Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 14:43

General

  • Target

    8ac40f27bf7e8e6ca3f436a4b31dd124_JaffaCakes118.exe

  • Size

    3.0MB

  • MD5

    8ac40f27bf7e8e6ca3f436a4b31dd124

  • SHA1

    d1943297ef12a3ff8448d864772c5d77550cac03

  • SHA256

    8f5be6c63886d7ca78d8e3be205cbacc33305efc8302b4d1f50bad9dba962854

  • SHA512

    b2ca3e7207adf86de2f724cda8f2494ee1762d8a9de252f24dee21786f2eeca420a06da5de2109ff72f0c280cc95f52df6ac30e6f6b3b06f34cfa03df11aed17

  • SSDEEP

    49152:w7sVVPrbhNGWZTGfCrRTxXgzvXxBMuxmOERCi6uYDh15OCblWOHtCMvYL+na3AXM:bVVPSERBkHnxmOeYD7RbVtCMwLxkm1rZ

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ac40f27bf7e8e6ca3f436a4b31dd124_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ac40f27bf7e8e6ca3f436a4b31dd124_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisetup.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisetup.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md \§ÚªºCAI >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:404
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4632
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\score >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3888
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1848
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.dat \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5104
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy Wordµû¤À.exe \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3076
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.dll \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1652
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.928 \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2992
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.gif \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4976
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.bmp \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3532
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.jpeg \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ\*.jpg /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1112
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.doc \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3512
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.htm \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:224
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy *.jpg \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1708
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy testdata.exe \§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\´úÅç¸ê®Æ /Y >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1652
      • C:\§ÚªºCAI\³nÅéÀ³¥Î³N¬ìµû¤À\Wordµû¤À.exe
        WORD~1.EXE
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1728
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3980,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=4420 /prefetch:8
    1⤵
      PID:3052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\001.gif

      Filesize

      25KB

      MD5

      9067f41197394981079d04af3114eced

      SHA1

      40b4c60b7f4e7052269376127f6b4c740f03e6f3

      SHA256

      a24be7ef6c28e84d28ae771c4bf6d24201ed3ea5c3fb7e91d75c2941c58a6a00

      SHA512

      999cbf731a450a305fbfc8c538703cd6aa7f618c20f4118bb3f8b915a12e0b2249c9f02bcb5994d8482fdcbcc592091fccd03cf993dd59989ce374ba8a4ce2c7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\002.gif

      Filesize

      24KB

      MD5

      dd89b23683349648c421dec03f50a862

      SHA1

      705ae8d30aae212499b11274701954fb58256681

      SHA256

      58eab60cc65ac41f7ac5df6264e06086f237d0028e1ef125609e986c4ea15c4f

      SHA512

      7f21bfaec86ce093d9cd558011bddf718092528e1b9183d5fba769c77b33a074bf82933326bf8578ce9493dffb9a62134331c1c7b94c2a09559f61c73a4fd039

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\003.gif

      Filesize

      25KB

      MD5

      e3e27568ad2a5443c7bf6573180deee1

      SHA1

      7e21b2aafa07d0b9d84902529cef0fe0c6696460

      SHA256

      88b95924b6054ed9d291d4c4e28eba16c7b73a748a35fc2b752677555edb02e7

      SHA512

      dcc346bfedb2e4fe36a954a835e8213cfa4f1ff628acf54d509a5ad27e1f77791ba823c086d31a6935b48af7f160459913a11ea3679edc86168ae8dd3a8b28c2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\004.gif

      Filesize

      44KB

      MD5

      82a636e7c6f6be0bd914d8aad2ae054a

      SHA1

      9fc8089ff531864d79bf4c928a427924e1b5d180

      SHA256

      d5c05ce5b542456f7fee6438cec0a3771c3be3ce971469399ef6cf7d94c47565

      SHA512

      ddf0dc80514c796ae4942f3d81500b3f82fcddcb2a9a4aac52d8aaa40829b323d89044e01001ad917c16bbbcee3a5600b5e4c329a7b27cf2752b9eeb6521e477

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\005.gif

      Filesize

      31KB

      MD5

      aa03e0b4576dfe7802aac083775cb454

      SHA1

      359b93b2f5b4ff25e47cbc96f06ac5e9d04641b3

      SHA256

      10ce7eaa2d6e400ad8b1bfb36202f0f3c0bfbf618a86e15cfe5c456a937b45ef

      SHA512

      630062e20ba2712411b93002f0129ce745a2f6f75ffb989b69c555d060a383efec3bd4dce48120a0b6b35bf71d8df63c97e1137cbda59c1038b82ebc922d2ae9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\006.gif

