Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 14:43

General

  • Target

    8ac40f27bf7e8e6ca3f436a4b31dd124_JaffaCakes118.exe

  • Size

    3.0MB

  • MD5

    8ac40f27bf7e8e6ca3f436a4b31dd124

  • SHA1

    d1943297ef12a3ff8448d864772c5d77550cac03

  • SHA256

    8f5be6c63886d7ca78d8e3be205cbacc33305efc8302b4d1f50bad9dba962854

  • SHA512

    b2ca3e7207adf86de2f724cda8f2494ee1762d8a9de252f24dee21786f2eeca420a06da5de2109ff72f0c280cc95f52df6ac30e6f6b3b06f34cfa03df11aed17

  • SSDEEP

    49152:w7sVVPrbhNGWZTGfCrRTxXgzvXxBMuxmOERCi6uYDh15OCblWOHtCMvYL+na3AXM:bVVPSERBkHnxmOeYD7RbVtCMwLxkm1rZ

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ac40f27bf7e8e6ca3f436a4b31dd124_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ac40f27bf7e8e6ca3f436a4b31dd124_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisetup.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisetup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md \§ÚªºCAI >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1816
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1640
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\score >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:840
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.dat \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2204
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy Wordµû¤À.exe \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2860
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.dll \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:340
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.928 \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1988
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.gif \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2236
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.bmp \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2388
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.jpeg \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ\*.jpg /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1500
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.doc \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2908
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.htm \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2416
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.jpg \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2412
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy testdata.exe \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2736
      • C:\§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\Wordµû¤À.exe
        WORD~1.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\001.gif

    Filesize

    25KB

    MD5

    9067f41197394981079d04af3114eced

    SHA1

    40b4c60b7f4e7052269376127f6b4c740f03e6f3

    SHA256

    a24be7ef6c28e84d28ae771c4bf6d24201ed3ea5c3fb7e91d75c2941c58a6a00

    SHA512

    999cbf731a450a305fbfc8c538703cd6aa7f618c20f4118bb3f8b915a12e0b2249c9f02bcb5994d8482fdcbcc592091fccd03cf993dd59989ce374ba8a4ce2c7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\002.gif

    Filesize

    24KB

    MD5

    dd89b23683349648c421dec03f50a862

    SHA1

    705ae8d30aae212499b11274701954fb58256681

    SHA256

    58eab60cc65ac41f7ac5df6264e06086f237d0028e1ef125609e986c4ea15c4f

    SHA512

    7f21bfaec86ce093d9cd558011bddf718092528e1b9183d5fba769c77b33a074bf82933326bf8578ce9493dffb9a62134331c1c7b94c2a09559f61c73a4fd039

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\003.gif

    Filesize

    25KB

    MD5

    e3e27568ad2a5443c7bf6573180deee1

    SHA1

    7e21b2aafa07d0b9d84902529cef0fe0c6696460

    SHA256

    88b95924b6054ed9d291d4c4e28eba16c7b73a748a35fc2b752677555edb02e7

    SHA512

    dcc346bfedb2e4fe36a954a835e8213cfa4f1ff628acf54d509a5ad27e1f77791ba823c086d31a6935b48af7f160459913a11ea3679edc86168ae8dd3a8b28c2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\004.gif

    Filesize

    44KB

    MD5

    82a636e7c6f6be0bd914d8aad2ae054a

    SHA1

    9fc8089ff531864d79bf4c928a427924e1b5d180

    SHA256

    d5c05ce5b542456f7fee6438cec0a3771c3be3ce971469399ef6cf7d94c47565

    SHA512

    ddf0dc80514c796ae4942f3d81500b3f82fcddcb2a9a4aac52d8aaa40829b323d89044e01001ad917c16bbbcee3a5600b5e4c329a7b27cf2752b9eeb6521e477

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\005.gif

    Filesize

    31KB

    MD5

    aa03e0b4576dfe7802aac083775cb454

    SHA1

    359b93b2f5b4ff25e47cbc96f06ac5e9d04641b3

    SHA256

    10ce7eaa2d6e400ad8b1bfb36202f0f3c0bfbf618a86e15cfe5c456a937b45ef

    SHA512

    630062e20ba2712411b93002f0129ce745a2f6f75ffb989b69c555d060a383efec3bd4dce48120a0b6b35bf71d8df63c97e1137cbda59c1038b82ebc922d2ae9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\006.gif

