Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
f5914258c41db889e402903ac67ed4f6
-
SHA1
83e793ac1f9035755fa51bc49a0714343a317156
-
SHA256
4f81092552663aaf57c5c961ca378193dca0ff0e8d6981899a201e26e22e18fd
-
SHA512
6a9b995e337c2d9007c01973e6c90befd25e9df97f4e9374c93d3226536c70b5b4a0819aaf6affa79879bca8aa3b1d2a85d201730b9f51b89959279962677137
-
SSDEEP
49152:EDmsKRJj/P7GP/LqXUTeCLdkt0wbZLHmWUlrvJYW/zPU2+kIqNB:E6sKRF/zGP+XHCLdcb1HNUlL6oPUVS
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" dwme.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts AV Protection 2011v121.exe File created C:\Windows\system32\drivers\etc\hosts AV Protection 2011v121.exe -
Executes dropped EXE 7 IoCs
pid Process 1468 dwme.exe 2396 dwme.exe 2800 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 1356 dwme.exe 2088 dwme.exe 2860 2B16.tmp -
Loads dropped DLL 14 IoCs
pid Process 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 2800 AV Protection 2011v121.exe 2800 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WTXqjUCekBzNx0v8234A = "C:\\Windows\\system32\\AV Protection 2011v121.exe" f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WekIVrzONx0c2b3 = "C:\\Users\\Admin\\AppData\\Roaming\\dwme.exe" f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vjUVelIBtPyAu8234A = "C:\\Users\\Admin\\AppData\\Roaming\\TUVelOBtz0c1v2n\\AV Protection 2011v121.exe" AV Protection 2011v121.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\9F7.exe = "C:\\Program Files (x86)\\LP\\24F5\\9F7.exe" dwme.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\AV Protection 2011v121.exe f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe File created C:\Windows\SysWOW64\AV Protection 2011v121.exe AV Protection 2011v121.exe -
resource yara_rule behavioral1/memory/2032-10-0x0000000000400000-0x00000000008EC800-memory.dmp upx behavioral1/memory/2032-35-0x0000000000400000-0x00000000008EC800-memory.dmp upx behavioral1/memory/2032-42-0x0000000000400000-0x00000000008E4000-memory.dmp upx behavioral1/memory/2800-53-0x0000000000400000-0x00000000008EC800-memory.dmp upx behavioral1/memory/2396-63-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1468-101-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1356-103-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2724-108-0x0000000000400000-0x00000000008EC800-memory.dmp upx behavioral1/memory/1468-174-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2088-180-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2724-181-0x0000000000400000-0x00000000008EC800-memory.dmp upx behavioral1/memory/2724-262-0x0000000000400000-0x00000000008EC800-memory.dmp upx behavioral1/memory/1468-284-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2724-289-0x0000000000400000-0x00000000008EC800-memory.dmp upx behavioral1/memory/2724-303-0x0000000000400000-0x00000000008EC800-memory.dmp upx behavioral1/memory/1468-357-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\24F5\9F7.exe dwme.exe File opened for modification C:\Program Files (x86)\LP\24F5\9F7.exe dwme.exe File opened for modification C:\Program Files (x86)\LP\24F5\2B16.tmp dwme.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B16.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AV Protection 2011v121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AV Protection 2011v121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwme.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 AV Protection 2011v121.exe 2800 AV Protection 2011v121.exe 2800 AV Protection 2011v121.exe 2800 AV Protection 2011v121.exe 2800 AV Protection 2011v121.exe 2800 AV Protection 2011v121.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 1468 dwme.