Analysis

  • max time kernel
    123s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2024, 02:14

General

  • Target

    82c870170f513aca5487ce4e357c66d0_NeikiAnalytics.exe

  • Size

    758KB

  • MD5

    82c870170f513aca5487ce4e357c66d0

  • SHA1

    c3e5ca465496909fe3b10263449e6def52b8080a

  • SHA256

    8e6185cc3b04b5020c8f6fb1ee797b8c12cb9d08020538c95847d9c3c4de4303

  • SHA512

    11a6683bf8a4eca12feb340c3330c674899a06001846d65f9fd45de402e0662a820131b3b08213094c42524f0edf7d77d9640bde4c86c4f581d67514a9b86cc9

  • SSDEEP

    12288:qz+slYvIaVfMLMjqfw/ckCfu5xG1ywj3dK4X41ygh6tZGHb0Xw:BIaVfMLewICmxG1rj3zICTGHIXw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82c870170f513aca5487ce4e357c66d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\82c870170f513aca5487ce4e357c66d0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2912
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3048
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:940
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1192
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2152
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2772
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:537612 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2920

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

          Filesize

          776KB

          MD5

          7f88c59694a8a68ed76a243432b47b85

          SHA1

          14b361464f36cf6d739c522a2199f511fcbf4995

          SHA256

          5196d0d96323abffb2217dc739c4d8d96894b371180d9ab3b302bbd84cecd738

          SHA512

          11638a76154b4964524c21823b96768168658727a90170339afa5d3762e53d3e80405d1d66b8423fa0950da0812d65700d79967dff2a583dcff0e92359ca1e46

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          914B

          MD5

          e4a68ac854ac5242460afd72481b2a44

          SHA1

          df3c24f9bfd666761b268073fe06d1cc8d4f82a4

          SHA256

          cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

          SHA512

          5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

          Filesize

          252B

          MD5

          776db016775e492e04d14a1495c0758c

          SHA1

          8be8cc99cde5393a84c004bdc8a88f10ea90fa68

          SHA256

          8b615d1a22004001e91972146db8e6c3c14184a46c99c028e64e1f39fe2bf236

          SHA512

          7e67b6802835b392e3a9ae83c094693e0003008e2a841ad6fc95002df3028b203eab5f185dde446adc712a0f957007b73ec8c5e27ad75f24595acc3767677f22

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          422de6ee713eaf8129dc1b41d3e5bcfb

          SHA1

          0c973f0070e0c10f13dd45dd35ed3451a1274b1b

          SHA256

          8a6ce859647f8bcf621cb4043a13597130c8dfe9281bbf169d7a635e9dbd41a1

          SHA512

          a482afaf9fb73c202fe14fe0d0f39bcca353d3c698de8d320af721968ac5909f8081037b0e11f969d92d517825ae4a59c27635b8cf18e90343257e436ed3524d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f1ba03374370e4d88903a96b8e1e61f1

          SHA1

          2c6fed45359475964cabcb3e381a59a94ff4a579

          SHA256

          d7af57cebe674683862a2bc768493295fd9162e4f16a4b5343407b631e65af4d

          SHA512

          858d357bfb4e2415980d969195cd82d5feb5083cc8b07e0a4d0ac1a5e2c92d16863c2cc146767015fad75aca44d6cc0e1169c36f76ac6586ff7e995fe91e93cf

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c79485b66578a075c7043df7bbbfdc82

          SHA1

          0fc9dbcadbd74125cdcefdd4f0b7bb71a01d8419

          SHA256

          cc27eb816179dc19eb513d3930164d9ae089c441c66e4d3b365eb8a73afbe9cf

          SHA512

          1f982a4596948ede72fa01e5e4b892122a05f6a12c050ba3019d9bb2859246a280e22ffa33f8b27d1a1c13c930ae9a8c0e56240bc87f3a270832570d4f5cf71f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          753e5a6a86927230f795f11328804eec

