Malware Analysis Report

2024-08-06 15:08

Sample ID 240524-x14yxagb4t
Target 6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118
SHA256 d98b360e720475ce31f7c4166e070aebeabdbc93030638471bd46830e357ac2b
Tags
neshta nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d98b360e720475ce31f7c4166e070aebeabdbc93030638471bd46830e357ac2b

Threat Level: Known bad

The file 6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

neshta nanocore evasion keylogger persistence spyware stealer trojan

Neshta family

Neshta

Detect Neshta payload

NanoCore

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Modifies system executable filetype association

Checks computer location settings

Checks whether UAC is enabled

Drops desktop.ini file(s)

Suspicious use of SetThreadContext

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: GetForegroundWindowSpam

NTFS ADS

Suspicious behavior: EnumeratesProcesses

Delays execution with timeout.exe

Modifies registry class

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-24 19:20

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A

Neshta family

neshta

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-24 19:20

Reported

2024-05-24 19:22

Platform

win7-20240221-en

Max time kernel

141s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NanoCore

keylogger trojan stealer spyware nanocore

Neshta

persistence spyware neshta

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\svhost.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2756 set thread context of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A

Enumerates physical storage devices

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\cboobs\cboobs.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svhost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2096 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe
PID 2096 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe
PID 2096 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe
PID 2096 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe
PID 2756 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2636 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2636 wrote to memory of 2580 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2636 wrote to memory of 2580 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2636 wrote to memory of 2580 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2636 wrote to memory of 2580 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2756 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2756 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 2684 wrote to memory of 2460 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2684 wrote to memory of 2460 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2684 wrote to memory of 2460 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2684 wrote to memory of 2460 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 2452 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 2452 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 2452 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 2452 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2900 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 2756 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2756 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2756 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2756 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\SysWOW64\cmd.exe
PID 2504 wrote to memory of 2040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2504 wrote to memory of 2040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2504 wrote to memory of 2040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2504 wrote to memory of 2040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/3582-490/6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe" "%temp%\cboobs\cboobs.exe" /Y

C:\Windows\SysWOW64\cmd.exe

C:\Windows\System32\cmd.exe /c copy C:/Users/Admin/AppData/Local/Temp/3582-490/6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe %temp%\cboobs\cboobs.exe /Y

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\cboobs\cboobs.exe:Zone.Identifier

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c ren "%temp%\cboobs\cboobs.exe.jpg" cboobs.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\System32\cmd.exe /c echo [zoneTransfer]ZoneID = 2 > %temp%\cboobs\cboobs.exe:Zone.Identifier

C:\Windows\SysWOW64\cmd.exe

C:\Windows\System32\cmd.exe /c ren %temp%\cboobs\cboobs.exe.jpg cboobs.exe

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\cboobs\cboobs.exe.bat

C:\Windows\SysWOW64\timeout.exe

timeout /t 180

Network

Country Destination Domain Proto
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp

Files

\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe

MD5 ec3ff21f19f66cbf04eaef83bcb98d48
SHA1 9396d73edf6456cb066aebd73763b164b99eafc7
SHA256 5cc202d31a7052450bc13b1c09495c4257760e562c9644cb4526a128d14fa507
SHA512 b3f322bd5e1799190bf5c4cc5857192a3b0441082a0e7e6bd53ca72eeaadf575f61de5cb17cce41c72eba4c0ccfa08ec16a0b3c8b6c18d41690bdba1ac8c84f7

C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

MD5 cf6c595d3e5e9667667af096762fd9c4
SHA1 9bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256 593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512 ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

memory/2756-15-0x0000000074201000-0x0000000074202000-memory.dmp

memory/2756-16-0x0000000074200000-0x00000000747AB000-memory.dmp

memory/2756-17-0x0000000074200000-0x00000000747AB000-memory.dmp

C:\Windows\svchost.com

MD5 61b1cab0553d262f543aa99726b020bf
SHA1 b08414daedaf7c10bfb6a009db989a08c57e9db1
SHA256 5b9585fcc15aab1938e6d88f859734ff346f01259f952b0b67d15316de5d6c02
SHA512 0908ed84271dc87409d07720bd24e7c8e0a24e6c84420501b4696a109f6f45ae7444c801794237308da5a64ec742bddc80629291a58a9d694621354191fa7400