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 AV Protection 2011v121.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeSecurityPrivilege 2812 msiexec.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe Token: SeShutdownPrivilege 2268 explorer.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2268 explorer.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 2800 AV Protection 2011v121.exe 2800 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe 2724 AV Protection 2011v121.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1468 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 30 PID 2032 wrote to memory of 1468 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 30 PID 2032 wrote to memory of 1468 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 30 PID 2032 wrote to memory of 1468 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 30 PID 2032 wrote to memory of 2396 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2396 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2396 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2396 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 31 PID 2032 wrote to memory of 2800 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2800 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2800 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 32 PID 2032 wrote to memory of 2800 2032 f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe 32 PID 2800 wrote to memory of 2724 2800 AV Protection 2011v121.exe 33 PID 2800 wrote to memory of 2724 2800 AV Protection 2011v121.exe 33 PID 2800 wrote to memory of 2724 2800 AV Protection 2011v121.exe 33 PID 2800 wrote to memory of 2724 2800 AV Protection 2011v121.exe 33 PID 1468 wrote to memory of 1356 1468 dwme.exe 36 PID 1468 wrote to memory of 1356 1468 dwme.exe 36 PID 1468 wrote to memory of 1356 1468 dwme.exe 36 PID 1468 wrote to memory of 1356 1468 dwme.exe 36 PID 1468 wrote to memory of 2088 1468 dwme.exe 38 PID 1468 wrote to memory of 2088 1468 dwme.exe 38 PID 1468 wrote to memory of 2088 1468 dwme.exe 38 PID 1468 wrote to memory of 2088 1468 dwme.exe 38 PID 1468 wrote to memory of 2860 1468 dwme.exe 41 PID 1468 wrote to memory of 2860 1468 dwme.exe 41 PID 1468 wrote to memory of 2860 1468 dwme.exe 41 PID 1468 wrote to memory of 2860 1468 dwme.exe 41 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer dwme.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" dwme.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\dwme.exe"C:\Users\Admin\AppData\Local\Temp\dwme.exe"2⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\dwme.exeC:\Users\Admin\AppData\Local\Temp\dwme.exe startC:\Users\Admin\AppData\Roaming\5A2A8\93024.exe%C:\Users\Admin\AppData\Roaming\5A2A83⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\dwme.exeC:\Users\Admin\AppData\Local\Temp\dwme.exe startC:\Program Files (x86)\A8674\lvvm.exe%C:\Program Files (x86)\A86743⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Program Files (x86)\LP\24F5\2B16.tmp"C:\Program Files (x86)\LP\24F5\2B16.tmp"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Users\Admin\AppData\Roaming\dwme.exeC:\Users\Admin\AppData\Roaming\dwme.exe auto2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\Windows\SysWOW64\AV Protection 2011v121.exeC:\Windows\system32\AV Protection 2011v121.exe 5985C:\Users\Admin\AppData\Local\Temp\f5914258c41db889e402903ac67ed4f6_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Roaming\TUVelOBtz0c1v2n\AV Protection 2011v121.exeC:\Users\Admin\AppData\Roaming\TUVelOBtz0c1v2n\AV Protection 2011v121.exe 5985C:\Windows\SysWOW64\AV Protection 2011v121.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2268
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5de4945aedb66456dc2f3ee1acfba3246