          SHA1

          29d7a469b22787cd2cd3ef87a77943471d3862f5

          SHA256

          10786b3308e58e005e94e959fb196ae95ced091e13514c58c8655d0ec191afcf

          SHA512

          d61b04af73dd61500d36d5767cf1b4b5c834b084b02f6563d4a37096bec4cd209486c4fa27fbf2db460d97dc1332d5e998867bab7e85c16cb6365a7d01d69280

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          ddf32ec516a02527bfb08dcb86a0c46b

          SHA1

          74d80c4bbc107f852e447b22cc66d0e8d7aa7aa6

          SHA256

          718fa2501f901c07cfff403e714bfac8bee968a6862e303a7132b5c112b2c87a

          SHA512

          dc04d273701e76fadb3fed8f976b045976a460a133e949222c4e679955cbc97e5c85a5ccadc16a7b9be95df85aef8f6f63ca76c7cdb55f6b2c92078ab243aa77

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f70559fbe097982be1323e82a55205b2

          SHA1

          8bbb201b78eddee9cdf4ca838b622f071fc6a496

          SHA256

          801b72ed2b8a9e533a53ab308cb788f770cad79d2d31b63a523c00b01cfd4aa4

          SHA512

          c52aa46c090c23e05ee854c2d92a246cd82955d09a6cad1f109288d3466fd356a58121f7ee16b80130b3bb5b478bf1769c5800cfc173192aed70fbe35b0b5e5a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          f73bdf26c1b64c1dc1738b6ec07a5f4a

          SHA1

          0256d2ba99691af835118b5a7f459cf3e22d46d4

          SHA256

          fa29f75252e62556d4bdf2cefe2c027f3f918c952e67271b347a885c6cd467c1

          SHA512

          e1a1e3bba3cdaa8f0e3705211c118d1e328380ad8722d6c4ad26bbfb81b1a5a19f36d5610ba1d6d4b4ef9ca85de86f01d0d37a59c2975e0324bde7a2f0956651

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          3e791600dd4c05963719825866144ef5

          SHA1

          b068543f1ba9d47133d27687a14f520329d88387

          SHA256

          5d399595061fd5453b22cc1ab0e7363e90981bcc73f4712c32871b949fe577dd

          SHA512

          86f8621eae7b5cedef218b7a1fb3086d0feb53d5a0aea26a7c1ae6b3c03782ea1647b136eaff995b2d6edaffab65dd9c914b44d6ff47ea6049926e78ab465869

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1d9ddbad50e7d05dd677791d17baa0bf

          SHA1

          48bd53ed3b8069f4d8b474f238766dd1610e2769

          SHA256

          acb44ddee04b5f8345ac36396653420a3740899f5d0d8beee834a51c0054ac87

          SHA512

          69ec2d55782706c13894a5170ec1de5b00568e4eb15d9a5bdb080cf6384d60e8060e1098f938ddf7c700f75eaf1f870f4413b484e0657f9eabdbcc7f6d9d0533

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          c8018557732eadd56f2362a4d94d18ab

          SHA1

          a0be0e82f9c9b4962405b877e5e80198a4b3f308

          SHA256

          8ee1b430d054fc5c5a45a7dff749f75e96b01343820633f900a26197c75227ae

          SHA512

          3ee66438408f84896688b43120a0b2f5c22e4aca40c8dd73fd98fcd75c4b3589d51754668528abd524797493b00a6178e657e5764759ccfdba74e1af474273c5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          719a36ae7506009220055ae121d212f4

          SHA1

          c548825be06c480d8557b35ee6cb93157e2a86be

          SHA256

          aca6ba3a901496b77cda7b65f6e8f2dd3d66f4f147655a0c78f039aeaf477059

          SHA512

          85b1227c95519ccb617df3a8117ec4775bd13b9d2408c5e46b4ccaa6a4f58ad3d5f5b7e39031c4a0ac81815310ba977c2be0a2084b866e586abb9ccf111ea7bd

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0437d69b3f86d93b5c452b24e9b1e89f

          SHA1

          6f6d5b2cab51f3422bb7720de6dc8d65ad1e02c9

          SHA256

          e97f7619b8d58a57913b6beee1a2f055e00e74889119168ed8bd5ec34958994c

          SHA512

          36459878c0f1cb2595aade111d863c44c858127de5dd0f5395d5f987bc43942f276e8a08bbc3c96ed4508ddded3e34daaaa312408e27a42d9afd88df54cf1bf7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aa31dfc956abaedb6ece47e4a4327867