C:\Windows\directx.sys

MD5 84a777da2725f7fb3a71ff68b9c166df
SHA1 9172c90e9cc411e1e53ced0d7f699e8fea0862d9
SHA256 48d98f378167f942997041774c8909f7019fb5626da2f23779b93a8b6026e1af
SHA512 983a6195c9a14840450ca0ffc849e02edb136fbd14b07981ae17df4d4539b9694596cd3ceef7a7699cd42870c6bc19810b2ab21d9466197f5f8dd098bd009817

C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE

MD5 02ee6a3424782531461fb2f10713d3c1
SHA1 b581a2c365d93ebb629e8363fd9f69afc673123f
SHA256 ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc
SHA512 6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

memory/2684-41-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2708-53-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 2e5f1cf69f92392f8829fc9c9263ae9b
SHA1 97b9ca766bbbdaa8c9ec960dc41b598f7fad82a5
SHA256 51985a57e085d8b17042f0cdc1f905380b792854733eb3275fd8fce4e3bb886b
SHA512 f7e096dd9d0fa3a3c04c01bf229c4b344798a4c8b7b848588c1d78cb9fadfa9b1d0fd53c1fe74d191d5561e9eb551a4a3fc918363f119ea60024dd3d67c83883

C:\Windows\directx.sys

MD5 1795a85da774f95a323355fe76c48788
SHA1 e09777700a51f1f4a5d374a0b560e122b584d1ce
SHA256 855992f20c71b83f086ec477a5ba37bd951a18fd88a443d1c034f47dff941ace
SHA512 47f6302cdf8debdbb0f67dc4c804da650a4a14e21c7a3d075c2d6e2e778fffdad4251b420349f74d994c896c10235f047f60f0281db05db3beff20fb9dfa2dd1

memory/2900-69-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2900-68-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2900-66-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2900-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cboobs\cboobs.exe.bat

MD5 315dbe455fa07119f8ab33a81f03597b
SHA1 41144b344d2982b34da252d5cfd7d96421efb9a6
SHA256 c200a35c5888790d4726a5d996841664020320373a7a430eaef6d18a23239de2
SHA512 64ebee31619d5189a298ef6b2d97303cbd0f10d779cacffdb94d739ee0b8c31ab2afcb02bc7f3efa1cd2744fcd45e5c207a1c7e8b3ecff4533a4e7eace1a1d52

memory/2900-63-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2900-61-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2900-59-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2900-57-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Windows\directx.sys

MD5 fb9b5608b200ea722fbf3bde562cadd5
SHA1 cac358906da6e7b4060363dcb65ecc53b18850c3
SHA256 843ed343363b5b8a69fba43463c48f6af6a207b439e2ab6248e6c5a47860ec34
SHA512 b03762f7061b7af769fac9a63ee82777c610248989c831ca433c4bffb9ebb5c697386fa9662313ac2e1e864f613c5dd5f693bce73e55950774478f4ba228323b

C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE

MD5 8c4f4eb73490ca2445d8577cf4bb3c81
SHA1 0f7d1914b7aeabdb1f1e4caedd344878f48be075
SHA256 85f7249bfac06b5ee9b20c7f520e3fdc905be7d64cfbefb7dcd82cd8d44686d5
SHA512 65453075c71016b06430246c1ee2876b7762a03112caf13cff4699b7b40487616c88a1160d31e86697083e2992e0dd88ebf1721679981077799187efaa0a1769

\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

MD5 9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1 ec66cda99f44b62470c6930e5afda061579cde35
SHA256 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA512 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

MD5 566ed4f62fdc96f175afedd811fa0370
SHA1 d4b47adc40e0d5a9391d3f6f2942d1889dd2a451
SHA256 e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460
SHA512 cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

