Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 02:40

General

  • Target

    4c77dc9422e6a10a5d665fddd28dc6de_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    4c77dc9422e6a10a5d665fddd28dc6de

  • SHA1

    d634b9115c12a647572fa41310db0d527c1c43a4

  • SHA256

    0f64ae6002a31ccf74595b02abe8d234c27908f5cc053f4badee69bb42b496c4

  • SHA512

    5c69ea9943aa21ae2713346184cea3d9fc3dd5345185ccf2fc2cad23d7df3784d11ef2ef5d0aea6dbd46c27121982e4ad058b030860819228bb9ac3ab5ab2413

  • SSDEEP

    3072:1qpMJFLXBpNum6V0P60/KV69R1Vu8ljAE+cQqCdXe8hTJI:1qGvN4V0Pt9R1Vu8l0B9e8hTi

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c77dc9422e6a10a5d665fddd28dc6de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4c77dc9422e6a10a5d665fddd28dc6de_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\kage2011_check.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\1.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\PROGRA~1\INTERN~1\iexplore.exe
          C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://WWw.cnkankan.com/?82133
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1948
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\1.inf
          4⤵
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:1644
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\PPLive\2.bat
          4⤵
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:1672
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f
            5⤵
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            PID:1928
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.82133.com/?o"" /f
            5⤵
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            PID:2424
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\Software\tmp" /v "key" /d ""http://www.82133.com/?o"" /f
            5⤵
              PID:2400
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
              5⤵
              • Modifies registry class
              PID:1816
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\PPLive\3.bat""" /f
              5⤵
              • Modifies registry class
              PID:1784
            • C:\Windows\SysWOW64\attrib.exe
              attrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
              5⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:2744
            • C:\Windows\SysWOW64\attrib.exe
              attrib +s +h C:\Users\Admin\AppData\Roaming\PPLive\tmp
              5⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:2528
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\PPLive\2.inf
              5⤵
              • Adds Run key to start application
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              PID:2964
              • C:\Windows\SysWOW64\runonce.exe
                "C:\Windows\system32\runonce.exe" -r
                6⤵
                • Checks processor information in registry
                PID:2796
                • C:\Windows\SysWOW64\grpconv.exe
                  "C:\Windows\System32\grpconv.exe" -o
                  7⤵
                    PID:2772
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32 D:\VolumeDH\inj.dat,MainLoad
                5⤵
                  PID:2804
          • C:\Users\Admin\AppData\Local\Temp\inl1048.tmp
            C:\Users\Admin\AppData\Local\Temp\inl1048.tmp
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2912
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl1048.tmp > nul
              3⤵
                PID:2404
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4C77DC~1.EXE > nul
              2⤵
              • Deletes itself
              PID:1832

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            bda68304d8da61dea710e92caaaad41a

            SHA1

            0c1f63a364b29d3058fe787ab511fcdd299e035a

            SHA256

            a1f3cf2132781226176affa63506b3dbe83ca74c1e52a9a16a90ebb02fed9735

            SHA512

            a178affb5679425747b86de30358e8b874905a757a489c830a0ed02e5f772940fb18b4e20b7e8104854956c718e63ae1ac3acbfc636fbf4c9045bccbc4ad02e1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f3198a8e147733d0a208f8c232b42151

            SHA1

            ab66213346ad97df2e68c95459f29d3c1856f913

            SHA256

            8c226f2525f7da3273d8f04cfecbe67e1b0c5dc25b8c75384aaccc9e8a06bc1d

            SHA512

            ffe67134060c529ea3ef9640160db0563162d4f428b8f64898d376335ac5d275f2a9d736fb0f64e6eb44681bad9624b360a8d4efc89247eb37188f31b0475e1c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            a1ff00d44d155ee49c702bbc62dab487

            SHA1

            11e84273a54046469c7708fac11696dfd8e68415

            SHA256

            644c4bafb0e55cfc99b2771c1139eeca79fe9252d190aef87b3bd6d199f1a38d

            SHA512

            c5cbe9c51f34935f62c28aa441766852b094f3dfd2f19dfb01a593f23ee49760cab0744d95b8ec1663a29e8ceba9e7a61524d99f74ed65e691506373a84c5fa8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            e8b4df71970470a24dfb3c178fb8f0f9