    Filesize

    28KB

    MD5

    de618b61bf3ef7a55850634d79f2ac6c

    SHA1

    1fbc3ef6af8eae5d4d81196cea93c9ef5d430a6f

    SHA256

    abb66246fa953537e7ba8bc4b4fe8de5a6ae99d07444d62306414fb6c63c819b

    SHA512

    d2e67edad409a1864c96c582f03b7387c7618ae06d61a1d277d3d04193732600c2a18e4ee9d6cbdf5be422c76e0886829ff79b82a9b6d0715306154fd0236220

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\007.gif

    Filesize

    38KB

    MD5

    04211824a10595c37eab07c0c305b097

    SHA1

    0ba52f191556d5f2603494387df76a4353be66f4

    SHA256

    9c46d5bc4b3df54404ca31abc60344ece4297dbfaf245dd00eb6c53cb6513119

    SHA512

    33bc31babbf48aba207d3e5058b37e5ad0c801d3249312ca386c7daeacffc956b91ce13cf0eeb0495f0f40973c3701b30c0a06b4573a0fc3f25ccce28c749576

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\008.gif

    Filesize

    40KB

    MD5

    00fdabca1987b8a49a0c4cfeca4e3793

    SHA1

    20e6fd441496ebddd934eafe46e629ca113efc05

    SHA256

    4559438d0f9cc88301b31d5860073487fce84b27a2d2c10cb22f28990517b2d8

    SHA512

    903d0e34384ca71706e96ebf418bd6adae1cd5972fcf41d6316e735867412ef33f0b6a3fd4f38aa16ab95b7aee4406475614ab6ea7998f796dbceec5c258ad95

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\009.gif

    Filesize

    27KB

    MD5

    80c239efd6d4c2ceca7f12bebf0e68c1

    SHA1

    8a5e1ff836b70a8122dc7290b81948a72f632f63

    SHA256

    a1d517436149ffd1daab9e2f4fb8dd105ed858b9b072679e7b80fa16b89aca55

    SHA512

    9988eb671f01df38bd2a6c7983fb0e75810c057fc34b26ef837acd769aa9cc223aff1b7661324fd8889bebc1d3a96f508b82af47bc018eb3c6b4c07667ca639f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\01.gif

    Filesize

    17KB

    MD5

    b773d17a943de6240645a1ad2b072a92

    SHA1

    be212c7de79b52f15d04ec7b2d4b3d9c10a58e07

    SHA256

    8a1f3b2657d25022035d13f93fd0b9a73bf35d0766cf8c6481dd12aeb309eecf

    SHA512

    6ff44d75f1c69ba7b7035688f8ad1bbc8fb6851be2c1e40bd81504d7906f38acb4498b29890790d5d5fa110c75e3f1441d7aa90e335f4014bcc08765818425c9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\010.gif

    Filesize

    26KB

    MD5

    89d37a4483cf30ba5aa7cd4e91b6f93b

    SHA1

    0a85dbda6f2b5d285d0ca65f34511f3c24540622

    SHA256

    2b60b2ec855cb35cb153d6e2ec34b7f49994c76a3d48615ffd53e36595c32177

    SHA512

    302cff08f76681de042628b3e5b6ebdb5fb99dff7de53a1ab1f19989cc7627c43a49b39555ba8692f6df012686a8c1bc6fa9df8cb357ecbb36c750e145342a7e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\011.gif

    Filesize

    28KB

    MD5

    d4dada5a2658d89c3af2d56093c437b0

    SHA1

    51f1945d04d8f0d053b9e8cc8ce14f0a44c6789d

    SHA256

    dc7348dbed3d9afd69d312a50d944116d6109dd947b99ab382a890e93728bfa3

    SHA512

    02de70c3564b010223697589adcc8659ef453a24efed63829b3b4f3e807c332dd37201425137270cdbd1008ed18cae68178746e748c7a58235a76000b5b442b9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\012.gif

    Filesize

    29KB

    MD5

    2dd6def2a2804b9176b6f63f92d6918f

    SHA1

    8375c2904cc6e8c34031cee4175246fd5f8ac53f

    SHA256

    88586527c99e99418738292eb5e36b74fe52ae2cc5978f269014c703dfb9a10b

    SHA512

    78ae63232c4ef4ef6db1a8dd5df1d8cd77770b753ecf1fa0608db2091269f3679bb86087fb4317840a9d27c4a7af075fb56053012f685e18252cab57547e202e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\013.gif