MD5 58b58875a50a0d8b5e7be7d6ac685164
SHA1 1e0b89c1b2585c76e758e9141b846ed4477b0662
SHA256 2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae
SHA512 d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe

MD5 ccc63893fce0c93881bb86bb1db8fd4f
SHA1 cf6b2f4151a24efb0e999bf140bc8c591852476f
SHA256 2b63642dda15e68100fa82e82d35b1527a27372a82bac940279250694b923ae1
SHA512 993a684fb50aed14c5c41c7227de3cacf17ee221ecae584001e0536e0422798fbc329e03eee3b1b48cced32e3d7c7e073280bc216d90f360e49f5e4f87763c63

C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE

MD5 61c4eb4385ee3530cb2022fe6fc5bc45
SHA1 551c8baeb6dac4470dbaf68091ad9b864c022e90
SHA256 9cdb825851f24e29737dfa6fd3f8dc1a314956b1224c8a438e614ca8229d1dfe
SHA512 a4a4dd302df0696c43765aec07df39d1dae7e4e9db7fc2e1c4df7cdf4ad88f6026d912d3be323d92e286b6e694cba9d81a50e6f52a037e30803c38d009963c9f

C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe

MD5 467aee41a63b9936ce9c5cbb3fa502cd
SHA1 19403cac6a199f6cd77fc5ac4a6737a9a9782dc8
SHA256 99e5bea5f632ef4af76e4e5108486d5e99386c3d451b983bcd3ad2a49cc04039
SHA512 00c9ccdbbd6fd1be0c2dafd485d811be9bf2076d4efeabc256179befd92679b964e80edcb90ef21f3e874578fdb0003878227f560ca76498865770280f87113e

C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE

MD5 b00c357f313ec9514a77608a0199381d
SHA1 9190a7a786b0bd53be06e55f7a7baee612f14666
SHA256 5646465b91fcd21a5e445d9c03bdc19615c48473103d5a3a407144a8a520106d
SHA512 0866ff7c3bf37b9f98b8db7128ca44a5f99ef20c0465558c299276eb205ab207ef5e742076b1d4bef7ea7617e12818b344fc3f6497553cabbb3f667f08c40c69

C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

MD5 97510a7d9bf0811a6ea89fad85a9f3f3
SHA1 2ac0c49b66a92789be65580a38ae9798237711db
SHA256 c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea
SHA512 2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE

MD5 9c10a5ec52c145d340df7eafdb69c478
SHA1 57f3d99e41d123ad5f185fc21454367a7285db42
SHA256 ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36
SHA512 2704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f

C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE

MD5 9597098cfbc45fae685d9480d135ed13
SHA1 84401f03a7942a7e4fcd26e4414b227edd9b0f09
SHA256 45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c
SHA512 16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE

MD5 87f15006aea3b4433e226882a56f188d
SHA1 e3ad6beb8229af62b0824151dbf546c0506d4f65
SHA256 8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919
SHA512 b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

MD5 07e194ce831b1846111eb6c8b176c86e
SHA1 b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256 d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA512 55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

MD5 86749cd13537a694795be5d87ef7106d
SHA1 538030845680a8be8219618daee29e368dc1e06c
SHA256 8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA512 7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

memory/2756-193-0x0000000074200000-0x00000000747AB000-memory.dmp

memory/2636-195-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2096-194-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2636-196-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2096-198-0x0000000000400000-0x000000000041B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-24 19:20

Reported

2024-05-24 19:22

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NanoCore

keylogger trojan stealer spyware nanocore

Neshta

persistence spyware neshta

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\svhost.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1392 set thread context of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~4.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MIA062~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MI391D~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~3.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~4.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE C:\Windows\svchost.com N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe C:\Windows\svchost.com N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\assembly C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe N/A

