Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 07:07

General

  • Target

    48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe

  • Size

    936KB

  • MD5

    48bc87a9204fe25e1a18bf2640dfed61

  • SHA1

    7430784fe61fb6e8de9cdd5b5365e81b9bb793e0

  • SHA256

    0ce512a25f2e1f57c65984db9e01998ce514000672050e32a7ec6b624ecdea6f

  • SHA512

    ad4f61800bdcd419e166fec4855708d10817f864393b96564e58fd9f165f480011ace5b1b73eb633880d9d65589016e87908c880738fc404523c448611243b36

  • SSDEEP

    24576:V7q55ahO1N+AuTpoLb+/k1AMDhHxRHONMJ5:V255ahO1N+DTpoX+/m9HyNMT

Malware Config

Signatures

  • ISR Stealer

    ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

  • ISR Stealer payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Users\Admin\AppData\Local\Temp\48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Users\Admin\AppData\Local\Temp\bie_7install86.exe
        "C:\Users\Admin\AppData\Local\Temp\bie_7install86.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:412
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.bat" "
          4⤵
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:3804
          • C:\Windows\SysWOW64\cscript.exe
            cscript C:\Windows\system32\slmgr.vbs /ipk 33PXH-7Y6KF-2VJC9-XBBR8-HVTHH
            5⤵
              PID:3416
            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bie_kms.exe
              C:\Users\Admin\AppData\Local\Temp\RarSFX0\bie_kms.exe
              5⤵
              • Executes dropped EXE
              PID:3676
            • C:\Windows\SysWOW64\cscript.exe
              cscript C:\Windows\system32\slmgr.vbs /skms 127.0.0.1
              5⤵
                PID:1444
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 16 localhost
                5⤵
                • Runs ping.exe
                PID:2336
              • C:\Windows\SysWOW64\cscript.exe
                cscript C:\Windows\system32\slmgr.vbs /ato
                5⤵
                  PID:2008
                • C:\Windows\SysWOW64\findstr.exe
                  findstr "8007000D" C:\Windows\check.txt
                  5⤵
                    PID:4200
                  • C:\Windows\SysWOW64\cscript.exe
                    cscript C:\Windows\system32\slmgr.vbs /ato
                    5⤵
                      PID:2460
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr "8007000D" C:\Windows\check.txt
                      5⤵
                        PID:3788
                      • C:\Windows\SysWOW64\cscript.exe
                        cscript C:\Windows\system32\slmgr.vbs /ato
                        5⤵
                          PID:4540
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr "8007000D" C:\Windows\check.txt
                          5⤵
                            PID:2248
                          • C:\Windows\SysWOW64\cscript.exe
                            cscript C:\Windows\system32\slmgr.vbs /ato
                            5⤵
                              PID:1908
                            • C:\Windows\SysWOW64\findstr.exe
                              findstr "8007000D" C:\Windows\check.txt
                              5⤵
                                PID:4068
                              • C:\Windows\SysWOW64\cscript.exe
                                cscript C:\Windows\system32\slmgr.vbs /ato
                                5⤵
                                  PID:4304
                                • C:\Windows\SysWOW64\findstr.exe
                                  findstr "8007000D" C:\Windows\check.txt
                                  5⤵
                                    PID:5008
                                  • C:\Windows\SysWOW64\cscript.exe
                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                    5⤵
                                      PID:2216
                                    • C:\Windows\SysWOW64\findstr.exe
                                      findstr "8007000D" C:\Windows\check.txt
                                      5⤵
                                        PID:4460
                                      • C:\Windows\SysWOW64\cscript.exe
                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                        5⤵
                                          PID:3672
                                        • C:\Windows\SysWOW64\findstr.exe
                                          findstr "8007000D" C:\Windows\check.txt
                                          5⤵
                                            PID:2532
                                          • C:\Windows\SysWOW64\cscript.exe
                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                            5⤵
                                              PID:4376
                                            • C:\Windows\SysWOW64\findstr.exe
                                              findstr "8007000D" C:\Windows\check.txt
                                              5⤵
                                                PID:2648
                                              • C:\Windows\SysWOW64\cscript.exe
                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                5⤵
                                                  PID:1840
                                                • C:\Windows\SysWOW64\findstr.exe
                                                  findstr "8007000D" C:\Windows\check.txt
                                                  5⤵
                                                    PID:2944
                                                  • C:\Windows\SysWOW64\cscript.exe
                                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                                    5⤵
                                                      PID:3224
                                                    • C:\Windows\SysWOW64\findstr.exe
                                                      findstr "8007000D" C:\Windows\check.txt
                                                      5⤵
                                                        PID:372
                                                      • C:\Windows\SysWOW64\cscript.exe
                                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                                        5⤵
                                                          PID:4860
                                                        • C:\Windows\SysWOW64\findstr.exe
                                                          findstr "8007000D" C:\Windows\check.txt
                                                          5⤵
                                                            PID:684
                                                          • C:\Windows\SysWOW64\cscript.exe
                                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                                            5⤵
                                                              PID:1944
                                                            • C:\Windows\SysWOW64\findstr.exe
                                                              findstr "8007000D" C:\Windows\check.txt
                                                              5⤵
                                                                PID:1748
                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                                5⤵
                                                                  PID:1744
                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                  findstr "8007000D" C:\Windows\check.txt
                                                                  5⤵
                                                                    PID:1016
                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                                                    5⤵
                                                                      PID:2340
                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                      findstr "8007000D" C:\Windows\check.txt
                                                                      5⤵
                                                                        PID:1536
                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                                                        5⤵
                                                                          PID:1416
                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                          findstr "8007000D" C:\Windows\check.txt
                                                                          5⤵
                                                                            PID:4904
                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                                                            5⤵
                                                                              PID:4032
                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                              findstr "8007000D" C:\Windows\check.txt
                                                                              5⤵
                                                                                PID:5116
                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                5⤵
                                                                                  PID:2804
                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                  findstr "8007000D" C:\Windows\check.txt
                                                                                  5⤵
                                                                                    PID:2828
                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                    5⤵
                                                                                      PID:436
                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                      findstr "8007000D" C:\Windows\check.txt
                                                                                      5⤵
                                                                                        PID:3272
                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                        5⤵
                                                                                          PID:4492
                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                          findstr "8007000D" C:\Windows\check.txt
                                                                                          5⤵
                                                                                            PID:512
                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                            5⤵
                                                                                              PID:228
                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                              findstr "8007000D" C:\Windows\check.txt
                                                                                              5⤵
                                                                                                PID:4256
                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                5⤵
                                                                                                  PID:1332
                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                  findstr "8007000D" C:\Windows\check.txt
                                                                                                  5⤵
                                                                                                    PID:3104
                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                    5⤵
                                                                                                      PID:2476
                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                      findstr "8007000D" C:\Windows\check.txt
                                                                                                      5⤵
                                                                                                        PID:3604
                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                        5⤵
                                                                                                          PID:5108
                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                          findstr "8007000D" C:\Windows\check.txt