    Filesize

    29KB

    MD5

    bd54729d466b66f7cf6709480579f9bf

    SHA1

    be23c796c3db314b3bb3d6ce084ed90164290f51

    SHA256

    cd3d014f411cf51fdc823dddd86d4568d014816f3b96e991253df248b2de754b

    SHA512

    afdb369d46b352edeb478dda8f164c7942ee5dfa7319340c9a3e80c240469760938779b0479a255962f4ac3f15a0f7935c0b34a09775222a9944f654213acc58

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\014.gif

    Filesize

    25KB

    MD5

    58339faac23edfb870e170fa7f450136

    SHA1

    5c8fdee04d3083acfcee59cdcae810dfb386c3a3

    SHA256

    27e50d38ee12dddff6ab6d26e629d7b2d18be7758681749c36f347f7bc82f055

    SHA512

    655a04e66a0218f5f0fb349096c8b321aa750eb0a04691b406e529d7393520d8a1993b54c0f998f6a69b2eaaa5a3a935c5e4fa757e5fffa4756a6e52511a6dd8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\015.gif

    Filesize

    27KB

    MD5

    4eb989c2eff9c2ffee81386b2a9997d5

    SHA1

    c9088f31953afbbe6e5a8979c5a9542cec558984

    SHA256

    31577302d9b65bf9f891d75465c0e132b42b686f2eb5b1c7e1b678edb1f088ce

    SHA512

    446e5664fed1ef3b0e4e8154dabc8fbc504869813d7201b75bd03b09e6d45af9eacd453ab31fc29927d55bfd22cf0f6eb7d20b2d6b8c4a254a0a74e3237c169b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\02.gif

    Filesize

    16KB

    MD5

    a408639294980dca19e815c0e92b0ee5

    SHA1

    978e817d1bbcca42e19076a291e3a493cbc2b938

    SHA256

    bf06cbaf3f522adafbcb45463c817dbc92cefeed95097be6b6c855d3f0e7efe1

    SHA512

    61cf13b4f81899169984e3376de5e8e8f912302077a0a9969cc2950316bb00b08f101934197b0020b3e7c37fc42290392405fa9e0b3d3335355796a732449269

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\03.gif

    Filesize

    14KB

    MD5

    063bfc811c0881d4e19df7ac0696d3b2

    SHA1

    e10ed4de5ab0186d7364f3d43e7fd963c50b6754

    SHA256

    292b91c66fd2535b6b5221c309c16a967ad6b586f5838bc537ee0899d1acb490

    SHA512

    1e805d13c2d5f9d8cf20f27aa65bd841f27f7cd4a87ad4f8c015ec85756bbcf64dc9c4a45acf3156bf165cd2b5f5386fe99997f3b59fa7a22585a833a33dcdc2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\04.gif

    Filesize

    19KB

    MD5

    7d9a9db3440eb929b8dae45c963fca7f

    SHA1

    5c664ec445292123ae1719ab2e46f1fd3518a135

    SHA256

    86d97f6bfe1b5f946d23ab0e0c2746cb1410edf25f8a3295a2a5f60fe01263ff

    SHA512

    7393b046f6cba28d3e7073c6d2586b8fcff90ec373b44714c7f2d6c93cbf151ac21dfbe2e41f7a83abb516f02194b688692917f746a61ebde492cd5cdac2f98d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\05.gif

    Filesize

    13KB

    MD5

    27e0d19dad19e468983ae0528b240263

    SHA1

    6f9761022f621fee3f00ca727fcf37def4cf7ab4

    SHA256

    024a69cdc846f87529db20f41de43298d284e61d8118eb8060ad70ad51701ee9

    SHA512

    d8f241cfe0236033b89723c10cf13d10e37f08a9245b6e327fe3a76b9169814bbb60ad81a1e06614c2b459b56fe0951b3d6560a787bb28560a7a2fa28816a75a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\06.gif

    Filesize

    18KB

    MD5

    571f7b2d9d98fc8b8d2a9d00a33dac44

    SHA1

    44d9b56d91e102f84f705c759fbdc3dee21da718

    SHA256

    ad3838e9b5cdb88cc201d77490df3563c7d2d9367f71004e377f4bf1d849adf3

    SHA512

    e15e3c86cb280b9fca8583ee0f95ed97b1b9a59233ff47480efec024320c9fd95281ea3bdcf4b6e4135902531b4b315a82ed46027151bfd7d79eb3793d181491

