ed3575a2e93ebb80f4108e75dc75afa9ee4343726c2bafa202c22b42c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3dc134869524aeaa9bfb82b50bb6fe2b

    SHA1

    91ecc775f146de2203745a2122f219ca165f7038

    SHA256

    9f62cafca699bd4ad87b770fd65b9f541ec8639c351f51d08602feb95087e2d6

    SHA512

    b975d14140bd7c097a20637676ef67176c11a21dca8f4fdc028f52fc15ec180216a4d896c40d270cd515ec8d36f5fb7e0393b6fb8dd736ca338e854343ce76e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf0765e65a3e361b40b5d01886924aed

    SHA1

    14f64006c545d84d971947df2e0adf9d8ec74e43

    SHA256

    65941d7e39b7739b527fc2a387db007e055adfc9640bb68a94005ec7bbecec0b

    SHA512

    a82c89b8a21b3b55c2b9ad19132b4cc6b8b6904c6ca76fb40b1bc0e6977bde7c5836eced0e3a66e9b36ec55eaa7f9f6f5c9cc7c82a60cd27fb15bcf9a7566272

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    5edb5f0df6e47d93649823fad8a46ce8

    SHA1

    63c7e1a29c45eaa93bb50aca79277fe6895d2068

    SHA256

    8bf37b796543642040467a560db92fb9bfdd60686c71aaf84691784b64241874

    SHA512

    04f14fa3ab0e4e7de6da097d8e913efc70ea06eb2a014e2045154075ddd039484bb0a8d619ad704478dca54c6fd894c846a6706ae33fc1e5b6e391150545b9e8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CG1QBAVD\favicon[1].ico

    Filesize

    4KB

    MD5

    da597791be3b6e732f0bc8b20e38ee62

    SHA1

    1125c45d285c360542027d7554a5c442288974de

    SHA256

    5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

    SHA512

    d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SW6FSVAB\bUWVScapa[1].js

    Filesize

    32KB

    MD5

    f48baec69cc4dc0852d118259eff2d56

    SHA1

    e64c6e4423421da5b35700154810cb67160bc32b

    SHA256

    463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c

    SHA512

    06fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37

  • C:\Users\Admin\AppData\Local\Temp\Tar7BEA.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    5.8MB

    MD5

    213e388bbff118c7534b73f9dc419fb4

    SHA1

    4722539bd3a0621d4f9197090e1eca9da7230a41

    SHA256

    402e9de312c6cb258cc94bae3ce42a25747a3e5df1ca54b28695bbe0d20b5dd7

    SHA512

    2c3f5ca4d96dc9783eaef58db1d3969c2329b60729148c93a5f71c4b9971a23b009e8c4a6e02e96c465924f2600884e0e1263ddec66d3901b6b77fe63130914a

  • C:\Users\Admin\AppData\Local\Temp\~DF43DB5D5053D9C8C5.TMP

    Filesize

    16KB

    MD5

    d91bfd22e37cc08847c5d09d7b12fa50

    SHA1

    b36a63379170028298c3a78bdefcef75a48fe151

    SHA256

    1dd5f77489f10c974c93c955188058ca9f0873b287aa47f3273a571fdd570427

    SHA512

    220e68a7ba61979072266e21a8311ea19eac8facd6103d6d1d1c949d86a8df9b75f8f417e1e7e9abfb057397449145830f7fc3c309ac5f35e60b749b8f323ed3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\D936LYC6.txt

    Filesize

    122B

    MD5

    a78df6952cf3f290bc320a83a7a470dc

    SHA1

    cd695ee9b904b5c1c4c296fb6a0f3be4c593c635

    SHA256

    d63fbf36a6a0b52b4826c0483601b7237c1791e69c08a0eda3b53d3479edeec9

    SHA512

    68c412b4e00c434fb72d16cf748622743edfeee7fd09e1bae98b1ad375e9e4783c33ec5e6c80365d427843a483d4965c3f30f09249d4e8d74459255fd64adb05