                                                                                                          5⤵
                                                                                                            PID:1496
                                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                            5⤵
                                                                                                              PID:2036
                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                              findstr "8007000D" C:\Windows\check.txt
                                                                                                              5⤵
                                                                                                                PID:3740
                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                5⤵
                                                                                                                  PID:1488
                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                  findstr "8007000D" C:\Windows\check.txt
                                                                                                                  5⤵
                                                                                                                    PID:3488
                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                    5⤵
                                                                                                                      PID:4036
                                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                                      findstr "8007000D" C:\Windows\check.txt
                                                                                                                      5⤵
                                                                                                                        PID:4480
                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                        5⤵
                                                                                                                          PID:2648
                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                          findstr "8007000D" C:\Windows\check.txt
                                                                                                                          5⤵
                                                                                                                            PID:2752
                                                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                            5⤵
                                                                                                                              PID:1540
                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                              findstr "8007000D" C:\Windows\check.txt
                                                                                                                              5⤵
                                                                                                                                PID:1740
                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                5⤵
                                                                                                                                  PID:1468
                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                  findstr "8007000D" C:\Windows\check.txt
                                                                                                                                  5⤵
                                                                                                                                    PID:4976
                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                    5⤵
                                                                                                                                      PID:1548
                                                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                      findstr "8007000D" C:\Windows\check.txt
                                                                                                                                      5⤵
                                                                                                                                        PID:1688
                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                        5⤵
                                                                                                                                          PID:2760
                                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                          findstr "8007000D" C:\Windows\check.txt
                                                                                                                                          5⤵
                                                                                                                                            PID:3828
                                                                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                            5⤵
                                                                                                                                              PID:448
                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                              findstr "8007000D" C:\Windows\check.txt
                                                                                                                                              5⤵
                                                                                                                                                PID:4124
                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                5⤵
                                                                                                                                                  PID:5064
                                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                  findstr "8007000D" C:\Windows\check.txt
                                                                                                                                                  5⤵
                                                                                                                                                    PID:4768
                                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                    5⤵
                                                                                                                                                      PID:2144
                                                                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                      findstr "8007000D" C:\Windows\check.txt
                                                                                                                                                      5⤵
                                                                                                                                                        PID:1652
                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                        5⤵
                                                                                                                                                          PID:3204
                                                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                          findstr "8007000D" C:\Windows\check.txt
                                                                                                                                                          5⤵
                                                                                                                                                            PID:1512
                                                                                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                            5⤵
                                                                                                                                                              PID:1528
                                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                              findstr "8007000D" C:\Windows\check.txt
                                                                                                                                                              5⤵
                                                                                                                                                                PID:2932
                                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:5112
                                                                                                                                                                • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                  findstr "8007000D" C:\Windows\check.txt
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:4836
                                                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                    cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:4184
                                                                                                                                                                    • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                      findstr "8007000D" C:\Windows\check.txt
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:3552
                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                        cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:4516
                                                                                                                                                                        • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                          findstr "8007000D" C:\Windows\check.txt
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:4968
                                                                                                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                            cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:244
                                                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                              findstr "8007000D" C:\Windows\check.txt
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:696
                                                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                cscript C:\Windows\system32\slmgr.vbs /ato
                                                                                                                                                                                5⤵
                                                                                                                                                                                  PID:2728
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                                              PID:4440
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe
                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Writes to the Master Boot Record (MBR)
                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                                PID:2232
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"
                                                                                                                                                                                  5⤵
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                                  PID:4512
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe
                                                                                                                                                                                    /scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"
                                                                                                                                                                                    6⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    PID:4320