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\07.gif

    Filesize

    15KB

    MD5

    b0ffd79b30d1448bcb7422926452fe87

    SHA1

    9c49430ee1bc1d575fb6012c60cb7dddc8446f98

    SHA256

    da6885b7253e9b6a89b5eba2575f24d41f21174f0491d6570f210dd38cd22712

    SHA512

    71d1bd5ef3b7101bf98ecf5a11b055b6b521d2c5edf0e33901c601df06ddcd05960ab17c1563e0176565354e592c0cb5cfa8de8cbfac1ff909a75f7ca478b0c4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\08.gif

    Filesize

    22KB

    MD5

    b13c27d2f809cb488ce988df8fd91eda

    SHA1

    acb23043bb2cd6bb62db5a2bae2b40f3f9c17f41

    SHA256

    dfdbdad876ad1ef155b2b11a0ee3670de00f41050b8b97a55ff999d243cd5988

    SHA512

    6dc8d3888435b87b29938b44730a1b991b3be049c1931649cf26b085b00c81636646940a885476ef7c86293250088febd45c08a3ab31abd7fad3767864f66743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\09.gif

    Filesize

    16KB

    MD5

    d24c660e01656ce5cc6b18b57965855e

    SHA1

    46a7b881164f37b00699062bb8d19e00687df2d2

    SHA256

    f582828f7bf6baf2f6cc018adb6fc8bde86720186b151c1c3328d79b9696a22e

    SHA512

    97ee036f005728d886b00d03c85a28b383ae63b882b489de50156c927c5c07b7393770ea169608be391eb7197976c6b3d4dca9afbb8317f7a064b59820de5fb6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.gif

    Filesize

    19KB

    MD5

    3cefaaa987363e35790a2d1898e717b4

    SHA1

    7bb6652d32fc820306a4d29f1564fd7a3467a33c

    SHA256

    67cc7a7e52381831d4cc3951cfb3e1b5877590b3339cbb7832e757e1304a127e

    SHA512

    533051e59b8b4587116ebe3d9cbfb777ae28440abc6c166e5caa12f0b7eda9b236d41c0fee550eba09ca4079bef9e6045347a4630fd13b89758506a24662e676

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11.gif

    Filesize

    16KB

    MD5

    8f0c48b4048bd8d7725dbd36e49a2483

    SHA1

    f02150125e880bb7d67b4bb5ff0f9e22071a9249

    SHA256

    177b1a80a9d211bdd2ae0633bc62a28d22134bf1486a58700abea7728191e0df

    SHA512

    97c828ce47f9ae3450a8a30f0d744ac852aeb3eab1ee6095407af7b338084e021ea7445bdfa3932ceea5c57a6f3fd1f83724316b23587f8bc193150a8ac16e20

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12.gif

    Filesize

    20KB

    MD5

    f508ea47f977aab1aefe4574b4af1e31

    SHA1

    541ca6740aae593570e0be708f0fe83d04c710fb

    SHA256

    f4df79d99f18f5127739ab06ba9eddfefb7f9b8ddd2fc889f8c543b0fd206484

    SHA512

    54164946095f56868f937dac2d70854d19ac0de0830e5d5eb884e9ed97affa0b17d1c307d3d86fa3cfb04dfc465e7eec7bb0fe652c4ca24260c065c5c4be33fc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\13.gif

    Filesize

    14KB

    MD5

    fc1b29c7419fd35718bc3af2477d2a18

    SHA1

    27834f00b37297a73908e82a432342014b68e713

    SHA256

    768b9489317394deccd8c5ce3aa6cda3fc0e97006924a2dd972d6145d3a297fe

    SHA512

    404514f20cb6b2edd7ce9df1469bf10a2f6b6048198159e19abe270282297a64aef06be91ba25cb10a0e38285392160a5649eea08a786e53ca0821def2237cb4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\14.gif