          SHA1

          c73f6f15aa73f97d8cad6cbf7eb354d7145cda78

          SHA256

          ddb3b6529caac5e305901fb4f6403432da900b49f06d025d83f0469991aaa7e0

          SHA512

          2b1f89d16f842370b24a17312fb1bf264250789c74f138dedd48a36327de2d85efb48b4a97bfff3b77066c333a4c8061e536b6663e0e7edd8c2faebd6c982442

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          7535bf071f11b2641a1bc85e0a4d45c5

          SHA1

          630f4e8bd3978cd7633953252080d2d9fba48528

          SHA256

          241782304f27aa17f9b6e6b81d90558b8c9401dfbdf6157fcec87e0f7126ddae

          SHA512

          5b5fc30b0657d0ef2c55404e27c4b7a62a3c10aca04df13d1af86f581660ba9b42729e888b8b4a60b8fb5364b0019404fd13c8bc11905deead781d7e4230ad33

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          1175377724e4660533f4ed2b8ca852af

          SHA1

          0048a57f6f2cdc9de1dce8c0db848d95e1e5857a

          SHA256

          53e8683c0934ebf8ff131e143f54d6a9ccd1e31cf9373283298c8748042692bb

          SHA512

          ce433da148110f1a201a8aeb0ef52bedbbf64759278cc9ce2fe6fe084b7f06fced59208ac18a9273b8f27bdffe70f4dfd78b47ca65ff2cfb9c5a80445c730431

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d5e494b04692302628b227410265afe2

          SHA1

          5c4ba6b784a4f2573ec8bfd95b3ca5017cb979a9

          SHA256

          4cc6414fd9f3ce0127ce8711a0e8b426e96e89a7cbfb893768b8c0709c50a744

          SHA512

          787796fd776c998c705ad70e550e7a57bb873ffde9548b9368fedb1a2decedd26000d96cb57823fe8dd2b9118243fb578186d13237b7c38f0c125537ce098e82

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          71de2d9680563ea82fb13d8201d92c7b

          SHA1

          5f0d04eced0d05a767c093f81d3ac3c464e68bb1

          SHA256

          64c5df1a00248bd894038c975fdbbb602bea195118addee13e6c53fcdf7010b5

          SHA512

          c55f6fbfa4928452d67a422bdf58042d5ed459f93a4e34533329d94776ea956cb48ee1fb9d69ae0e3bf0cc001cdadee12daaaf51dd748b20549c0f8ccac47ef1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bd3f45ffa6b6f7e52e73603582ddefa7

          SHA1

          28df86f95345ede75fe8e0248ee98038cc0cd62b

          SHA256

          495cbef15bb09f0f501eaaa4c6ebf0d5d914cf2e3ab0ce54a1bfa4ce014f5406

          SHA512

          cdba0d889e6891d03069f39afaf487bdf6a9a0f5ea45e868b76646b0d08de11c5d1d6ce77b5f0579f12230d024f709e9f1fc9a4ef7bada3fb354e51bded1a29b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          0f9d8c28c4c9418891c37139dc02edb9

          SHA1

          e16cc5a4423abdcbc787408270f725d4763cdb83

          SHA256

          5f3715b6fcefc17fbd740535daead62404fde5d690b9928dfb650b5a4e24bf43

          SHA512

          cf423f46de575ec7483613ed0aa35e9eb3d5511bbeaf85c3c6a8d6d70654971d7625cdf83b96792ba5378ecbfbd0db142da76727cae9a3f5f6e7cc14f352c4da

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\07W59XLS\bwqqUmkUH[1].js

          Filesize

          32KB

          MD5

          f48baec69cc4dc0852d118259eff2d56

          SHA1

          e64c6e4423421da5b35700154810cb67160bc32b

          SHA256

          463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c

          SHA512

          06fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L1OO9XZU\favicon[1].ico

          Filesize

          4KB

          MD5

          da597791be3b6e732f0bc8b20e38ee62

          SHA1

          1125c45d285c360542027d7554a5c442288974de

          SHA256

          5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

          SHA512

          d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

        • C:\Users\Admin\AppData\Local\Temp\Cab6CA9.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar6DF6.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