NTFS ADS

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Temp\cboobs\cboobs.exe:Zone.Identifier C:\Windows\SysWOW64\cmd.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\svhost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 216 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe
PID 216 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe
PID 216 wrote to memory of 1392 N/A C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe
PID 1392 wrote to memory of 4892 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 1392 wrote to memory of 4892 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 1392 wrote to memory of 4892 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 4892 wrote to memory of 2336 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 4892 wrote to memory of 2336 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 4892 wrote to memory of 2336 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 1392 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 1392 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 1392 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 1392 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 1392 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 1392 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Windows\svchost.com
PID 1392 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1392 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1392 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1392 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1392 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1392 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1392 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1392 wrote to memory of 3668 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\svhost.exe
PID 1884 wrote to memory of 4848 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 1884 wrote to memory of 4848 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 1884 wrote to memory of 4848 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1964 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1964 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1964 N/A C:\Windows\svchost.com C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/3582-490/6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe" "%temp%\cboobs\cboobs.exe" /Y

C:\Windows\SysWOW64\cmd.exe

C:\Windows\System32\cmd.exe /c copy C:/Users/Admin/AppData/Local/Temp/3582-490/6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe %temp%\cboobs\cboobs.exe /Y

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\cboobs\cboobs.exe:Zone.Identifier

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c ren "%temp%\cboobs\cboobs.exe.jpg" cboobs.exe

C:\Users\Admin\AppData\Local\Temp\svhost.exe

"C:\Users\Admin\AppData\Local\Temp\svhost.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\System32\cmd.exe /c echo [zoneTransfer]ZoneID = 2 > %temp%\cboobs\cboobs.exe:Zone.Identifier

C:\Windows\SysWOW64\cmd.exe

C:\Windows\System32\cmd.exe /c ren %temp%\cboobs\cboobs.exe.jpg cboobs.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 31.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp
US 8.8.8.8:53 ayewhatsgoodbrolmao.duckdns.org udp
CA 89.36.78.121:1689 ayewhatsgoodbrolmao.duckdns.org tcp

Files

C:\Users\Admin\AppData\Local\Temp\3582-490\6f91cb1add0cd6ab354136abea8aeaf6_JaffaCakes118.exe

MD5 ec3ff21f19f66cbf04eaef83bcb98d48
SHA1 9396d73edf6456cb066aebd73763b164b99eafc7
SHA256 5cc202d31a7052450bc13b1c09495c4257760e562c9644cb4526a128d14fa507
SHA512 b3f322bd5e1799190bf5c4cc5857192a3b0441082a0e7e6bd53ca72eeaadf575f61de5cb17cce41c72eba4c0ccfa08ec16a0b3c8b6c18d41690bdba1ac8c84f7

memory/1392-12-0x0000000073602000-0x0000000073603000-memory.dmp

memory/1392-13-0x0000000073600000-0x0000000073BB1000-memory.dmp

memory/1392-14-0x0000000073600000-0x0000000073BB1000-memory.dmp

C:\Windows\svchost.com

MD5 61b1cab0553d262f543aa99726b020bf
SHA1 b08414daedaf7c10bfb6a009db989a08c57e9db1
SHA256 5b9585fcc15aab1938e6d88f859734ff346f01259f952b0b67d15316de5d6c02
SHA512 0908ed84271dc87409d07720bd24e7c8e0a24e6c84420501b4696a109f6f45ae7444c801794237308da5a64ec742bddc80629291a58a9d694621354191fa7400

C:\Windows\directx.sys

MD5 84a777da2725f7fb3a71ff68b9c166df
SHA1 9172c90e9cc411e1e53ced0d7f699e8fea0862d9
SHA256 48d98f378167f942997041774c8909f7019fb5626da2f23779b93a8b6026e1af
SHA512 983a6195c9a14840450ca0ffc849e02edb136fbd14b07981ae17df4d4539b9694596cd3ceef7a7699cd42870c6bc19810b2ab21d9466197f5f8dd098bd009817

memory/3668-33-0x0000000000400000-0x0000000000438000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\svhost.exe