    Filesize

    14KB

    MD5

    3858cd0be92acf8be82ee94012c0f54b

    SHA1

    647a470fc989425957ab3d45126f47ea16fd0576

    SHA256

    f4ab39efeb871c25885bf1a6ae82ef560600be60029eaac4e674199c8a7e4276

    SHA512

    51fd35f835be1fc125c71bbb23a84fbaf5eb1498f05c376d1cf06756d819437ded65d6edcda0369b9b56538c3917a4150b2f896404adacf1dbeace706de5c32f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\15.gif

    Filesize

    15KB

    MD5

    7daf7f90b9298207e1c3acd95d37015c

    SHA1

    74101b4dbd6726521e446d67b19a55bc01205d2a

    SHA256

    7bae057f72d9fe259f76f8b3dca11f1e195081c7d4e92ee3d36c4e75f95ef627

    SHA512

    3a1da38a494b97ec666df4049f8aaca21f6f6b2793c731598bba36f7100ff720400491ca46b85c60b725a5376733b8d5801aedf7038d99bb105e09c75a6d7ca6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wordµû¤À.exe

    Filesize

    5.0MB

    MD5

    56894f5134b352ed37d95dd3194481e8

    SHA1

    900d82d9fd5dfe7d048cfc664571797aef6da419

    SHA256

    82eade36285a68a3b665c99a7f5bc6d13bd7c8106556ba5dba049b2397fe1d28

    SHA512

    56e85b63503498b1995ef63368877feb68cc3e10336314ce546e9802d281b8c85913f8e4d20aab183e26fccdfbcd5e03846edc5f62cf7fadf71aaec464be3c08

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\border.gif

    Filesize

    14KB

    MD5

    70ed7aa2b81ecb926fa596fa990babb5

    SHA1

    f1d768ed2f70462200e3a540dbc59e64dbdb66d6

    SHA256

    ec72998455937ad117b44b7e2db1ded5ee6abd96edec69828e5790a8b0a6e79d

    SHA512

    dc8f8edfe04942923b98c8c3542026fa6b8a8a0ff1e9cd5970f9c82e558c056c40b79728206cd363c0be5dbcebf7c9efcefef4809b39d07572a47b4e751e6c79

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoft01.928

    Filesize

    16KB

    MD5

    1714eb9489c4b74da97488fd02420903

    SHA1

    21394e527bc8e5af66d3677349ce2329a2087a35

    SHA256

    fa5b0ccc3413dd457e63006e03e2ec46215a86395c130b48fa55a4fb42054bbd

    SHA512

    c2155b64656674cb5f18095ba02751af276ed6c7733d59c79be43fd80ab7a79315c196fadc0f91c6808ed0ce4501a67104b5fadfdc43592f52126ca8b9fc7386

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoft03.928

    Filesize

    19KB

    MD5

    eea504ea4278560d1e8ad536918a75a2

    SHA1

    9f0183205c22bb1013a0ae0c158c05a82846ed52

    SHA256

    f4f8eb8e03f3f073298bb2aae7726529e5d62df3524e1b661bf24ab42761d134

    SHA512

    786f7b6d040d641c1fcb4cf69fb59c23313e5a4d92a23c5f9ccb84c1f21c8eb9fd56000ba3326c0a14b3d7a7b8c9ded25d7dd32aef82b97bbb9033bb9ff541fd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftk.dll

    Filesize

    72KB

    MD5

    d35c738828d380d60968d361282cfb7e

    SHA1

    474ce6d26ff18195ae84fd46276d07452f1f6f42

    SHA256

    8771faddb590e179df036d7aeb11f1723f0cf9aad44fedaca56346bb6292867b

    SHA512

    56456e5ed9a7cccc4e6f349240fba685ab1b8aabc91a61260467058a917a54fb0a89c080704d7f75ba6138c4ac26c7f18fa335233b18d0935205367053f14cab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftm.928

    Filesize

    45KB

    MD5

    8b784274cae42abbe53392d7fd3fbbeb

    SHA1

    73571ffc7f3f556dda34b28a36637ef9db48c515

    SHA256

    a69bd891e9a683b146c4a26f9ce94ada084cda3835638669cc967f0e6b0ec69d

    SHA512

    3cb3b8042d76c5b8525a166c5df2bf9e8ad0c5da1808c066cc0d0d681988dbf4fb0304e251a8bfd033fc8337ee64b030aebf74632fa4e5a2c3f47539c486497b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftnf.928