      Filesize

      28KB

      MD5

      de618b61bf3ef7a55850634d79f2ac6c

      SHA1

      1fbc3ef6af8eae5d4d81196cea93c9ef5d430a6f

      SHA256

      abb66246fa953537e7ba8bc4b4fe8de5a6ae99d07444d62306414fb6c63c819b

      SHA512

      d2e67edad409a1864c96c582f03b7387c7618ae06d61a1d277d3d04193732600c2a18e4ee9d6cbdf5be422c76e0886829ff79b82a9b6d0715306154fd0236220

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\007.gif

      Filesize

      38KB

      MD5

      04211824a10595c37eab07c0c305b097

      SHA1

      0ba52f191556d5f2603494387df76a4353be66f4

      SHA256

      9c46d5bc4b3df54404ca31abc60344ece4297dbfaf245dd00eb6c53cb6513119

      SHA512

      33bc31babbf48aba207d3e5058b37e5ad0c801d3249312ca386c7daeacffc956b91ce13cf0eeb0495f0f40973c3701b30c0a06b4573a0fc3f25ccce28c749576

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\008.gif

      Filesize

      40KB

      MD5

      00fdabca1987b8a49a0c4cfeca4e3793

      SHA1

      20e6fd441496ebddd934eafe46e629ca113efc05

      SHA256

      4559438d0f9cc88301b31d5860073487fce84b27a2d2c10cb22f28990517b2d8

      SHA512

      903d0e34384ca71706e96ebf418bd6adae1cd5972fcf41d6316e735867412ef33f0b6a3fd4f38aa16ab95b7aee4406475614ab6ea7998f796dbceec5c258ad95

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\009.gif

      Filesize

      27KB

      MD5

      80c239efd6d4c2ceca7f12bebf0e68c1

      SHA1

      8a5e1ff836b70a8122dc7290b81948a72f632f63

      SHA256

      a1d517436149ffd1daab9e2f4fb8dd105ed858b9b072679e7b80fa16b89aca55

      SHA512

      9988eb671f01df38bd2a6c7983fb0e75810c057fc34b26ef837acd769aa9cc223aff1b7661324fd8889bebc1d3a96f508b82af47bc018eb3c6b4c07667ca639f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\01.gif

      Filesize

      17KB

      MD5

      b773d17a943de6240645a1ad2b072a92

      SHA1

      be212c7de79b52f15d04ec7b2d4b3d9c10a58e07

      SHA256

      8a1f3b2657d25022035d13f93fd0b9a73bf35d0766cf8c6481dd12aeb309eecf

      SHA512

      6ff44d75f1c69ba7b7035688f8ad1bbc8fb6851be2c1e40bd81504d7906f38acb4498b29890790d5d5fa110c75e3f1441d7aa90e335f4014bcc08765818425c9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\010.gif

      Filesize

      26KB

      MD5

      89d37a4483cf30ba5aa7cd4e91b6f93b

      SHA1

      0a85dbda6f2b5d285d0ca65f34511f3c24540622

      SHA256

      2b60b2ec855cb35cb153d6e2ec34b7f49994c76a3d48615ffd53e36595c32177

      SHA512

      302cff08f76681de042628b3e5b6ebdb5fb99dff7de53a1ab1f19989cc7627c43a49b39555ba8692f6df012686a8c1bc6fa9df8cb357ecbb36c750e145342a7e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\011.gif

      Filesize

      28KB

      MD5

      d4dada5a2658d89c3af2d56093c437b0

      SHA1

      51f1945d04d8f0d053b9e8cc8ce14f0a44c6789d

      SHA256

      dc7348dbed3d9afd69d312a50d944116d6109dd947b99ab382a890e93728bfa3

      SHA512

      02de70c3564b010223697589adcc8659ef453a24efed63829b3b4f3e807c332dd37201425137270cdbd1008ed18cae68178746e748c7a58235a76000b5b442b9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\012.gif

      Filesize

      29KB

      MD5

      2dd6def2a2804b9176b6f63f92d6918f

      SHA1

      8375c2904cc6e8c34031cee4175246fd5f8ac53f

      SHA256

      88586527c99e99418738292eb5e36b74fe52ae2cc5978f269014c703dfb9a10b

      SHA512

      78ae63232c4ef4ef6db1a8dd5df1d8cd77770b753ecf1fa0608db2091269f3679bb86087fb4317840a9d27c4a7af075fb56053012f685e18252cab57547e202e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\013.gif

      Filesize

      29KB

      MD5

      bd54729d466b66f7cf6709480579f9bf

      SHA1

      be23c796c3db314b3bb3d6ce084ed90164290f51

      SHA256

      cd3d014f411cf51fdc823dddd86d4568d014816f3b96e991253df248b2de754b

      SHA512

      afdb369d46b352edeb478dda8f164c7942ee5dfa7319340c9a3e80c240469760938779b0479a255962f4ac3f15a0f7935c0b34a09775222a9944f654213acc58