MD5 84c42d0f2c1ae761bef884638bc1eacd
SHA1 4353881e7f4e9c7610f4e0489183b55bb58bb574
SHA256 331487446653875bf1e628b797a5283e40056654f7ff328eafbe39b0304480d3
SHA512 43c307a38faa3a4b311597034cf75035a4434a1024d2a54e867e6a94b53b677898d71a858438d119000e872a7a6e92c5b31d277a8c207a94375ed4fd3c7beb87

memory/1884-50-0x0000000000400000-0x000000000041B000-memory.dmp

memory/892-51-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Windows\directx.sys

MD5 1795a85da774f95a323355fe76c48788
SHA1 e09777700a51f1f4a5d374a0b560e122b584d1ce
SHA256 855992f20c71b83f086ec477a5ba37bd951a18fd88a443d1c034f47dff941ace
SHA512 47f6302cdf8debdbb0f67dc4c804da650a4a14e21c7a3d075c2d6e2e778fffdad4251b420349f74d994c896c10235f047f60f0281db05db3beff20fb9dfa2dd1

C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

MD5 12fd9fcb97cb1e45c020e7bac06b2c91
SHA1 90c6fce6c9c40666ecc0c3964308bb2401676703
SHA256 8cec6976f1f5c004627ac249302e29127f4c7d2cda4df8263bf75281edec7a25
SHA512 c805cc4ca9bbc3e4c961e2685712d44c85aed275cdfd2f6c3c20898c647efbd442fb0b8da0186d06fce88288e9fdec25830c48cb107b73da466098ab19353953

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe

MD5 576410de51e63c3b5442540c8fdacbee
SHA1 8de673b679e0fee6e460cbf4f21ab728e41e0973
SHA256 3f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe
SHA512 f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db

C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE

MD5 176436d406fd1aabebae353963b3ebcf
SHA1 9ffdfdb8cc832a0c6501c4c0e85b23a0f7eff57a
SHA256 2f947e3ca624ce7373080b4a3934e21644fb070a53feeaae442b15b849c2954f
SHA512 a2d1a714e0c1e5463260c64048ba8fd5064cfa06d4a43d02fc04a30748102ff5ba86d20a08e611e200dc778e2b7b3ae808da48132a05a61aa09ac424a182a06a

C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE

MD5 12c29dd57aa69f45ddd2e47620e0a8d9
SHA1 ba297aa3fe237ca916257bc46370b360a2db2223
SHA256 22a585c183e27b3c732028ff193733c2f9d03700a0e95e65c556b0592c43d880
SHA512 255176cd1a88dfa2af3838769cc20dc7ad9d969344801f07b9ebb372c12cee3f47f2dba3559f391deab10650875cad245d9724acfa23a42b336bfa96559a5488

C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE

MD5 92dc0a5b61c98ac6ca3c9e09711e0a5d
SHA1 f809f50cfdfbc469561bced921d0bad343a0d7b4
SHA256 3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc
SHA512 d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31

C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE

MD5 4ddc609ae13a777493f3eeda70a81d40
SHA1 8957c390f9b2c136d37190e32bccae3ae671c80a
SHA256 16d65f2463658a72dba205dcaa18bc3d0bab4453e726233d68bc176e69db0950
SHA512 9d7f90d1529cab20078c2690bf7bffab5a451a41d8993781effe807e619da0e7292f991da2f0c5c131b111d028b3e6084e5648c90816e74dfb664e7f78181bc5

C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe

MD5 5791075058b526842f4601c46abd59f5
SHA1 b2748f7542e2eebcd0353c3720d92bbffad8678f
SHA256 5c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394
SHA512 83e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb

C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE

MD5 9dfcdd1ab508b26917bb2461488d8605
SHA1 4ba6342bcf4942ade05fb12db83da89dc8c56a21
SHA256 ecd5e94da88c653e4c34b6ab325e0aca8824247b290336f75c410caa16381bc5
SHA512 1afc1b95f160333f1ff2fa14b3f22a28ae33850699c6b5498915a8b6bec1cfc40f33cb69583240aa9206bc2ea7ab14e05e071275b836502a92aa8c529fc1b137