    Filesize

    67KB

    MD5

    d523cc76c39bc8629d891be1a9a22b28

    SHA1

    5871e80f5bad8baa0fbb3a2c897cc1a7bf285d71

    SHA256

    2a9c40de329eff1dee678c28dee122e4c76233f4da269fcbc8ad41238e125de5

    SHA512

    377c8572c5198257de39313522a74d322c500bab20ebaa1724c224dc0ee4a04c4020171b2365da6e4ca719be5e84feb569df4d4b9d25cefb7ba989d2ef2d0641

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftoe.928

    Filesize

    71KB

    MD5

    d2931406a7b0d826713735d902c0e4f2

    SHA1

    21d2cb73d0f56129fbe877ce2bb41da4feb90c43

    SHA256

    6ce5d45c1a06b3a9fcb19e628a64caaab03f3956c69fbff02bf63e7cfa4451f6

    SHA512

    abbf2378f12465ac04315956ead0166b63d65d06aed26c6c9fec726bafd1354ff4f7f0c8e05adcde27dddacb7e6997ae2cfa0b5dcdb951a4fe314a3fd77cb55d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisofts.dll

    Filesize

    38KB

    MD5

    29e2911c16c7db36e2d564e48b3b926e

    SHA1

    45bfa1cf999d24c3fa0571648db536c926335816

    SHA256

    71c516d299f3eee2f96bba117192457ce397b7d7a45ef54867ee889c38453828

    SHA512

    0d942b0bf844e52eb10ee5febb0d66335317a2a10b6343ce6dc72a74c1b0c1e2cd5963aec8e956713466c29cc4cedff1cbb0ddfda58a0a9df2ff1bf6df2c4666

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftt.dll

    Filesize

    23KB

    MD5

    0bf11eb606e4027ae53a859a4610db66

    SHA1

    5cdedddc7eba898232bd46c40831d28305bc1cb2

    SHA256

    7cd0a9534d272dd50cb856b8089953669fdd7e5847955fb17168fca1902b085e

    SHA512

    cd751f4dc2245b84ff39c0fd5e8120b18bc7e9d13ba6ca7f8471a2a1618f2f4b3976d1af242e9b7f3808c50114363262c69311a90cad23ecf4309edad5b23ee6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftu.dll

    Filesize

    32KB

    MD5

    0ace900b2f5ec6cab665cb0b75d3c43a

    SHA1

    01793fe8cc2762d04a454e812cd240729e94c329

    SHA256

    c54e32401c5c14239f709a228e6a5ba596ff20c7821cb07ef0d9a0ada45d3360

    SHA512

    2b7389d42d2869dfc0a8f8e83b11dd91de19c76e8065a3c9a68328fa9a8dc7cc55d4605f319be077c44216ef0924d3ac0e1489afa87eaf63ef8ded2ae7ae5187

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftv.dll

    Filesize

    43KB

    MD5

    1a1494807b42fd45c8c5f1c76f5ad9b6

    SHA1

    de871467b2b99f26122ee8e14d8659d607a703d9

    SHA256

    15b292a34bd4f403bd5174e77bb22919e62684d827a18cfc0268d6a4743a7161

    SHA512

    8b6f3c0401fbf0da3c253dd8b2c65492d4600d2c684f149aa2da6056e8b8f44fae3a3c861c3c6315c9afd7101fa5aae704b3b68e5d4e1951fa872cb32221fba0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftw.928

    Filesize

    28KB

    MD5

    bc13ec7c50079b609644f0268c93226e

    SHA1

    567692d0dabfff45e443ec38605b4e8943818e2b

    SHA256

    8d82733bcf32046a71c7d4f36f94f707244ea5661c4a0e05ac7f5aeee2523833

    SHA512

    efbc6857e1169e04cc040c52371874e99b31fabd177e0b21094b81d91e70c1e723ef16cccabd48f7b2f0e787bac5954c28b9d0085515fdde9467745b90362be2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisofty.dll

    Filesize

    14KB

    MD5

    fc086fad10dfda75df62e6a104c22ff1

    SHA1

    db137838e529c5907badb681834b6dd11e4f81e9

    SHA256

    e84f2fe1dc5b783d9b90d8c2ac82b3c2253fea44d4fe3792e6602bcde7ae219c

    SHA512

    25758c42c48692c0c329b9d2ea36a1efa663812aa29cca7a5048b4ac71ba436cf987e81646d58ee072339dc92b05fec77998e5c3350c5d5d29cbdfd33e39f283