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\014.gif

      Filesize

      25KB

      MD5

      58339faac23edfb870e170fa7f450136

      SHA1

      5c8fdee04d3083acfcee59cdcae810dfb386c3a3

      SHA256

      27e50d38ee12dddff6ab6d26e629d7b2d18be7758681749c36f347f7bc82f055

      SHA512

      655a04e66a0218f5f0fb349096c8b321aa750eb0a04691b406e529d7393520d8a1993b54c0f998f6a69b2eaaa5a3a935c5e4fa757e5fffa4756a6e52511a6dd8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\015.gif

      Filesize

      27KB

      MD5

      4eb989c2eff9c2ffee81386b2a9997d5

      SHA1

      c9088f31953afbbe6e5a8979c5a9542cec558984

      SHA256

      31577302d9b65bf9f891d75465c0e132b42b686f2eb5b1c7e1b678edb1f088ce

      SHA512

      446e5664fed1ef3b0e4e8154dabc8fbc504869813d7201b75bd03b09e6d45af9eacd453ab31fc29927d55bfd22cf0f6eb7d20b2d6b8c4a254a0a74e3237c169b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\02.gif

      Filesize

      16KB

      MD5

      a408639294980dca19e815c0e92b0ee5

      SHA1

      978e817d1bbcca42e19076a291e3a493cbc2b938

      SHA256

      bf06cbaf3f522adafbcb45463c817dbc92cefeed95097be6b6c855d3f0e7efe1

      SHA512

      61cf13b4f81899169984e3376de5e8e8f912302077a0a9969cc2950316bb00b08f101934197b0020b3e7c37fc42290392405fa9e0b3d3335355796a732449269

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\03.gif

      Filesize

      14KB

      MD5

      063bfc811c0881d4e19df7ac0696d3b2

      SHA1

      e10ed4de5ab0186d7364f3d43e7fd963c50b6754

      SHA256

      292b91c66fd2535b6b5221c309c16a967ad6b586f5838bc537ee0899d1acb490

      SHA512

      1e805d13c2d5f9d8cf20f27aa65bd841f27f7cd4a87ad4f8c015ec85756bbcf64dc9c4a45acf3156bf165cd2b5f5386fe99997f3b59fa7a22585a833a33dcdc2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\04.gif

      Filesize

      19KB

      MD5

      7d9a9db3440eb929b8dae45c963fca7f

      SHA1

      5c664ec445292123ae1719ab2e46f1fd3518a135

      SHA256

      86d97f6bfe1b5f946d23ab0e0c2746cb1410edf25f8a3295a2a5f60fe01263ff

      SHA512

      7393b046f6cba28d3e7073c6d2586b8fcff90ec373b44714c7f2d6c93cbf151ac21dfbe2e41f7a83abb516f02194b688692917f746a61ebde492cd5cdac2f98d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\05.gif

      Filesize

      13KB

      MD5

      27e0d19dad19e468983ae0528b240263

      SHA1

      6f9761022f621fee3f00ca727fcf37def4cf7ab4

      SHA256

      024a69cdc846f87529db20f41de43298d284e61d8118eb8060ad70ad51701ee9

      SHA512

      d8f241cfe0236033b89723c10cf13d10e37f08a9245b6e327fe3a76b9169814bbb60ad81a1e06614c2b459b56fe0951b3d6560a787bb28560a7a2fa28816a75a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\06.gif

      Filesize

      18KB

      MD5

      571f7b2d9d98fc8b8d2a9d00a33dac44

      SHA1

      44d9b56d91e102f84f705c759fbdc3dee21da718

      SHA256

      ad3838e9b5cdb88cc201d77490df3563c7d2d9367f71004e377f4bf1d849adf3

      SHA512

      e15e3c86cb280b9fca8583ee0f95ed97b1b9a59233ff47480efec024320c9fd95281ea3bdcf4b6e4135902531b4b315a82ed46027151bfd7d79eb3793d181491

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\07.gif

      Filesize

      15KB

      MD5

      b0ffd79b30d1448bcb7422926452fe87

      SHA1

      9c49430ee1bc1d575fb6012c60cb7dddc8446f98

      SHA256

      da6885b7253e9b6a89b5eba2575f24d41f21174f0491d6570f210dd38cd22712

      SHA512

      71d1bd5ef3b7101bf98ecf5a11b055b6b521d2c5edf0e33901c601df06ddcd05960ab17c1563e0176565354e592c0cb5cfa8de8cbfac1ff909a75f7ca478b0c4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\08.gif