C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe

MD5 cce8964848413b49f18a44da9cb0a79b
SHA1 0b7452100d400acebb1c1887542f322a92cbd7ae
SHA256 fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5
SHA512 bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe

MD5 6cc99a65b7c999fe6db0d32b8eb40e3d
SHA1 b4dbbd38d250a38380270c4521dfdc15ecdcc99f
SHA256 a048ef7c49f89a8d2e68085d353447fca6d3893456506a1b8fefe26697e1c001
SHA512 564a45500561c25662d132a7f82f17b4075f2b5710d3fd1586762e7777749f8a1701a79a2db9f8d0b1b66129264abecf55dd7b7f884d9eeceb0919c8c8ca13fa

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe

MD5 e7a27a45efa530c657f58fda9f3b9f4a
SHA1 6c0d29a8b75574e904ab1c39fc76b39ca8f8e461
SHA256 d6f11401f57293922fb36cd7542ae811ab567a512449e566f83ce0dcef5ff8e5
SHA512 0c37b41f3c075cd89a764d81f751c3a704a19240ad8e4ebab591f399b9b168b920575749e9d24c2a8f0400b9f340ab9fea4db76ff7060d8af00e2b36ac0c4a54

C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe

MD5 0511abca39ed6d36fff86a8b6f2266cd
SHA1 bfe55ac898d7a570ec535328b6283a1cdfa33b00
SHA256 76ae68fc7c6c552c4a98c5df640cd96cf27b62e7e1536b7f7d08eff56fcde8b8
SHA512 6608412e3ed0057f387bafcddcb07bfe7da4f207c7300c460e5acc4bd234cec3362191800789eb465eb120ec069e3ed49eabb6bd7db30d9e9245a89bb20e4346

C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe

MD5 a1375c9b38e9ae32430d407d9c5bb19a
SHA1 f3c1d818de90d52f3f0d6e43349abf8949692e9f
SHA256 b4d08c4ac9cbdd2364f47754d6f6d9daf9f8b67452c447ef6c004cf27c4637fd
SHA512 690a257689c294f548418ddabb4b0c88aee6dc0e5b335013c31bbe7f059b10c2706620fcf05bb848b0be2d9ce0ee3fe9df554b4e652d9f981abced305b61aff4

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE

MD5 5da33a7b7941c4e76208ee7cddec8e0b
SHA1 cdd2e7b9b0e4be68417d4618e20a8283887c489c
SHA256 531e735e4e8940dfe21e30be0d4179ceaecb57ce431cf63c5044e07048ac1751
SHA512 977aeecfbc693c9d5746fedf08b99e0b0f6fd7b0c7b41ac2b34a832e68a2e6f3c68f38af2e65c87075fcf00c1c6103e34324df45d7da9412cbbeea7e410794b6

C:\PROGRA~2\Google\Update\DISABL~1.EXE

MD5 3b0e91f9bb6c1f38f7b058c91300e582
SHA1 6e2e650941b1a96bb0bb19ff26a5d304bb09df5f
SHA256 57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d
SHA512 a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f

C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE

MD5 f7c714dbf8e08ca2ed1a2bfb8ca97668
SHA1 cc78bf232157f98b68b8d81327f9f826dabb18ab
SHA256 fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899
SHA512 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE

MD5 25e165d6a9c6c0c77ee1f94c9e58754b
SHA1 9b614c1280c75d058508bba2a468f376444b10c1
SHA256 8bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217
SHA512 7d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf

C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE

MD5 96a14f39834c93363eebf40ae941242c
SHA1 5a3a676403d4e6ad0a51d0f0e2bbdd636ae5d6fc
SHA256 8ee4aa23eb92c4aba9a46b18ac249a5fa11c5abb7e2c1ca82cd5196401db790a
SHA512 fbf307a8053e9478a52cfdf8e8bad3d7c6664c893458786ae6ee4fffc6fe93006e99a2a60c97fb62dad1addd5247621517f4edee5d9545717c4587a272cef9a2

