Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 10:39

General

  • Target

    17c0a1b578cbb146d5ca829dd8fe4865_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    17c0a1b578cbb146d5ca829dd8fe4865

  • SHA1

    854458b716fdef5dba8bee3e0635f813c2c6241f

  • SHA256

    5bd13fb30f00ed40fc98cf48d831ff5847e3e61f2be8c725f1827edf73b053c1

  • SHA512

    c1c176f247d3e339d2dfe3b6e46cb533c802e9c07223f4e61edae102267d1369ce7e692121c2201344f4881cbbf57e3cc97d0f9b45c6254fc3e8452fb07ae920

  • SSDEEP

    24576:sIh93UZ8cAkobpLvzuei/bc6EGn5u5TtyJ8adjCzjyhhcDkPQcKiwMH5yUKc5th6:sIj3UK/kMjzur/bc6/nRJ/aOheDkPQcW

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\17c0a1b578cbb146d5ca829dd8fe4865_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\17c0a1b578cbb146d5ca829dd8fe4865_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\crp1ED7.exe
          /S /notray
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1688
        • C:\Users\Admin\AppData\Local\Temp\crp1EE9.exe
          "C:\Users\Admin\AppData\Local\Temp\crp1EE9.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2760
          • C:\Users\Admin\AppData\Local\Temp\bdg1F24.tmp
            -install -tn=tn=epom_pay_sc_02_hao123_th
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2928
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www.4shared.com/mp3/VFS81bNL/_online.html?ref=downloadhelpererror
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      4b4204ab53f47e8386e6f5817039434a

      SHA1

      77c3de3e626ff9f322d13c3e50054a2b658dcfe3

      SHA256

      30544e7ce8490576daf322d2e46f1bbbe519eee04dcc6f8fa778723c2c7a0def

      SHA512

      f86ee6e8fdc1e7ef90c15377adefff8b95577392c31a5b5c3d7fe19d284831b1ee6a052290ed58dd5ea6c7dfb5848b9266d894eb40301d6e99e903a91f693b8d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8593cc1d2c6427ca42b296914ca48eee

      SHA1

      a38e1499a6d42cc388ca5fd4765f3d86b4584e4a

      SHA256

      734457f302d056013cd6c2c8d038221a3a715f1259c7c8a121e864ab9f5da081

      SHA512

      ef3c2f56fa3ecb0e5bca5492f8c7e371a0bbaf9184baf9f7d9db250156c0598118a3acda7103ea8c68d52cdc1dcc26ada31ae7f1e094f1d113b93c6c1295840e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ed22e897dfb96bdea585dabc0da3470f

      SHA1

      9b478f0ac02fa92c2b8f8a271025b20e05f22232

      SHA256

      4cd2ecb21d639bc30f9aebf1038d1b3c782a87239b7f3855212d49cf2a80eb05

      SHA512

      df6c0b9a5830a75f44d262f84ad0075bb9c7e89b20c56504e6fd00da5d4c3178ae21d126e22e1dfe3801b0b4c3b03509bfa4e8988554e44b045c57405b4e13fe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      192a6fcd60d33b8c83dff79962ab0991

      SHA1

      1cb32223637890c2a7d5626fd4514a37e0f58d38

      SHA256

      2ecf354c100125e5cb72dc7603297998c574c434896b07321b1b2ef584703e9c

      SHA512

      a067224489c37e92cbb51dde887890d87297b1edd3acee708e772c3b5eacf05b445f1721671e9283c05f3b29ccbab9a3d93255ad543a6802f025eb73b4c0d299

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      13db09a57905fcc3ae8dfc3e0dde44c0

      SHA1

      a4d68ec93f5d34ebb4b2619d10a55c59b64a4d2d

      SHA256

      cd908433afb0938749ed61c06559ecbfb42e112bb152e5fe100c6d494f331162

      SHA512

      3e3602ebe872e73416b1dc5c020ce52cede249a6e312dc736dfbc2b7513d75c5c0c32005fd238e2c04d0473ea2236f99b516246e686440fccc92eeaf91fca891

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      45a856a72fd8b14be83f1b1decc1a0ec

      SHA1

      1f32ddbbc7f3c957965e1e18cb695ca6b8b19da5

      SHA256

      54c92ce833d1678759c5ce53bf3bb9cf0f205c8dfee063e44a5f1233d757268a

      SHA512

      05f632ec182fff58117d61a3b0d93cb7680497cca9e372386d72a49867aa898c97d9bef8b6908c9859115a7d3d07382628f3025c26c4d31d50c3bf8ffa8ba22b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      44dae700d8e63a14b2de54d3fa7b12ef