      Filesize

      22KB

      MD5

      b13c27d2f809cb488ce988df8fd91eda

      SHA1

      acb23043bb2cd6bb62db5a2bae2b40f3f9c17f41

      SHA256

      dfdbdad876ad1ef155b2b11a0ee3670de00f41050b8b97a55ff999d243cd5988

      SHA512

      6dc8d3888435b87b29938b44730a1b991b3be049c1931649cf26b085b00c81636646940a885476ef7c86293250088febd45c08a3ab31abd7fad3767864f66743

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\09.gif

      Filesize

      16KB

      MD5

      d24c660e01656ce5cc6b18b57965855e

      SHA1

      46a7b881164f37b00699062bb8d19e00687df2d2

      SHA256

      f582828f7bf6baf2f6cc018adb6fc8bde86720186b151c1c3328d79b9696a22e

      SHA512

      97ee036f005728d886b00d03c85a28b383ae63b882b489de50156c927c5c07b7393770ea169608be391eb7197976c6b3d4dca9afbb8317f7a064b59820de5fb6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10.gif

      Filesize

      19KB

      MD5

      3cefaaa987363e35790a2d1898e717b4

      SHA1

      7bb6652d32fc820306a4d29f1564fd7a3467a33c

      SHA256

      67cc7a7e52381831d4cc3951cfb3e1b5877590b3339cbb7832e757e1304a127e

      SHA512

      533051e59b8b4587116ebe3d9cbfb777ae28440abc6c166e5caa12f0b7eda9b236d41c0fee550eba09ca4079bef9e6045347a4630fd13b89758506a24662e676

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\11.gif

      Filesize

      16KB

      MD5

      8f0c48b4048bd8d7725dbd36e49a2483

      SHA1

      f02150125e880bb7d67b4bb5ff0f9e22071a9249

      SHA256

      177b1a80a9d211bdd2ae0633bc62a28d22134bf1486a58700abea7728191e0df

      SHA512

      97c828ce47f9ae3450a8a30f0d744ac852aeb3eab1ee6095407af7b338084e021ea7445bdfa3932ceea5c57a6f3fd1f83724316b23587f8bc193150a8ac16e20

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\12.gif

      Filesize

      20KB

      MD5

      f508ea47f977aab1aefe4574b4af1e31

      SHA1

      541ca6740aae593570e0be708f0fe83d04c710fb

      SHA256

      f4df79d99f18f5127739ab06ba9eddfefb7f9b8ddd2fc889f8c543b0fd206484

      SHA512

      54164946095f56868f937dac2d70854d19ac0de0830e5d5eb884e9ed97affa0b17d1c307d3d86fa3cfb04dfc465e7eec7bb0fe652c4ca24260c065c5c4be33fc

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\13.gif

      Filesize

      14KB

      MD5

      fc1b29c7419fd35718bc3af2477d2a18

      SHA1

      27834f00b37297a73908e82a432342014b68e713

      SHA256

      768b9489317394deccd8c5ce3aa6cda3fc0e97006924a2dd972d6145d3a297fe

      SHA512

      404514f20cb6b2edd7ce9df1469bf10a2f6b6048198159e19abe270282297a64aef06be91ba25cb10a0e38285392160a5649eea08a786e53ca0821def2237cb4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\14.gif

      Filesize

      14KB

      MD5

      3858cd0be92acf8be82ee94012c0f54b

      SHA1

      647a470fc989425957ab3d45126f47ea16fd0576

      SHA256

      f4ab39efeb871c25885bf1a6ae82ef560600be60029eaac4e674199c8a7e4276

      SHA512

      51fd35f835be1fc125c71bbb23a84fbaf5eb1498f05c376d1cf06756d819437ded65d6edcda0369b9b56538c3917a4150b2f896404adacf1dbeace706de5c32f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\15.gif

      Filesize

      15KB

      MD5

      7daf7f90b9298207e1c3acd95d37015c

      SHA1

      74101b4dbd6726521e446d67b19a55bc01205d2a

      SHA256

      7bae057f72d9fe259f76f8b3dca11f1e195081c7d4e92ee3d36c4e75f95ef627

      SHA512

      3a1da38a494b97ec666df4049f8aaca21f6f6b2793c731598bba36f7100ff720400491ca46b85c60b725a5376733b8d5801aedf7038d99bb105e09c75a6d7ca6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wordµû¤À.exe

      Filesize

      5.0MB

      MD5

      56894f5134b352ed37d95dd3194481e8

      SHA1

      900d82d9fd5dfe7d048cfc664571797aef6da419

      SHA256

      82eade36285a68a3b665c99a7f5bc6d13bd7c8106556ba5dba049b2397fe1d28

      SHA512

      56e85b63503498b1995ef63368877feb68cc3e10336314ce546e9802d281b8c85913f8e4d20aab183e26fccdfbcd5e03846edc5f62cf7fadf71aaec464be3c08