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftz.dll

    Filesize

    35KB

    MD5

    6fe06377b39d0088e61065d6330dcb40

    SHA1

    adaa1632b79cc0393139820e42e5bd4964005c6f

    SHA256

    120844b8578ee532882cf22e7e86542ff9e6a72ed49b868019aabf788e60bd8b

    SHA512

    ce89a8a4071e1e21198fdb000db469c8b983d32fe032981261b1372e3623116609da238e013b9af08bb54de7d154dc43c8aac22a75abc070e68f33c47c430d5d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cmd.txt

    Filesize

    790B

    MD5

    69dacb628f47c9b139e19c77e69926b3

    SHA1

    97769785c2c29ec10ffe8d32bbff16092f67dd70

    SHA256

    c114113588eaaf4b858517e37cf6555a3742504a5447f318064866bb58512e2d

    SHA512

    599d888615115a44b5e4171b88cb2b0bc0bd6cb9fe33cf259e119963b67f6d072550aaf76f2819e92becb12e1937171321cad3a307781c0f46114c1794c0e126

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cprintstyle.gif

    Filesize

    18KB

    MD5

    664b7bb522f130dc30d6fd8ec78e91e2

    SHA1

    2709f717564991b5bc41991312c78f20d84f7a2e

    SHA256

    573a9ce8377efa147974e1cedfe5d242f2bc30fe1ed0e12bb9cd2595177f002e

    SHA512

    1e40a8482ca7bf2de7e13311cd1926983f7b3034a0e208b64845c07a1f5cbf2aca1c5a5a21fb3f42d3ecb71dc63c891caf54dc1c9a70a0fd17b1487ce5077f15

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lettercase.gif

    Filesize

    10KB

    MD5

    51fb60d53dd31cdf4356eebf43247385

    SHA1

    2df3e27a96b6b5c6f6cd0183bd7081e5e6c62bf1

    SHA256

    b0236951b957f3107f73c3f06d67988dd98bf0e9e880b97a3a8505bc0ce0fd87

    SHA512

    88814e9971bec2fa0d859a70d7d56538fde190e5da10bdd821121427e79a974fdd2f0c7b6b3bbb5faddc3ed4c4f1cf370875b46ac28e88cc99963cf577bb9c2c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pformat1.gif

    Filesize

    10KB

    MD5

    6c4ab2673b8eb761adbab1f215afb9fc

    SHA1

    32f19d2bc0e3d0d2f6f4c6b219a4a20d13e4fe2c

    SHA256

    bd85d4b72e00eb9fa91405b151185f2ce74712a3408e7a641dae7fef7e8066f3

    SHA512

    cf5a35cfd21048c01ce78205b330b7824f5ed7da92f3cfe2c0fa36438e3ba53155e703b7348f7e0a6b764097783f347b14192968ab379945b2d751f196aa2785

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\phrase.gif

    Filesize

    9KB

    MD5

    43e3ea7ee7ba4a36208f77fc01e6e9ce

    SHA1

    7ee26b003e36f8962dbf2173c6f21c78f592ccb7

    SHA256

    ca28c05b00338cf53fb2b46e9e550e04569ae026f4cfbdcaad5f3171dde05a5c

    SHA512

    a87c747fe8f3c74f23f62b687bb1e231dcfd7404ecddecb38c235897abbf0c21ced33ccb5afed3487e8347c98e60741cdf6be0f24b23084c1605917a38eb7698

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rand.928

    Filesize

    27KB

    MD5

    647575c1f0ef20dc70b61b6475f6339c

    SHA1

    da1053701aca7aedb280cf836c0a272a938775f8

    SHA256

    6d7570e2702560d3242ba9c012025ba392fdaa1bf7ebd26f700ad8435abb0ee7

    SHA512

    f1549506c86f801d0689c3ae72cde6ecc699e2a01b987ef169b0aaf181d2f5bf9499de44238fab2f4aa7a18cf7af9f1212cf19f07d023b6b22dcabf7668eabcd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\register.dat

    Filesize

    18KB

    MD5

    d3f4a60bf5a6c30b1d3b124334750ca6

    SHA1

    a672e8737c49a237b863a64ffc7594e5d2cd5be2

    SHA256

    3b0bc8c2cedeae5cb8d509d78c397b4c022cf9cca197aebc178afacf8c813ea4

    SHA512

    cbc4f942194349092a544fbbab1ca9e12cda2206c8763ad4ee89070f9dc623144696bf2e92b4d186b29a8c7a2a9a5c8826d84f9bfdc983d759ac35aa64c6c341