            SHA1

            fd10b821428cc3e6fec57aecc08773aa11da5877

            SHA256

            f116b3587f9b31a0cedb7b0644b4ed4e327c4c96863579672acb8b227fb304f0

            SHA512

            1f85cd9d6bc9a587fc2f230e8c5045c37d047d53fafcc76ea94f10a2d52048fa44e57d5eeb906b854246cbf0e0653cb388a2515e3e5de8899412d09e7f77ffe9

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            3d8dc32d3894864d4facac38da30c29a

            SHA1

            d0445836cdada9dec7c7f9346a73b9f53c36455a

            SHA256

            8c363820806460d06d96e6f8c2c9334f51e1207cfdda8cc383731fd324184246

            SHA512

            84ca7b052713378d8137839a58df3e9b48b3bc11798c81d7b68da35b3a45c3afbdcfe5a944a0bd32bd62bc4da0353c4831a34bb52f42d9303f816c8fcc65c7b7

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            5169bb5ab3133ce6999c91ca6bc80bd5

            SHA1

            68fcc17134c41b76405dadbf37e7138e4c503627

            SHA256

            17ed69c2cc3746fbeda907466a36681230632b543f769417b3f30d4c8657b1c8

            SHA512

            35d77b833eb78e9c48211c45e2fba885cc169b54645ddd91ad099ecb2238ebefb2fcde2ef316fa01fe5d6ba8f9980eb2e16e6fe2f85e1e3585b9fafcaa763d8a

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            da84b651a1e6d20d88f67cbe6281266f

            SHA1

            d0cc2d8fb6496916049a564cac07f898345fba60

            SHA256

            9b11e234b4b2a44c27c707ba272a3c964eaf1a5107367eff5ec42661d09c0572

            SHA512

            0d8422c123e05e63425b22b567588f9badcafb64c781ec63acfc737346724aca5d2a733a0084156fa9bbca57c1738ac87294ec7b7c028d5c94f0e41bb9f24e13

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            491450876e37f36c998285d7d4d0e29b

            SHA1

            43f582e650e000f857cce499ead7fffb14fc9904

            SHA256

            64597496692078efcedfa851855f3c74ff7c245ec635e544879f5fc6a80c8b12

            SHA512

            35a246bf0cde097a5f0a5b1f6f69796411fc72cd7390bee690bbbc53cf928d28e50f2184e4409d36fac49920df4b92b40e99f9702db8093be04667fa38ef4bd4

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f8239703bf43aeefed6f92e40b2eb8c9

            SHA1

            141f5000951d2c9413e17494e558534f46ab2169

            SHA256

            96b764291b2567324f5c7fc0fa8e184b76b8a1a46b2530ed3ee1f51e20d23b7f

            SHA512

            ccbd9799e416a31505f011f2668e138c6b101792b84e16207646a365c33fc32724ac521c866f6ac5099d1b4754ad3a38d38f71a22e310f9d8637910d14a37b78

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            6607ddf7de8b65dc644e148ce4af7712

            SHA1

            bcf395f7da0ef39bedd8eb15652206e1a5bbc769

            SHA256

            fb02cbef4ca64d538b58d108fbb6746eb2840933252c18d54f0ce7aaacb34f31

            SHA512

            cbef79bc8b97c61159a77409404e55dd67b19d78d9459e614db5e61794b0e1fe8effade4cce88314cf8a754724718ef5d4f8048187de5bdbc22c5aa1a4280023

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            bb35355f3a2e1f1d292d05857ddfcfce

            SHA1

            49cd07f7aefa9293f4ca70ed70f526d6cb297b42

            SHA256

            c6b4809f2eeaff3f61bd50e0a73b65a93b8cd533a48ca23fe08b952ad5998626

            SHA512

            e2451c519421ecd5e76494b87e6541563067bf3490f16864a1fe41afdc024b6b35c87a259c1f861eb985e5cd5cf4c94a2da9c0e987e2021bd0f189bf96af9cff

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            b3bafb9c075095de482b11597d862c1f

            SHA1

            81a3484dcb614c054ad4eaafa4e50ca62b73db1a

            SHA256

            d0274036d59c74595f8b1f1c6496c5f861784aaec880f071be41e9893df22a83

            SHA512

            e047ef6dee0a32efbb25446a4dc9be3b9c48a37c8696d593f6e87c485a9a100e4b78c901018569d0251f23cedcc161ae9c411dfd569e088f546b9c9fa1745b99