      SHA1

      2a05212e96e6904fee575051363b3f51528f6e3f

      SHA256

      843270999d3c6faf15f9f052e5a252468e43687a05d6a2233cf79058d858dd62

      SHA512

      c4ac6d0d0fda241c39016b3793559a9b1bd0ff203fa53d656c576b7bfd76ba35f152724a4af965ea8031bdb587eb7bab534c4e53a38162551755c3c7f83d8afe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      e8d8f3a31cade3f362a000a190a72e81

      SHA1

      be1a22cb0b9844259e1e4020cecf248b1844b000

      SHA256

      17b873b2e1d468e2d8483f3e40bf7a141a1701de894bfd34b28ecab6b8476709

      SHA512

      380be7548be70f7b9422a033185809ad08c4e2b51d6b1331f75fe08946ebc886d6c45f4984e35e364dfe5aeb82eed8b2f41901655b8025be72e012c2a3f2ebab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d80c4c1c42e7222f1ce89cd835652c60

      SHA1

      6a3f74ce03ec983aa5a8bad284eab2d490d64ae8

      SHA256

      6c20ec88e522d27eca006827ccab59a74746ff0c93a3612c5f60728238c85926

      SHA512

      2cc9b0b61c775fdad5947088e1c6042ece5f91673538e712d4c23cf8d718d6895c045126ce5bfa3e1db392eedaf12d0ecd02a22e4af809a2e0d84fd8be15984d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      efbc5a7e830d1c17e5a96e44c3084310

      SHA1

      0b191b08c25f4625231c504ce5e0d5b28102933f

      SHA256

      d5395b00deba66abd4cd393bf3c28b88c9956658f8a49ab9711c1b49f045895c

      SHA512

      c07db03e1d5d11d4410196c21f9de728dd2002e7c3a4738e60e4b59175b144e720b7997b6f5b24927e6725675f86a32457ea22b51b31edbc49f9f08ea761a167

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ced73507603216191d1595d2287393ef

      SHA1

      243bf51050df4ebe2d23f48bb80b9b22c60c783a

      SHA256

      c8cb8d35c9aba279caa88116011b74e60ff44f48b3a02fd5602622f0c16c4dca

      SHA512

      fcd194679e4a8d29bd4209a862f06cf626f1808467661de26aa9dae78c6ef0d482d9f971136a7cf13b47c578f4a9a97cf90c9fd65eebe92b26a6001c2a166e3d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8e07801fc2897bc9b5193d9362da2538

      SHA1

      924960ef89cfe2cf07f60aeebd63d7db54b75ab8

      SHA256

      4c1d6cf43bb9cd3b701a47f46e7c2b62415d68cc481df87f3b9deaf23124fe98

      SHA512

      89d5c4c95881edf893c48ed6aa26f0cecb4f2d272b3c7cf75adcf5e99c60e470b4d63d6fffd97d3e0bb2dc6fba03296ce68d5fb7e2c48e5fb90e0232ff5f244d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5ba8af2fe8f11ee63e078ee383dea8c1

      SHA1

      1df96b2abfd625e3e012a4c963393af754e85ce3

      SHA256

      dfb598893a1533e74f9750acfe0b417d7889aa981bebbf033e7f3bdc9b51e45e

      SHA512

      51356d3f0214b241607323144a02cc0362cd774bf8aeb593ecf144b931bde0100addc00707eed0011deb95abe06230654db01be02b0b3bebbd09055cef00f32e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dd9b996944ade2d14e503bec7edf9163

      SHA1

      d0bf1d865d8bbd1201d0a372a42b66af5a93ac64

      SHA256

      cc0825dbc65d5bf8fbb9996587953f93946186c0c76eda60da1b19c9b221d30a

      SHA512

      36982922e55728e755b83da6758152da8734e7439a032bc6a00dcf83d5422093f8569d992742a8516774f931ac67b66eff4b0d8cb5fd050b92bfce11483a8df5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      53fa2e47aab39b8144216971e90909a3