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\border.gif

      Filesize

      14KB

      MD5

      70ed7aa2b81ecb926fa596fa990babb5

      SHA1

      f1d768ed2f70462200e3a540dbc59e64dbdb66d6

      SHA256

      ec72998455937ad117b44b7e2db1ded5ee6abd96edec69828e5790a8b0a6e79d

      SHA512

      dc8f8edfe04942923b98c8c3542026fa6b8a8a0ff1e9cd5970f9c82e558c056c40b79728206cd363c0be5dbcebf7c9efcefef4809b39d07572a47b4e751e6c79

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisetup.exe

      Filesize

      66KB

      MD5

      85fd1777b48a4164e41fc6fccde2055e

      SHA1

      6f4210565387f5bd2323c2cdcf56e47c65a279bd

      SHA256

      2baaa34318cee2e0cd04d7d495ec110af5693c3ddc6ceb4a470a466a7a1c8960

      SHA512

      f0cecac98dbb73a053ed047ac5b93a6cd0f6c4be2f555230ba64178874dbc66ec34813f4b3bf2e7903a05d237ef9e4cae124b98883780213c95896f29cccc647

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoft01.928

      Filesize

      16KB

      MD5

      1714eb9489c4b74da97488fd02420903

      SHA1

      21394e527bc8e5af66d3677349ce2329a2087a35

      SHA256

      fa5b0ccc3413dd457e63006e03e2ec46215a86395c130b48fa55a4fb42054bbd

      SHA512

      c2155b64656674cb5f18095ba02751af276ed6c7733d59c79be43fd80ab7a79315c196fadc0f91c6808ed0ce4501a67104b5fadfdc43592f52126ca8b9fc7386

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoft03.928

      Filesize

      19KB

      MD5

      eea504ea4278560d1e8ad536918a75a2

      SHA1

      9f0183205c22bb1013a0ae0c158c05a82846ed52

      SHA256

      f4f8eb8e03f3f073298bb2aae7726529e5d62df3524e1b661bf24ab42761d134

      SHA512

      786f7b6d040d641c1fcb4cf69fb59c23313e5a4d92a23c5f9ccb84c1f21c8eb9fd56000ba3326c0a14b3d7a7b8c9ded25d7dd32aef82b97bbb9033bb9ff541fd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftf.928

      Filesize

      48KB

      MD5

      cc1b77a90bc873a248646164d37d651e

      SHA1

      5d0180295711141cb4cf6a7588a6aa4d98041135

      SHA256

      68b475bb860171d12cccc4e20a8d5f681c11019a276415a05f71a248e344c78a

      SHA512

      e26161a03cdc14359474791886bbf7b684255b469b3ed5960895914a615b706db1df65e120839818d4637cfc9a834c57b988dbcc2a1e7d903309d799f1f7f538

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftk.dll

      Filesize

      72KB

      MD5

      d35c738828d380d60968d361282cfb7e

      SHA1

      474ce6d26ff18195ae84fd46276d07452f1f6f42

      SHA256

      8771faddb590e179df036d7aeb11f1723f0cf9aad44fedaca56346bb6292867b

      SHA512

      56456e5ed9a7cccc4e6f349240fba685ab1b8aabc91a61260467058a917a54fb0a89c080704d7f75ba6138c4ac26c7f18fa335233b18d0935205367053f14cab

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftm.928

      Filesize

      45KB

      MD5

      8b784274cae42abbe53392d7fd3fbbeb

      SHA1

      73571ffc7f3f556dda34b28a36637ef9db48c515

      SHA256

      a69bd891e9a683b146c4a26f9ce94ada084cda3835638669cc967f0e6b0ec69d

      SHA512

      3cb3b8042d76c5b8525a166c5df2bf9e8ad0c5da1808c066cc0d0d681988dbf4fb0304e251a8bfd033fc8337ee64b030aebf74632fa4e5a2c3f47539c486497b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftnf.928

      Filesize

      67KB

      MD5

      d523cc76c39bc8629d891be1a9a22b28

      SHA1

      5871e80f5bad8baa0fbb3a2c897cc1a7bf285d71

      SHA256

      2a9c40de329eff1dee678c28dee122e4c76233f4da269fcbc8ad41238e125de5

      SHA512

      377c8572c5198257de39313522a74d322c500bab20ebaa1724c224dc0ee4a04c4020171b2365da6e4ca719be5e84feb569df4d4b9d25cefb7ba989d2ef2d0641