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            3df171c9d2e214013091eefdbd339e81

            SHA1

            7930b717006f127fa4802f9b561adf80662aefcf

            SHA256

            8e5fc6b8b3cc2097ba5e7364acaf264c7aa456ae6cc37d30b12744e057697c58

            SHA512

            695071eb54f8eda2069fa82aaefe43f145e0f624a14295273fb3d5d9a12ee6b2cd96f25ce25f33a2d1d50e2dc75c982f5d924f904623e5ce9145e9f3c4a7e687

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            95ae5f48b575272bb8313a0fc804f6de

            SHA1

            194093e16b26a2a5412fff79f6b73782ebed65a5

            SHA256

            66820110ed871ebc59a0bd72bbdd6926aa3bb37ebbdc838426b86c675972df64

            SHA512

            a317fb7e4383ee7afb1bbfb59c3a7c5abf8b5b795d5effe02aab9d297b3088beae4f05677021508e1f15521f18ee1d3a80a06d07e774e307aff67ec66043cd81

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            f3cca40cb991997fc1d77c8d08f19e7c

            SHA1

            3afa890e05534cde30b5fa9913bce4bf5b5b4d15

            SHA256

            e5ab5ee883fc04c9c442e2cc97553a6ca5403fde810aff1e9d5869c2090d08a8

            SHA512

            1e5eb308a00a77815463c56e8d7beedfcf14ac71d590d479986df5fb94725e05f84ef13faff73dec35d17e93f5096ffac3534ef88cbec477ec6e11e35af62bba

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            c477b4fced6eb297cff3682da10b0042

            SHA1

            be0c98eaaed823a1fa8b7491c3e99700e2020f02

            SHA256

            9c5d9a7075bcc2e0a2b033309d220c84d12b10e79df7dfebda1e3439f4d2b7c2

            SHA512

            c0745844d0b1473706ff8061a12ec5c7a72a51a3a90d85bc4967a8d4f3885d712bce0264f2a77b7c6bd79f0ab9dd6e6a54aad67984bd9a394c29c00051bd964c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            d166d29bc951c57e32cbded24b043eaf

            SHA1

            d93e399086b706fc83afc0aa2fe153f016be4e5e

            SHA256

            2a2a0da182edc070ed4acee2cd1e61e92acfd30123b9a39f21010b80ed08e479

            SHA512

            1b92346192e20cfa37136aa0cb935b3bb853106f91deced736926417761b1069924e80125407d47a126821981452ad9e60e5113aa71407cc9fb8901dbbc83960

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            6578c9abe9c09a1b57c6e03c43958417

            SHA1

            be0dc1774223dbbd033c4915c775024c0a4e215d

            SHA256

            915c895d137eb57b68f2abea20dff32112cb0428c046bc27ba9e87a65d41c8b5

            SHA512

            89a9874c537823e0a648184b73f2001f47a20e09fc23864bb8871ff7c38036a322a7e485823486aec90b0b7f469df426aae67e64ae491c1c27cb8098226fada0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            45d067bb91d1b46ebcb4fe5d447305c6

            SHA1

            9d1b8f51cbba72b2e59f2ff980f710d13265d174

            SHA256

            8f4783d2b35fd46afa3813723ffb3e03efd275b40597ea6bacb95e96b54850ea

            SHA512

            2a31444676e3160d5f7b555a57f4643de056d797ac3140048afdf49a2d48de9b1c2e872cc48af5560823c08e11a0ece46a2d55ac6998e6fdd9729d9d0399a3d3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0E1IWGZ4\favicon[1].htm

            Filesize

            802B

            MD5

            b4f7d6a0d3f6605440a1f5574f90a30c

            SHA1

            9d91801562174d73d77f1f10a049c594f969172a

            SHA256

            e3b1510526757baa753c916ababce951be64146e04f74c631c6503531d83c6cd

            SHA512

            c852ff3b51db00184bcfb0d6609a2791cb81efdb0d8d5aaed1c5b9e576b17b19804affe6ea7b5db575179c166543db5dcd828b3fcbd90e8baabb47c166da7c3f

          • C:\Users\Admin\AppData\Local\Temp\Cab1094.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\Tar1135.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Users\Admin\AppData\Local\Temp\kage2011_check.bat