SHA11b0bc34168f1735ad4ac66155309102fb566ea63
SHA25691f6bb5318ef3615012be80cfb8cc4ed8e81b31bf52215c15684d700fb8b8b5b
SHA512ede90603a8645063d3180e6283f6c12b26d66a0238cc54187090d80e02455c5a0cc68d0a232ce785c55a1fd4a890292f077ceef35141658a0e32849f8576acd7
-
Filesize
228B
MD527b4354e7db4fc75f357cd7d7cdf3c6d
SHA16a8f0172da7d8b7937ab0485336fce17b9ba99fc
SHA256cab01e7d2f99648f5cad4850308f64e8768613551c4b8650ab096b6459bc68da
SHA512da86ab1091422383c66b3b86c2f721d8964d0417a503c573dfaa5d008ad3a4ad022afe52020a781c8894be9f849ef089a4c4bee614c35e9e5ab88cbdf5de75cf
-
Filesize
300B
MD5082b7e47cfe1335f3fbca8f1e3db0f08
SHA1dfdef8d0404fcbe5f72587aebe7d8c49e9c1277b
SHA2564fc6539ee75c7f4e988fca21e4509f314da372f7a5feea3e647385d94007b93e
SHA512f1bf4af53662b2fb03fcb7f89bef95c6d2feb54326fa8d627015040654363f4b5b53a5e4b6cb89b264065315995aec3fae86e80c536cbf540d9298973b0ecda8
-
Filesize
696B
MD5ca1a5a31d3ada4ed24fe581d7e5480b3
SHA1fdee774d691e6700c76de826a5333a37ad7b2f89
SHA256d20f73755a275f93f2f077b5532b3f43e95165372d173161f5072373aee7de83
SHA512455f3170ea856cfd3d713646a7c9c134c174c955bfb1624c8fa8d9b9af8a0d7bb6f421abcaa12e79ac0e352dc6f92cb44506ed63bb8a7aa5b39fda142a373756
-
Filesize
1KB
MD5d3da92166a18571a72a4fef75549f8aa
SHA16aabfe6b9af1e0bb98454b07a6c289916ea0a90e
SHA256fb08871c2410e0ec7e9ec95de8637a0f27ea3597ab9b96206d464b1804866fb2
SHA5122e485aa70bd262f73ae437a2c8f6b186ba6451be67599549bd5cfc7cc6a385d8be88814eba01a503bef453f2c68a4090d7d8c04c4933a1d4741c6fc03e2cc296
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AV Protection 2011\AV Protection 2011.lnk
Filesize1KB
MD5ff361efbb843a87658cc00f8fb093fde
SHA11ca0e44aae64cb4a62410c75112d813f27d9ba04
SHA256bcb864ac116acfaefb03e1c54efb5d69f54e175c809bf6263c28ebec4ab4d75e
SHA512c2634e37e0d12565f5090c06d5bf02b6be34ba3e61d2560c7b7f1f539555138e387ee2706ce84299c3734c2d8694d00bfa4d43285bd006d8a28d96bc42f93f01
-
Filesize
12KB
MD5bb87f71a6e7f979fcb716926d452b6a8
SHA1f41e3389760eaea099720e980e599a160f0413b9
SHA25614c9c49d8ead9ab59a56c328008f59c20b32c3ad22c00e02d34e16ad7086fe84
SHA512e1d14363274e367ea600afc357d012233fc68f0636e8d05b29992e762d31e9a55b4fa38b08613c2ca528d7fb0f547774a3a3dc79aada32c2c7359c3edcdb549d
-
Filesize
1KB
MD52f4b8a0ac8fd3a835684dcd15e5558f3
SHA1c6eaf564c0e83aecaa2706113fc8e548305bf540
SHA2569bd3f411905883d6c1fd871244c7e84675bca98ce79dd811b4ee61fef4a4e8ad
SHA5121f5d35208b8ab0123e7a4180dad27767170336346b8485a9ca731ab54d08b3ac3b1539ff6bbd874f9ddf3e519fc70b07b41f56f512edb4807595d49707148eab
-
Filesize
611B
MD5d90c0a1619e206c40930f3b95be62f02
SHA12dc7c09151548f64f2cf1a74e6eb728396f48326
SHA256f6985402bd79ed6968d1f3e6da90d1a6b0a95541cf8008b9060d4271ecf6164c
SHA512c48e0fcf44dc6ef446b48d7ecabbcf87c68ff0e6977d3a157495763308b47af421d4cd64135a0537e22621005a2c42d4a26b82c91cacb55ec13ae83d635fd9cc
-
Filesize
1KB
MD5db616a4d8e626dda8b7e090961c9d153
SHA1ea225c7324e4868ce9ab0b11fbe42bf4e1f8b0f7
SHA256a0944130b1a57b62c453ade222680e53c80b4fef73e6bcdf72ca77e9ffc55c0c
SHA512d7122da1a3396de20d53a2b9ce871aef35d3ccb2ad24cd96fd3104bf2a2e8d1afc6a4642b7867cab242750723c909f2874200dc67dab49d73db5d3df9d75b1f6
-
Filesize
2.8MB
MD5f5914258c41db889e402903ac67ed4f6
SHA183e793ac1f9035755fa51bc49a0714343a317156
SHA2564f81092552663aaf57c5c961ca378193dca0ff0e8d6981899a201e26e22e18fd
SHA5126a9b995e337c2d9007c01973e6c90befd25e9df97f4e9374c93d3226536c70b5b4a0819aaf6affa79879bca8aa3b1d2a85d201730b9f51b89959279962677137
-
Filesize
283KB
MD5cc6f0b2fd70c63672de6c1249f0e9cbb
SHA172caa65da6f0a4ce78a0c22b5ad64540b87e2912
SHA2563e4d6fd109879dc3f608f08e0e152b26b93dce0d08e10d4c2308aedf2fbc1177
SHA512a8b2199357092780aa62db1959bc631cd8138e54fb62312fbc10738fa5543afa3e252e0fc3ec08399e7c80e2cfcfa795262b0060ad4386811219cac94b032db6