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftoe.928

      Filesize

      71KB

      MD5

      d2931406a7b0d826713735d902c0e4f2

      SHA1

      21d2cb73d0f56129fbe877ce2bb41da4feb90c43

      SHA256

      6ce5d45c1a06b3a9fcb19e628a64caaab03f3956c69fbff02bf63e7cfa4451f6

      SHA512

      abbf2378f12465ac04315956ead0166b63d65d06aed26c6c9fec726bafd1354ff4f7f0c8e05adcde27dddacb7e6997ae2cfa0b5dcdb951a4fe314a3fd77cb55d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisofts.dll

      Filesize

      38KB

      MD5

      29e2911c16c7db36e2d564e48b3b926e

      SHA1

      45bfa1cf999d24c3fa0571648db536c926335816

      SHA256

      71c516d299f3eee2f96bba117192457ce397b7d7a45ef54867ee889c38453828

      SHA512

      0d942b0bf844e52eb10ee5febb0d66335317a2a10b6343ce6dc72a74c1b0c1e2cd5963aec8e956713466c29cc4cedff1cbb0ddfda58a0a9df2ff1bf6df2c4666

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftt.dll

      Filesize

      23KB

      MD5

      0bf11eb606e4027ae53a859a4610db66

      SHA1

      5cdedddc7eba898232bd46c40831d28305bc1cb2

      SHA256

      7cd0a9534d272dd50cb856b8089953669fdd7e5847955fb17168fca1902b085e

      SHA512

      cd751f4dc2245b84ff39c0fd5e8120b18bc7e9d13ba6ca7f8471a2a1618f2f4b3976d1af242e9b7f3808c50114363262c69311a90cad23ecf4309edad5b23ee6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftu.dll

      Filesize

      32KB

      MD5

      0ace900b2f5ec6cab665cb0b75d3c43a

      SHA1

      01793fe8cc2762d04a454e812cd240729e94c329

      SHA256

      c54e32401c5c14239f709a228e6a5ba596ff20c7821cb07ef0d9a0ada45d3360

      SHA512

      2b7389d42d2869dfc0a8f8e83b11dd91de19c76e8065a3c9a68328fa9a8dc7cc55d4605f319be077c44216ef0924d3ac0e1489afa87eaf63ef8ded2ae7ae5187

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftv.dll

      Filesize

      43KB

      MD5

      1a1494807b42fd45c8c5f1c76f5ad9b6

      SHA1

      de871467b2b99f26122ee8e14d8659d607a703d9

      SHA256

      15b292a34bd4f403bd5174e77bb22919e62684d827a18cfc0268d6a4743a7161

      SHA512

      8b6f3c0401fbf0da3c253dd8b2c65492d4600d2c684f149aa2da6056e8b8f44fae3a3c861c3c6315c9afd7101fa5aae704b3b68e5d4e1951fa872cb32221fba0

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftw.928

      Filesize

      28KB

      MD5

      bc13ec7c50079b609644f0268c93226e

      SHA1

      567692d0dabfff45e443ec38605b4e8943818e2b

      SHA256

      8d82733bcf32046a71c7d4f36f94f707244ea5661c4a0e05ac7f5aeee2523833

      SHA512

      efbc6857e1169e04cc040c52371874e99b31fabd177e0b21094b81d91e70c1e723ef16cccabd48f7b2f0e787bac5954c28b9d0085515fdde9467745b90362be2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisofty.dll

      Filesize

      14KB

      MD5

      fc086fad10dfda75df62e6a104c22ff1

      SHA1

      db137838e529c5907badb681834b6dd11e4f81e9

      SHA256

      e84f2fe1dc5b783d9b90d8c2ac82b3c2253fea44d4fe3792e6602bcde7ae219c

      SHA512

      25758c42c48692c0c329b9d2ea36a1efa663812aa29cca7a5048b4ac71ba436cf987e81646d58ee072339dc92b05fec77998e5c3350c5d5d29cbdfd33e39f283

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\caisoftz.dll

      Filesize

      35KB

      MD5

      6fe06377b39d0088e61065d6330dcb40

      SHA1

      adaa1632b79cc0393139820e42e5bd4964005c6f

      SHA256

      120844b8578ee532882cf22e7e86542ff9e6a72ed49b868019aabf788e60bd8b

      SHA512

      ce89a8a4071e1e21198fdb000db469c8b983d32fe032981261b1372e3623116609da238e013b9af08bb54de7d154dc43c8aac22a75abc070e68f33c47c430d5d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cmd.txt