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wraparoundtext.gif

    Filesize

    15KB

    MD5

    71062469bcd70ca6ac183da80d4d86fe

    SHA1

    42fbdcb930a987e14530e16e0e6ee55a974b4794

    SHA256

    bf3575454881519eb913cb463f8253c9f373cdabf2dc3d77985f813f020d85b0

    SHA512

    750d040435fe1fb8e8619513ed189e554d01c318d5c31d6bb4a221210652902b6afa77cc7703143b109749fd9bc2d4b92d7df911f217a2acc509d69dda1fb983

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¤å®Ñ01µª®×.jpeg

    Filesize

    291KB

    MD5

    f502c49ef42023c7e51f55f147254e3e

    SHA1

    adcb677372d1652d9e7e7be95ffca3370a916279

    SHA256

    e1e02994ad999ff18c7d275d2688d838373e260d0e205a9659bae4317d549e9d

    SHA512

    30ceeb354aebd564dcd04eb2498300775924a65b4513441b3c46075e915833d1359affeff4d74fbb862638ad3652d447e3a59e146f819a092cde72576a38216c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¤å®Ñ01ÃD¥Ø.jpeg

    Filesize

    156KB

    MD5

    0ce2c7599764c83008a8ca3947620b6e

    SHA1

    626a3704f43a3ba70fe5432c264f9393e9fe2877

    SHA256

    0716e4c991606f7de177425b8a7ca0025a27f71e733fd111742b75dc693d9344

    SHA512

    43d7dd51905ef42aa9b5705bb0b060fb03d94f1f9ef23ca856068b34d6814322e236a74bdd16e348e7d7695c819a94def26476c0ff60554c7bf895fc9de48eb7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¬q¸¨¤À¬q¼Ë¥»ÀÉ.doc

    Filesize

    23KB

    MD5

    b4fed5007b061a117014f68c868fe17b

    SHA1

    11789de64d2c61d4876e23a70f00217ee1757167

    SHA256

    5fd19c11077590781ce270727fa0bcd0c479128512a9897eb7995c1cbce86842

    SHA512

    3b009a13b77b49a6126d771de13eb5505fde1a88f512307a869c067c007dd9217e1ecf0b024958ba903d0a850c8d55090c7068d3f28df1ab195f5be6b82e8dc3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\®y¦ì®Mªí¼Ë¥».doc

    Filesize

    35KB

    MD5

    a72c7982fe1e82b0aa1413d73999b98c

    SHA1

    59ff75d0f0794051a8fa42be27bdc40040e72866

    SHA256

    db7ee4b3fcf43faf0342114e84db44b2e3d14b2bbdd61d08b26c38d479363da2

    SHA512

    630ca8ba9c6889f64113c61d5a4dcbd018fafb678321693357cac375f3474f0cca4645bb339b32a2949a01f17b38b681c2605aa8bd508472b56cd1aad4c12929

  • C:\§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\caisoftf.928

    Filesize

    48KB

    MD5

    cc1b77a90bc873a248646164d37d651e

    SHA1

    5d0180295711141cb4cf6a7588a6aa4d98041135

    SHA256

    68b475bb860171d12cccc4e20a8d5f681c11019a276415a05f71a248e344c78a

    SHA512

    e26161a03cdc14359474791886bbf7b684255b469b3ed5960895914a615b706db1df65e120839818d4637cfc9a834c57b988dbcc2a1e7d903309d799f1f7f538

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\caisetup.exe

    Filesize

    66KB

    MD5

    85fd1777b48a4164e41fc6fccde2055e

    SHA1

    6f4210565387f5bd2323c2cdcf56e47c65a279bd

    SHA256

    2baaa34318cee2e0cd04d7d495ec110af5693c3ddc6ceb4a470a466a7a1c8960

    SHA512

    f0cecac98dbb73a053ed047ac5b93a6cd0f6c4be2f555230ba64178874dbc66ec34813f4b3bf2e7903a05d237ef9e4cae124b98883780213c95896f29cccc647

  • memory/1232-350-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2772-391-0x0000000000400000-0x0000000000A4C000-memory.dmp

    Filesize

    6.3MB