      SHA1

      3cca6f569069bb668a5dd406dff4e72e67f28e2c

      SHA256

      dd933a55ec7f552a4fe6b6594347d0422c0c03370b556b5833e7265456e2f41e

      SHA512

      497d5ca68acc7792d17b0b402cba20b8f5d27023fd56447bc2f667ed760579b1e883c2c5709eee8baf2cb551547fbd03ee8fa331c0eff7911668cd5d2531708d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      615af31f9ff3aace34a872e126f51596

      SHA1

      2b461f4d9637901a8a7839e31675b9544b8387c1

      SHA256

      58f00c8c32bf84477b9e0c4c815f3977c03d00f86222f42ad7e780b743d5768e

      SHA512

      c1539ca61fd1a9a5ead664b007b5b1c00f1d51a76ce8a03fe4fbce0abc9e9630b12191f393216b1a398c3aecd75aa6993778adc315f381d3deea9effd253138d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      68c0f689bd01970c88348dfbbcfad9ce

      SHA1

      a53fc820f04c060991d40dc47fd5717d622f1675

      SHA256

      0840227a6047e7f4f4997f131650839a23ad09eaee9f2f1ee40f280747521f10

      SHA512

      ddd6c9454d6f77b9677a7542642e5c9afcbfc85a572fc89dd03766c67b5485f32db458cc20fe2642e919fb5a2d515dda874d7299ea32bcb026b7a5e405788d93

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5784a466c05d18ff36342abb1a1449e4

      SHA1

      8863071265e86251d7c1260d309b43c8ba20c088

      SHA256

      ba45406b32bbc41993c4092e632f4de9704b4844564f7afc3b466e76d18e8305

      SHA512

      6f7c233af3ee23d325b476f1a472f190cf34b1a7539f8e12e6bc7221912db0f429f3b657dca8cd2c6da0e455e5ef05cfdb7261860551419b14ab2ee6dc0b8506

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      46470567f165fc0f27475fc30d215159

      SHA1

      74f5330f918f38218a7170ed1d40d3a320f52e51

      SHA256

      65020474a4303e377215ab99737beaef2e4312807ef6d019f6fca856c7b93348

      SHA512

      97cd6cb8bf53f81c1e35abb18e8027041d4a49d58ecdb91aeadd7be92bf7301aa878a4628df4597e371d50bee3df650f045bb969475ca0d32abe569799fae7f2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      134114230ed983b96f5cce2af867c3a4

      SHA1

      791633c8cd8ae83bb8e2ba60cc39521c73e1d9c8

      SHA256

      a087394e4e5c8e0803d3fcdd8414ebb7422bae75d7692c2e7eac33667c757c6c

      SHA512

      b22367ded7d8e60d9369dd21f5c7fc0d096df9e629fc9955eb101e3545214ab5557ccd07a320327d24e2c7a85d1754e56020df1e4b24287547e63cee0234419e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      dd5de2b1984f84da392974e9fe30a8eb

      SHA1

      078f60cd48b2f2ae1f28ec0e01ec8eba03869c8d

      SHA256

      a4e000bfd1f2a9587ffe1b9a759f1121482b2f5f1c0d229c911792228ddd7b7f

      SHA512

      a604c981e1ae1adea566dde4c0532087c902b9b04031a21197a7b667e2ce264a11ba5c21f1fe7be85071fde93b9ce2b3138bb7db37ac5c656c243903f3e99d4c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4523f75e4c47f54748702f8fffb34328

      SHA1

      391f57c8ac40f322233089f00026a2a4be204dfe

      SHA256

      63174d63bbbea9bffbedb7b599305675f96876af19d0a9b6167fc92dc2159ea9

      SHA512

      ee3165d92e93fd8c43542fe4fb63c37ae872f6fe431a5325280141e9df9c4d55c4ecd275233532b285af167a9b9bee750ef801c55d5f8d7b51b695ee122364d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      322260fd8fb82f7ebcb19fbe83e79089

      SHA1

      f0ce9abeb6e79f33446fd1d4d317b6ef1ace8549

      SHA256

      d33019e1fe686c2f80f86564ee90a64cb3b035651215f018b1c844633c72c76b

      SHA512

      5ef11bc31664b7046e7a8131540f7d9d789153dd8727f5e46d9d8e8e1825fbd8415bd8a15b3375ae7e9d58bafed68232a4e3e70747d5bd9a3f3e6681745f8501

    • C:\Users\Admin\AppData\Local\Temp\Cab2204.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar2226.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\crp1EE9.exe