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MD3I89SC.txt

    Filesize

    105B

    MD5

    2ce99f6fb5e6b4a168d9a34b304a1551

    SHA1

    29c679c186093359ecc1901372457990d9ece93c

    SHA256

    b676e8fa3adc4a9f8d3fafac57d5c518412692a3b6cd2795e13cac747d28a3f2

    SHA512

    00ea3578ba98d3739500cd28ad5c104ec61eb5cd5e99686cfae7999697cff2ba7bb9418e869dd03e2a95dc7fc0d7f43234e3fed53472af2b5a9a7813a9ca4c51

  • \??\c:\program files (x86)\adobe\acrotray .exe

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \??\c:\program files (x86)\adobe\acrotray.exe

    Filesize

    5.9MB

    MD5

    d3d82f35c7805515bfa78f33f0abc86b

    SHA1

    834ade4ac7fa21d54d9016eb59fff1facd44cf94

    SHA256

    eb773a4a70b47e140aa1d5589b69fb4745b01f0386019bbb1f42c9cc5e7620b5

    SHA512

    3252cefed864b5319063a66a183415620849b8789cf43f4195e2aa9c47b61262c6fc61bee5e8b1ad26aa74f4b883d782c01f44a7de4b86566cb477393fa4351f

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    5.8MB

    MD5

    6185032022a9c579b3c2dfac3a05b56f

    SHA1

    426ad6d99985f5969f08077ee132baa1cbbd44fa

    SHA256

    147061b2d6c50b941cd269ff3170bd110f6f38554993164a6ec433ef3e67baa1

    SHA512

    1d1361b217cf270bb16295ca7f796cbcc3301f2cb581683140e073e30c3c27d060a36b322cd4a9a498aed918f823b1508a7c331a4d581957360e17cb50465519

  • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    5.9MB

    MD5

    2643a8947bb795ff676d864f39a3627d

    SHA1

    7a5cf22fc81fbf0a405a9b3746a0c93fa715974e

    SHA256

    799682bc67c311c4bdc7615ac2a48962cfe705c9e719cc158e8b9f88d1af037c

    SHA512

    b371db49fdd7c4d4c741dd230590f443b84ab81fc0d60e2aca3b8547320b965038211920e98e00d9d1baf558e151e72dda257bb3dcb302db8223c1611311864f

  • memory/1428-46-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1428-732-0x0000000004B20000-0x00000000053D5000-memory.dmp

    Filesize

    8.7MB

  • memory/1428-41-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1428-47-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1428-49-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1428-120-0x00000000003E0000-0x00000000003E2000-memory.dmp

    Filesize

    8KB

  • memory/1428-44-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1428-58-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/1428-103-0x0000000004B20000-0x00000000053D5000-memory.dmp

    Filesize

    8.7MB

  • memory/1428-73-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1428-105-0x0000000004B20000-0x00000000053D5000-memory.dmp

    Filesize

    8.7MB

  • memory/1880-108-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/1880-111-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/1880-110-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2392-30-0x0000000004E30000-0x00000000056E5000-memory.dmp

    Filesize

    8.7MB

  • memory/2392-10-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2392-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2392-3-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2392-5-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2392-6-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2392-8-0x0000000000422000-0x0000000000727000-memory.dmp

    Filesize

    3.0MB

  • memory/2392-0-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2392-72-0x0000000004E30000-0x00000000056E5000-memory.dmp

    Filesize

    8.7MB

  • memory/2392-32-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2392-33-0x0000000000422000-0x0000000000727000-memory.dmp

    Filesize

    3.0MB

  • memory/2392-35-0x0000000004E30000-0x00000000056E5000-memory.dmp

    Filesize

    8.7MB

  • memory/2392-9-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2392-36-0x0000000004E30000-0x00000000056E5000-memory.dmp

    Filesize

    8.7MB

  • memory/2392-40-0x0000000004E30000-0x00000000056E5000-memory.dmp

    Filesize

    8.7MB

  • memory/2952-104-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2952-139-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2952-117-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/2952-114-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/2952-116-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/3028-74-0x00000000002D0000-0x00000000002D2000-memory.dmp

    Filesize

    8KB

  • memory/3028-39-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/3028-727-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/3028-71-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/3028-55-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB

  • memory/3028-57-0x0000000000400000-0x0000000000CB5000-memory.dmp

    Filesize

    8.7MB