C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE

MD5 e5589ec1e4edb74cc7facdaac2acabfd
SHA1 9b12220318e848ed87bb7604d6f6f5df5dbc6b3f
SHA256 6ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67
SHA512 f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe

MD5 5119e350591269f44f732b470024bb7c
SHA1 4ccd48e4c6ba6e162d1520760ee3063e93e2c014
SHA256 2b3aa9642b291932ba7f9f3d85221402a9d27078f56ef0e9c6bca633616e3873
SHA512 599b4ec673169d42a348d1117737b4ad4d7539574153df5a5c7689130c9ac5ff5cd00f3c8ec39adf32ff2b56be074081efcabb6456272c649703c3ea6cdaded4

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE

MD5 27543bab17420af611ccc3029db9465a
SHA1 f0f96fd53f9695737a3fa6145bc5a6ce58227966
SHA256 75530dc732f35cc796d19edd11ae6d6f6ef6499ddcf2e57307582b1c5299554c
SHA512 a62c2dd60e1df309ec1bb48ea85184914962ba83766f29d878569549ca20fca68f304f4494702d9e5f09adedc2166e48ee0bc1f4a5d9e245c5490daf15036bea

C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~2.EXE

MD5 a7b2c42baccc6e7ab86c02a0f715d5c6
SHA1 0125b9de11e022920aca4299cb101cf0f29e47fa
SHA256 821d67001c7e125aadf00a9272869981ed9082ac01d9f7f405047a9e74c50c4f
SHA512 d3ab4fc325154039510d5e68d2b0cb263f5a1560ab79fea9b274e3f9ff25ed7f7cb2801ae83be9e6396f16a0cd7ed87622484de8969f3536df6d4b89e077ff66

C:\PROGRA~2\MICROS~1\EDGEUP~1\Install\{C0257~1\MicrosoftEdgeUpdateSetup_X86_1.3.187.37.exe

MD5 0a17ce73dce10a28856c9f5ad052a4df
SHA1 467522c87a4e3fd1f7b690aaeaa57cfa0b407bb0
SHA256 1971d71fd68cf61420813b19b577184efa918c556cf131ab27359d6af6dc0656
SHA512 7c038dcedc4d8c58f3dbe0d36e5670d04aa24b452547dfd2bb7cebc69d25d0fefb59a788ae356f95db427ff1391604643cba7600f1d84c181ba09b3d25290f25

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE

MD5 400836f307cf7dbfb469cefd3b0391e7
SHA1 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10
SHA256 cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a
SHA512 aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8

C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE

MD5 87f15006aea3b4433e226882a56f188d
SHA1 e3ad6beb8229af62b0824151dbf546c0506d4f65
SHA256 8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919
SHA512 b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE

MD5 558fdb0b9f097118b0c928bb6062370a
SHA1 ad971a9a4cac3112a494a167e1b7736dcd6718b3
SHA256 90cee4a89cc1401ac464818226b7df69aa930804cefce56758d4e2ea0009d924
SHA512 5d08d5428e82fb3dad55c19e2c029de8f16e121faac87575b97f468b0ec312b3e0696225546cba91addaaf8f2451d44ae6386b4e4f7f621ce45055f3be797d7c

C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE

MD5 9597098cfbc45fae685d9480d135ed13
SHA1 84401f03a7942a7e4fcd26e4414b227edd9b0f09
SHA256 45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c
SHA512 16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE

MD5 9c10a5ec52c145d340df7eafdb69c478
SHA1 57f3d99e41d123ad5f185fc21454367a7285db42
SHA256 ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36
SHA512 2704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f

C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE

MD5 72d0addae57f28c993b319bfafa190ac
SHA1 8082ad7a004a399f0edbf447425f6a0f6c772ff3
SHA256 671be498af4e13872784eeae4bae2e462dfac62d51d7057b2b3bebff511b7d18
SHA512 98bcde1133edbff713aa43b944dceb5dae20a9cbdf8009f5b758da20ccfbcdf6d617f609a7094aa52a514373f6695b0fd43c3d601538483816cd08832edd15ab