          Filesize

          784KB

          MD5

          4478948c5aa13372690dbc34cbaa5aaa

          SHA1

          7a6a2261ed136b98ab200f0c4c48706bbffa98ee

          SHA256

          8c21f4384ceb168ed0f129fb97c455c8d7c2382047e9f9d235269e25a88e6fdd

          SHA512

          d253c5310a347e19ebd71dd3cfeb0f5c2083fb90747381f8786de0c8f711dfd0760c4ec32470cfd3bfe89e41020153b2d6209c12f72d2a673c24ee97d5ef3e8d

        • C:\Users\Admin\AppData\Local\Temp\~DFB62D45D557627088.TMP

          Filesize

          16KB

          MD5

          a72fdba727be9c75ee87c0a9111bfa97

          SHA1

          b4ffbcac569ccf13e67bea99530cc76e9148b1dd

          SHA256

          ae017fc1baf5a40fc6f1bae8d3199b8eb188d7998be9c716501862f62ca47fbe

          SHA512

          6b32ee96e802a4605bff44ebb0021bdd8d339ab7138ca159ca17024d3a23abe07771b628262391a3eb196adc89b63ee362da42cbbb4cfb6aba8b6aadb73b6e63

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\5O1M0NZG.txt

          Filesize

          123B

          MD5

          d7441fb987550a99d5e5a6d1396589bc

          SHA1

          aebe66f66c475d72479888d4756cf990935b1428

          SHA256

          15bac73b4456ef132814de074e96b65bf32acbe3bc8307687f763f6c21e71476

          SHA512

          7d71f2d2cdb6f0d29ad139e6fe8c1b0ac5fd318c41fd15f127010dab9b67032c33adea50292b155485ae5be6b5ff8646b875a8547b12b0d754643005abff6e64

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\R5R3LGG5.txt

          Filesize

          107B

          MD5

          f5007247d5cbb8c0590c6a45887c912b

          SHA1

          a35ce5427a1f6cdd4c0af91648fb4cc3db850fac

          SHA256

          f0c5ff972c82d96a89287685588918689e1a8c9c0b015298ea0501f8caa67396

          SHA512

          ff675d2a8a439b791d2f98faf3313bb82cd4892d84d8dc8f6fe8e318772d6200c9944875434135f84823830507758c8be2896bbb664114cf21b0ee20e29a3924

        • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

          Filesize

          795KB

          MD5

          951c8fa65eba877dbd8de43fa7ee96ff

          SHA1

          980cac177b2858eefbf1953d22e45eb33b0cf638

          SHA256

          48e134b41a43aee6a50f36960a3d640255a159228762bbe949044f438f1ea48f

          SHA512

          ee90fb5d48ae84c4f58a730be7ce8461d8209fbd28c9ebb83daf853c19b39685032fb7e578afd355d1e0f53bfb6db73f35a4540caa70cd529f8f99cda24b5cb4

        • memory/940-83-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/940-65-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/1192-66-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/1192-87-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2152-28-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2152-42-0x0000000000480000-0x0000000000482000-memory.dmp

          Filesize

          8KB

        • memory/2152-671-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2912-25-0x00000000003B0000-0x00000000003D1000-memory.dmp

          Filesize

          132KB

        • memory/2912-23-0x00000000003B0000-0x00000000003D1000-memory.dmp

          Filesize

          132KB

        • memory/2912-26-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2912-22-0x00000000003B0000-0x00000000003D1000-memory.dmp

          Filesize

          132KB

        • memory/2912-1-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/2912-0-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/3048-29-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/3048-24-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/3048-64-0x00000000003D0000-0x00000000003F1000-memory.dmp

          Filesize

          132KB

        • memory/3048-67-0x00000000003D0000-0x00000000003D2000-memory.dmp

          Filesize

          8KB