      Filesize

      790B

      MD5

      69dacb628f47c9b139e19c77e69926b3

      SHA1

      97769785c2c29ec10ffe8d32bbff16092f67dd70

      SHA256

      c114113588eaaf4b858517e37cf6555a3742504a5447f318064866bb58512e2d

      SHA512

      599d888615115a44b5e4171b88cb2b0bc0bd6cb9fe33cf259e119963b67f6d072550aaf76f2819e92becb12e1937171321cad3a307781c0f46114c1794c0e126

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cprintstyle.gif

      Filesize

      18KB

      MD5

      664b7bb522f130dc30d6fd8ec78e91e2

      SHA1

      2709f717564991b5bc41991312c78f20d84f7a2e

      SHA256

      573a9ce8377efa147974e1cedfe5d242f2bc30fe1ed0e12bb9cd2595177f002e

      SHA512

      1e40a8482ca7bf2de7e13311cd1926983f7b3034a0e208b64845c07a1f5cbf2aca1c5a5a21fb3f42d3ecb71dc63c891caf54dc1c9a70a0fd17b1487ce5077f15

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lettercase.gif

      Filesize

      10KB

      MD5

      51fb60d53dd31cdf4356eebf43247385

      SHA1

      2df3e27a96b6b5c6f6cd0183bd7081e5e6c62bf1

      SHA256

      b0236951b957f3107f73c3f06d67988dd98bf0e9e880b97a3a8505bc0ce0fd87

      SHA512

      88814e9971bec2fa0d859a70d7d56538fde190e5da10bdd821121427e79a974fdd2f0c7b6b3bbb5faddc3ed4c4f1cf370875b46ac28e88cc99963cf577bb9c2c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pformat1.gif

      Filesize

      10KB

      MD5

      6c4ab2673b8eb761adbab1f215afb9fc

      SHA1

      32f19d2bc0e3d0d2f6f4c6b219a4a20d13e4fe2c

      SHA256

      bd85d4b72e00eb9fa91405b151185f2ce74712a3408e7a641dae7fef7e8066f3

      SHA512

      cf5a35cfd21048c01ce78205b330b7824f5ed7da92f3cfe2c0fa36438e3ba53155e703b7348f7e0a6b764097783f347b14192968ab379945b2d751f196aa2785

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\phrase.gif

      Filesize

      9KB

      MD5

      43e3ea7ee7ba4a36208f77fc01e6e9ce

      SHA1

      7ee26b003e36f8962dbf2173c6f21c78f592ccb7

      SHA256

      ca28c05b00338cf53fb2b46e9e550e04569ae026f4cfbdcaad5f3171dde05a5c

      SHA512

      a87c747fe8f3c74f23f62b687bb1e231dcfd7404ecddecb38c235897abbf0c21ced33ccb5afed3487e8347c98e60741cdf6be0f24b23084c1605917a38eb7698

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rand.928

      Filesize

      27KB

      MD5

      647575c1f0ef20dc70b61b6475f6339c

      SHA1

      da1053701aca7aedb280cf836c0a272a938775f8

      SHA256

      6d7570e2702560d3242ba9c012025ba392fdaa1bf7ebd26f700ad8435abb0ee7

      SHA512

      f1549506c86f801d0689c3ae72cde6ecc699e2a01b987ef169b0aaf181d2f5bf9499de44238fab2f4aa7a18cf7af9f1212cf19f07d023b6b22dcabf7668eabcd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\register.dat

      Filesize

      18KB

      MD5

      d3f4a60bf5a6c30b1d3b124334750ca6

      SHA1

      a672e8737c49a237b863a64ffc7594e5d2cd5be2

      SHA256

      3b0bc8c2cedeae5cb8d509d78c397b4c022cf9cca197aebc178afacf8c813ea4

      SHA512

      cbc4f942194349092a544fbbab1ca9e12cda2206c8763ad4ee89070f9dc623144696bf2e92b4d186b29a8c7a2a9a5c8826d84f9bfdc983d759ac35aa64c6c341

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\wraparoundtext.gif

      Filesize

      15KB

      MD5

      71062469bcd70ca6ac183da80d4d86fe

      SHA1

      42fbdcb930a987e14530e16e0e6ee55a974b4794

      SHA256

      bf3575454881519eb913cb463f8253c9f373cdabf2dc3d77985f813f020d85b0

      SHA512

      750d040435fe1fb8e8619513ed189e554d01c318d5c31d6bb4a221210652902b6afa77cc7703143b109749fd9bc2d4b92d7df911f217a2acc509d69dda1fb983

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¤å®Ñ01µª®×.jpeg

      Filesize

      291KB

      MD5

      f502c49ef42023c7e51f55f147254e3e

      SHA1

      adcb677372d1652d9e7e7be95ffca3370a916279

      SHA256

      e1e02994ad999ff18c7d275d2688d838373e260d0e205a9659bae4317d549e9d

      SHA512

      30ceeb354aebd564dcd04eb2498300775924a65b4513441b3c46075e915833d1359affeff4d74fbb862638ad3652d447e3a59e146f819a092cde72576a38216c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¤å®Ñ01ÃD¥Ø.jpeg