                                                                                                                                                                        Network

                                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                                        Replay Monitor

                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                        Downloads

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bie_kms.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          73KB

                                                                                                                                                                          MD5

                                                                                                                                                                          f4d6c55c7b137a1d8c16430287aedf40

                                                                                                                                                                          SHA1

                                                                                                                                                                          45d9902691fbcc295739764b96081b2a508311b7

                                                                                                                                                                          SHA256

                                                                                                                                                                          8a4286546d14e1edb583278ef4226ee6542515b55a258bbfbce6d303a090c8a7

                                                                                                                                                                          SHA512

                                                                                                                                                                          9f2e91a291ce4057fc67c4e91aaa7a9e696ce67cecec46e12372356e0b696dcfac56c6003d2c8bd897479603b8ba02aae9045399fe9648cfb838506a692d9d83

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.bat

                                                                                                                                                                          Filesize

                                                                                                                                                                          939B

                                                                                                                                                                          MD5

                                                                                                                                                                          2416c7a0bb675b13a82db797a0a0f4cb

                                                                                                                                                                          SHA1

                                                                                                                                                                          ba7d6df4cdb8801cc4f43eaed7e77f528bd6a917

                                                                                                                                                                          SHA256

                                                                                                                                                                          5a2a2d0b9c642abeff0bce8cfa9b5e0432f56069f8366b30bca56b2b5fe7c0fb

                                                                                                                                                                          SHA512

                                                                                                                                                                          4238b21d5aff13c02e5cf5c981983e2071b1543a96bb07a15b8f59fa2575652f9d3338e9ffa93a5bece1bc0f3e050acacceac5a141671f8522f8bbc98687e519