C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

MD5 97510a7d9bf0811a6ea89fad85a9f3f3
SHA1 2ac0c49b66a92789be65580a38ae9798237711db
SHA256 c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea
SHA512 2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILESY~1.EXE

MD5 f3228c24035b3f54f78bb4fd11c36aeb
SHA1 2fe73d1f64575bc4abf1d47a9dddfe7e2d9c9cbb
SHA256 d2767c9c52835f19f6695c604081bf03cdd772a3731cd2e320d9db5e477d8af7
SHA512 b526c63338d9167060bc40ffa1d13a8c2e871f46680cd4a0efc2333d9f15bf21ae75af45f8932de857678c5bf785011a28862ce7879f4bffdb9753c8bc2c19b5

C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILECO~1.EXE

MD5 346d2ff654d6257364a7c32b1ec53c09
SHA1 224301c0f56a870f20383c45801ec16d01dc48d1
SHA256 a811042693bc2b31be7e3f454b12312f67bc97f2b15335a97e8d8f2ba0a6b255
SHA512 223545e3fc9f3cd66c5cbcb50dd7103743788f03a9db398da6dd2744ccaeee291f385ce4f2758d4504fc0f6b968fabbfe16ba03b5f546b743c51dacad7a049c3

C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\ONEDRI~1.EXE

MD5 1319acbba64ecbcd5e3f16fc3acd693c
SHA1 f5d64f97194846bd0564d20ee290d35dd3df40b0
SHA256 8c6f9493c2045bb7c08630cf3709a63e221001f04289b311efb259de3eb76bce
SHA512 abbbb0abfff1698e2d3c4d27d84421b90abba1238b45884b82ace20d11ddfdd92bf206519fc01714235fb840258bb1c647c544b9a19d36f155bf3224916805b8

C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE

MD5 63dc05e27a0b43bf25f151751b481b8c
SHA1 b20321483dac62bce0aa0cef1d193d247747e189
SHA256 7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce
SHA512 374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

C:\Users\ALLUSE~1\PACKAG~1\{D87AE~1\WINDOW~1.EXE

MD5 2f826daacb184077b67aad3fe30e3413
SHA1 981d415fe70414aaac3a11024e65ae2e949aced8
SHA256 a6180f0aa9c56c32e71fe8dc150131177e4036a5a2111d0f3ec3c341fd813222
SHA512 2a6d9bdf4b7be9b766008e522cbb2c21921ba55d84dfde653ca977f70639e342a9d5548768de29ae2a85031c11dac2ae4b3c76b9136c020a6e7c9a9a5879caeb

C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

MD5 07e194ce831b1846111eb6c8b176c86e
SHA1 b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256 d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA512 55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

MD5 86749cd13537a694795be5d87ef7106d
SHA1 538030845680a8be8219618daee29e368dc1e06c
SHA256 8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA512 7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe

MD5 05bdfd8a3128ab14d96818f43ebe9c0e
SHA1 495cbbd020391e05d11c52aa23bdae7b89532eb7
SHA256 7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb
SHA512 8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da

C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\OneDrive.exe

MD5 3a3a71a5df2d162555fcda9bc0993d74
SHA1 95c7400f85325eba9b0a92abd80ea64b76917a1a
SHA256 0a023355d1cc0a2348475d63aaf6aa0521d11e12a5c70102d7b3ebde092849e8
SHA512 9ad76ccce76ccfe8292bca8def5bc7255e7ea0ba6d92130c4350da49a3d7faef2d46b08aaef1955f3f4ea0a2e22451562b5e08783a79f794724584e409cf7837

memory/1392-190-0x0000000073600000-0x0000000073BB1000-memory.dmp

memory/216-191-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4892-192-0x0000000000400000-0x000000000041B000-memory.dmp

memory/216-193-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4892-194-0x0000000000400000-0x000000000041B000-memory.dmp

memory/216-195-0x0000000000400000-0x000000000041B000-memory.dmp

memory/216-198-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4892-197-0x0000000000400000-0x000000000041B000-memory.dmp