      Filesize

      156KB

      MD5

      0ce2c7599764c83008a8ca3947620b6e

      SHA1

      626a3704f43a3ba70fe5432c264f9393e9fe2877

      SHA256

      0716e4c991606f7de177425b8a7ca0025a27f71e733fd111742b75dc693d9344

      SHA512

      43d7dd51905ef42aa9b5705bb0b060fb03d94f1f9ef23ca856068b34d6814322e236a74bdd16e348e7d7695c819a94def26476c0ff60554c7bf895fc9de48eb7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¬q¸¨¤À¬q¼Ë¥»ÀÉ.doc

      Filesize

      23KB

      MD5

      b4fed5007b061a117014f68c868fe17b

      SHA1

      11789de64d2c61d4876e23a70f00217ee1757167

      SHA256

      5fd19c11077590781ce270727fa0bcd0c479128512a9897eb7995c1cbce86842

      SHA512

      3b009a13b77b49a6126d771de13eb5505fde1a88f512307a869c067c007dd9217e1ecf0b024958ba903d0a850c8d55090c7068d3f28df1ab195f5be6b82e8dc3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\®y¦ì®Mªí¼Ë¥».doc

      Filesize

      35KB

      MD5

      a72c7982fe1e82b0aa1413d73999b98c

      SHA1

      59ff75d0f0794051a8fa42be27bdc40040e72866

      SHA256

      db7ee4b3fcf43faf0342114e84db44b2e3d14b2bbdd61d08b26c38d479363da2

      SHA512

      630ca8ba9c6889f64113c61d5a4dcbd018fafb678321693357cac375f3474f0cca4645bb339b32a2949a01f17b38b681c2605aa8bd508472b56cd1aad4c12929

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¶À³ÍºÓ01-1.¸ê®Æ§¨­p®É´úÅç¼Ë¥»ÀÉ.doc

      Filesize

      187KB

      MD5

      b3dcd1f82a02f267bed5168615254881

      SHA1

      a810a43f8de05e855cb0bc54783d6819ee580daa

      SHA256

      8957575289a147194c0551d6b5e2b4f0f06e56c13a1433c0777008712b0e472a

      SHA512

      51e4d581d35a58dd932913d17afc12c0d8d3ffce3ca3d750f080fc5c6d33acc4e3fea3f2fb1ec51c0d8749ee015ce597389dab3f1ae03731cc7af6460065bbe4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¶À³ÍºÓ01-2.µøµ¡­p®É´úÅç¼Ë¥»ÀÉ.doc

      Filesize

      94KB

      MD5

      adfdaac3900e36ff5e9fa3dc5c211a2b

      SHA1

      73f55b456167fb128dc8e3a89af436d173f093a0

      SHA256

      9c2b8e27251b88f57a0dda90e557cc376daa93aa0becdee59da5b8b982f46091

      SHA512

      cc18f0bf5e1c51e6fbb37c67197b1b8dc929f61b78313199fda47b4af66bcc793db79530c32ae52fe40091e71c40a79b0f3cd93024d5d831d6fe178605ed17a5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¶À´º©ú01.doc

      Filesize

      45KB

      MD5

      5e6e43a0af26e1cbd576e9f20fcb6798

      SHA1

      786bbb79da48f79c3f67db3b7c8e15d5d1cbd152

      SHA256

      5cba36eab515be6ddc16deead08a26570e47c451003da6f2b619e33c37ead52e

      SHA512

      fa81cdb70896e4c17f4fc8cf83dc9cbc0d5a3adfc790e3f3b131b9e5a42e9a3c79f544a1a9bbb353bdc58ae742eccf68b0e5b6b61f15ef48eb31ad4b6c07edd0

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\»¯¦Û±j01.doc

      Filesize

      46KB

      MD5

      a630560b2e4c223292c915414aa622a1

      SHA1

      3f6c59490818a1f29f0888e474ec21b60bbe2707

      SHA256

      cd11c635f9f9eb26b326e5df2d26f8489f360d70c40b9e7bfef1bbb58b24edc8

      SHA512

      2692d9313fb9674b730ac29de3ec34f7158ef6eb1142e59e1d26c92b05f78d1f425aeef31d4e6e6ec324e1c0a92e5720cd03c018f8728e7fa42c0324f983ec60

    • memory/1116-350-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/1728-363-0x0000000000400000-0x0000000000A4C000-memory.dmp

      Filesize

      6.3MB