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          488KB

                                                                                                                                                                          MD5

                                                                                                                                                                          89c6bf05f4d149d84822e906c29723e5

                                                                                                                                                                          SHA1

                                                                                                                                                                          a7b1df099f236a66b2e521e37821e185d2c1ba37

                                                                                                                                                                          SHA256

                                                                                                                                                                          3d45fde0386fcc7e82a8e799a64864c6deb4ebd33a716b54f851b566968c5050

                                                                                                                                                                          SHA512

                                                                                                                                                                          77620db2d71edb2279d84bb685bd13d67451bb14da19017a86b25cf2b79ecd5df54357cacc4a07b278c67c0d2c35164bd9e93e1107dca176694803f9667eb606

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\bie_7install86.exe

                                                                                                                                                                          Filesize

                                                                                                                                                                          161KB

                                                                                                                                                                          MD5

                                                                                                                                                                          59d2756095c2911453dd2bfc19732108

                                                                                                                                                                          SHA1

                                                                                                                                                                          50dc150e4590f68245560670016087f125135c1a

                                                                                                                                                                          SHA256

                                                                                                                                                                          7b8d6ed119c2d6af805e4a5276bd4df476e2632abc04070f1ac01eae3bc7478c

                                                                                                                                                                          SHA512

                                                                                                                                                                          d0f676b381befab2fa0d94e374006f4316b0a523f603be99872a392030affd0b7d9c3c4a8c5896b3cfdf12292d11fb7d0e04f65c0b9e7fcffeb9d8707fb70693

                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp.ini

                                                                                                                                                                          Filesize

                                                                                                                                                                          5B

                                                                                                                                                                          MD5

                                                                                                                                                                          d1ea279fb5559c020a1b4137dc4de237

                                                                                                                                                                          SHA1

                                                                                                                                                                          db6f8988af46b56216a6f0daf95ab8c9bdb57400

                                                                                                                                                                          SHA256

                                                                                                                                                                          fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba

                                                                                                                                                                          SHA512

                                                                                                                                                                          720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3

                                                                                                                                                                        • C:\Windows\check.txt

                                                                                                                                                                          Filesize

                                                                                                                                                                          257B

                                                                                                                                                                          MD5

                                                                                                                                                                          1ed51c6aa96e4d3c1cb096663cac9377

                                                                                                                                                                          SHA1

                                                                                                                                                                          529b1a20a046fe8d5c9f0016a21f5608f40e6896

                                                                                                                                                                          SHA256

                                                                                                                                                                          1829e00aeda812ee6f82973728bc86874c23fc2919685cb6d3f73456882ff718

                                                                                                                                                                          SHA512

                                                                                                                                                                          a3fafc73739fd3da069076dce97a700a27783e51dd520853ecb7af0dcd337d22eb1424e128500f47964ffb3a04e03e630854748d2a6f58cb7e1ef6da0a064af1

                                                                                                                                                                        • memory/2232-44-0x0000000000400000-0x000000000043D000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          244KB

                                                                                                                                                                        • memory/2232-37-0x0000000000400000-0x000000000043D000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          244KB

                                                                                                                                                                        • memory/2232-35-0x0000000000400000-0x000000000043D000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          244KB

                                                                                                                                                                        • memory/3676-60-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-74-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-103-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-95-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-88-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-81-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-134-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-118-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-141-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-111-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-62-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-148-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-65-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/3676-125-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          172KB

                                                                                                                                                                        • memory/4320-50-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          332KB

                                                                                                                                                                        • memory/4320-49-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          332KB

                                                                                                                                                                        • memory/4320-53-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          332KB

                                                                                                                                                                        • memory/4320-47-0x0000000000400000-0x0000000000453000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          332KB

                                                                                                                                                                        • memory/4512-40-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          204KB

                                                                                                                                                                        • memory/4512-56-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          204KB

                                                                                                                                                                        • memory/4512-42-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          204KB

                                                                                                                                                                        • memory/4592-2-0x0000000000400000-0x00000000004AE000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          696KB

                                                                                                                                                                        • memory/4592-27-0x0000000000400000-0x00000000004AE000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          696KB

                                                                                                                                                                        • memory/4592-4-0x0000000000400000-0x00000000004AE000-memory.dmp

                                                                                                                                                                          Filesize

                                                                                                                                                                          696KB