            Filesize

            53B

            MD5

            23962a245f75fe25510051582203aff1

            SHA1

            20832a3a1179bb2730194d2f7738d41d5d669a43

            SHA256

            1abcea214b9b2bd76cc04be07ae2d4d70371e6ca443d99f4f1327afe7a5fc647

            SHA512

            dc36b64f2dbb710652900a31295c148760b0c44eae13515aa29613916c9dffe3d8e55ba61568f7c27b43bf0c341f7dcd4b9c721f81627fc6bb915b15c358fe80

          • C:\Users\Admin\AppData\Local\Temp\winrar_config.tmp

            Filesize

            555B

            MD5

            458a331595f313d6bd4ac9cfd0a769c8

            SHA1

            74dffa252fbbf48b8f27900a0b77b339c4678115

            SHA256

            2387b151c34a6ee91d2f8a47976ec35c9fc6ea9ecbe0330e156a3a00d51cc0b2

            SHA512

            5b84b8bd34ab1816a2301330e6778fa1cb97c42eafee18c876aa73da26b4d7d1475def53558e2a69baf318c26b3227666a9c6fb4cb7d26d662ac2a7273970d26

          • C:\Users\Admin\AppData\Roaming\PPLive\1.bat

            Filesize

            3KB

            MD5

            b7c5e3b416b1d1b5541ef44662e1a764

            SHA1

            8bff7ea2be2f3cf29f2381d8007198b5991ca3ae

            SHA256

            f1a2f9fdebb3cac24756e53fa5e1628b2bd1cc130480c1878e3b3bc880575cd1

            SHA512

            65dbd6a7a7cf6fec00e6b0f1d7d5655769e6087ad09cad74c91c5a3395e675ac8f9df5c7185327e6f8dd03ddb60504400f54237d9e4b53c8b08e7e3d41ee61fc

          • C:\Users\Admin\AppData\Roaming\PPLive\1.inf

            Filesize

            492B

            MD5

            34c14b8530e1094e792527f7a474fe77

            SHA1

            f71c4e9091140256b34c18220d1dd1efab1f301d

            SHA256

            fe0dfb3458bfe2a3632d365e00765fa10f14d62e7dfa8b70a055c7eb9fdb6713

            SHA512

            25bb09b526e1e9f5c6052f1f7c36b37c956c1b5649936af8df3abfcf120c931f3d2603e17a061cb99d8c8074bfb1973a5423cce89762fca53cd46aeb3e8944a2

          • C:\Users\Admin\AppData\Roaming\PPLive\2.bat

            Filesize

            3KB

            MD5

            6b78cb8ced798ca5df5612dd62ce0965

            SHA1

            5a9c299393b96b0bf8f6770e3c7b0318a9e2e0cf

            SHA256

            81f64f42edfac2863a55db8fabd528c4eefc67f7e658cad6a57eeec862e444e3

            SHA512

            b387ba10021f3284d1406d520a2c8b3ba0c87922d67c79394c1aa50c631194519ac6bb5b898956533f040d48e1c7b202734e0075f8fc8c8bfab82c8ef359b28e

          • C:\Users\Admin\AppData\Roaming\PPLive\2.inf

            Filesize

            247B

            MD5

            ca436f6f187bc049f9271ecdcbf348fa

            SHA1

            bf8a548071cfc150f7affb802538edf03d281106

            SHA256

            6cdfa9b7f0e1e4ee16bc8ce5d7448d47ea8866c1f55f3e56be5c2a4d183ca534

            SHA512

            d19e20aabddad6b0284f8c1d473e9180f30b49d4d8b54f26e7c8630228e16b1f6ba04023c5e8b1993d8a10d97adcfff683b216f79b9981bf16181641aebdd591

          • C:\Users\Admin\AppData\Roaming\PPLive\4.bat

            Filesize

            12.3MB

            MD5

            27e29a7c4d16886f3ee0665c287a328f

            SHA1

            8754d5dfc9b7f44e8fb0d59776cb255f34abb5cd

            SHA256

            12372f97d14bf95de1ce112e0ec9a54a16fa3c397ab2610396623224a549d764

            SHA512

            61758baada04ef507468eaf881af3f3186c35b1a8b409d25a688b352c058cbc9b080dd7d679e63921ff556417565d5e78fc2b28110f741e9847fca69c01df292

          • memory/1636-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1636-92-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2572-59-0x00000000030A0000-0x00000000030B0000-memory.dmp

            Filesize

            64KB