      Filesize

      290KB

      MD5

      ce148790dea473381b36f44ceb02ff39

      SHA1

      26d49c342f7ad6b96edd0d0642ed6e5ff992c564

      SHA256

      e8ed1ede8840f9eb8fe8ea20c2aaaaae35ca205c73bfc756a776b402c3fa4496

      SHA512

      d47d6335b085fc7b5ab9621ada970880aeb86668afa87beefee606c9119df6e1cd56bb1cabccaf5fff7e28499c2b8c34fc26ef45c8fd169c977aec529876160c

    • C:\Users\Admin\AppData\Local\Temp\hao123Config.xml

      Filesize

      359B

      MD5

      5a9cb62ea556c89bf3bd7ed779988b81

      SHA1

      6d5cdfd24479d0f41883debd16112d2878946125

      SHA256

      6642c75c484b5fdb89007b25b6dbdefb43fde0dafd27d5cdc0d03947525f690d

      SHA512

      50635951b8a04e572fca3af01777f2fb4087df2bfef7f203b9bf9931de90839956d93ac6ed56ac06e6c8219056b9affe6e77a02d9cf508b651e1eee1eb8a9ae4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Hao123.lnk

      Filesize

      944B

      MD5

      d8450a03d7a5c304e8d83ba66cd1da6e

      SHA1

      5a624f52dd909ba57f62fbfaf5f4df750f3fd20b

      SHA256

      260cbb9115b4de7f746a7b4fbd8af9b1fe3f8b4d11ea64366f528724fd49b713

      SHA512

      1474f6543fd9c88c6c0c2dcf64f8a4b3252cb8be203f75f1c74e016e243fe28d1edbc8da5efae76e12eac1600b5e58951d7c349a83f49c4eaa28bb1808110d30

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\B077FQCC.txt

      Filesize

      69B

      MD5

      0b6db61fff2e69a79ccc3057226a5735

      SHA1

      52d6d6f87074543a7e610641c69e02412462ca4e

      SHA256

      264d21ef70de6442c90ac98167a92e74b26ff1b2d3203b60da7d545b8580a8eb

      SHA512

      eff67bf90a86130d906e64115fa4abd8c968cf9bf6c5320949f855f6ca5b9ba3a2e0b8409a5099a7e10ceee53a94529071cdf935c62790d9351828a621ffd652

    • \Users\Admin\AppData\Local\Temp\bdg1F24.tmp

      Filesize

      561KB

      MD5

      e737e92f38ba1d6c953cd5344106e99d

      SHA1

      ef70f1c01fd260408a0949e9a8cdc212d1c9b80b

      SHA256

      75a6584a02891a17a978f6dc66fa76c0fcb8e4b4bfea57e181e705388bcc8323

      SHA512

      84ca47cadf9e139b61465d4d11265311da1f3556f47b64ad7d46970ddb02f4638c0d0a40998291f0b9ad477cbc77b4dfb083293ec3a5b6f747564c10e15b7b3f

    • \Users\Admin\AppData\Local\Temp\crp1ED7.exe

      Filesize

      806KB

      MD5

      80a139587673aa6183e59261d81a1594

      SHA1

      91be64de1664955bc21402364fbccf90c6e69c93

      SHA256

      f9a900e59dc28b54928bdc0a5fdc63bbbc6e7a787fab9eaa7938501c29940506

      SHA512

      2013bc9059bbd37f3535a379c4de19d2d9aba9fe9fb4eead5ad7f2068d25b8c1b9f641ddcc865c90d3cff48c0216a472ef520c6f318fbeb7d55d4df48779baa8

    • memory/1192-193-0x0000000003180000-0x0000000003181000-memory.dmp

      Filesize

      4KB

    • memory/2740-19-0x0000000003150000-0x0000000003263000-memory.dmp

      Filesize

      1.1MB

    • memory/2740-20-0x0000000003150000-0x0000000003263000-memory.dmp

      Filesize

      1.1MB

    • memory/2760-41-0x0000000000400000-0x0000000000513000-memory.dmp

      Filesize

      1.1MB

    • memory/2760-21-0x0000000000400000-0x0000000000513000-memory.dmp

      Filesize

      1.1MB

    • memory/2928-42-0x000000006FFF0000-0x0000000070000000-memory.dmp

      Filesize

      64KB

    • memory/2928-192-0x0000000003330000-0x0000000003332000-memory.dmp

      Filesize

      8KB