Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 16:18

General

  • Target

    4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    4310d664e629499a4fbfa199076842e3

  • SHA1

    bcbb89bcaa21715a012c09af3b500ff2e32bad00

  • SHA256

    da2224f92edd04225d00c2616f9bc95760ec4689a553cdbeeea2bca2ae550958

  • SHA512

    371fc466d670395e336dbd1a99aaff5a1075fe824d6e501955c1d76db8f8ef8558f29f64333fc9a048cf8ab24c39692c1d84d1eda8c00433dcdfaf0b769dca00

  • SSDEEP

    49152:oaSDJLr+Be0SeBk2a5wL18ou9DjMYcOajZqOLBNwDaebA5rOYiZnO:otO0iaaB879Dj3cOodB+GebSivZnO

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\is-8FUVN.tmp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8FUVN.tmp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp" /SL5="$501D6,1888839,70144,C:\Users\Admin\AppData\Local\Temp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2384
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /regserver
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:568
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /install
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:4564
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:3800
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox64.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1128
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /afterinstall
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Suspicious use of WriteProcessMemory
        PID:4544
        • C:\Windows\system32\RUNDLL32.EXE
          "C:\Windows\sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\PROGRA~2\INBOXT~1\Driver\tbrdrv.inf
          4⤵
          • Drops file in Drivers directory
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3272
          • C:\Windows\system32\runonce.exe
            "C:\Windows\system32\runonce.exe" -r
            5⤵
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:1964
            • C:\Windows\System32\grpconv.exe
              "C:\Windows\System32\grpconv.exe" -o
              6⤵
                PID:1580
          • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
            "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /TRAY 0
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2020
        • C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe
          "C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:800
        • C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe
          "C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1896
        • C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe
          "C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3216
        • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
          "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /postinstall
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -noframemerging "http://toolbar.inbox.com/lp/inst.aspx?tname=Games&c=4&tbid=80139&iwk=846&addons=1&addonlist=&afa=3&lng=en"
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4728
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4728 CREDAT:17410 /prefetch:2
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1176

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Inbox Toolbar\Buttons\black_green.xml

            Filesize

            51KB

            MD5

            01116f926b28cb3442473d8b47a6dd8f

            SHA1

            5303b4976d13bc6f3ffa0e3c443a0d36ea55fff4

            SHA256

            01f5b90e46c63749261d30ab669b55b581ae0c41912b54b38f71c7dc2c454511

            SHA512

            df6debe9debe900ff5338aa9d8637a6c887b9905a1fc77b6e2a50d3f8067cfa806e9fceb3d8d2a57b5b859346267048bca60c5f19d2bd9092f9c08a2d2859271

          • C:\Program Files (x86)\Inbox Toolbar\Buttons\games_online_gb.xml

            Filesize

            4KB

            MD5

            04e1df757b9b5a6418d79d072db000ce

            SHA1

            f118b45fa1092a7d473886b05984580dfa5eb5b8

            SHA256

            20ddca93499bb0a82627577b4cac56b6bb4c0ccb2c10ad92d16bac8b09a96864

            SHA512

            380eeaa2bd01629c7128a0971d6855f30d4e99bb9347d465a670419d8684585b1f7d52c6ea6e30d12bd7b0101ea1c9399c7e4f1f781db35c225f97a5e0d8d871

          • C:\Program Files (x86)\Inbox Toolbar\Buttons\games_portals_gb.xml

            Filesize

            4KB

            MD5

            4b3274899a510ce0a0eaa6427bfd2869

            SHA1

            bbc6075fd32dbb95a254ceec0083f008113f7dc3

            SHA256

            1799d52866f0579798e7817e9168017bfd5a0a6e452af848e1dbe7311324c0f6

            SHA512

            4e9ebb12d5e6fa334bf7cb3dd4424036b3493958b9d6755fcaa5b61af9cc2898c588e6914b16298012b385cd0e890c024a607f120332c677f7b7d521952d4059

          • C:\Program Files (x86)\Inbox Toolbar\Buttons\games_search.xml

            Filesize

            3KB

            MD5

            ccd6e298e340f9adc0e7359e9e924441

            SHA1

            87a1a8110e60fe6e0322e253170fb07c64dfc97b

            SHA256

            81857ce2a92da97d87e489612c6b5a82fb37f2a5856a36b772764f7072452701

            SHA512

            2bd078aaf07ece5a21c7353bd1843f9be60615775f19d1f14e0551c688b63bd21ac8c158230669f719180a724d64de9665720ba593323b87a638e3163ace5d17

          • C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.cat

            Filesize

            7KB

            MD5

            dacf44f0b690f4c0053d31535fef87f2

            SHA1

            d2318c6c771a4adddd507c2fa6aa7d81ebc7aca6

            SHA256

            9175d7ad0f699049214a066e3b7672036a64354fbd88b002fb34f1d8c583d334

            SHA512

            60c7e1f3fa5c5515907b4e2702b0ffc1f32129fc92c75653ab7591745d78f7fa59b0a6c505b21cedb36151d4ca4a0fa1b90f09f8d267f7c9bd91a9605a87b7ce

          • C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.inf

            Filesize

            1KB

            MD5

            c84b4baaa44b8989b2e76b42c1ab5301

            SHA1

            36ee3212aec954e82fd73c914717c7ad32cfc367

            SHA256

            94ecff1e1ce8d5d5ef349769ee4236d230a7f58dfbd0a7d32ebf84c2b41fcec8

            SHA512

            230bab43937d5ec8600882b2ca6249b07fc580fea5b1c8817ede28fae6566bc78fb8f2088dc4dea0997e217c94659063dc3d2adff0405944b427d325ebe373a7

          • C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.sys

            Filesize

            35KB

            MD5

            e7c0aac166d688ab41dff2f17e420a3a

            SHA1

            00b70a50af14b497cebd100344fafbd3a564fd5b

            SHA256

            babb144ed6471079b6922914646a110f9fe5588ca3d94deeeda584c484e4ed26

            SHA512

            fe539d89e28204b1d09607e9f0450ae619ff71efdfccb4597641a27cb3234fce1a2061e273bd8490c9bf15d19871aa93c1bf98c909b6c252549c40915d62721e

          • C:\Program Files (x86)\Inbox Toolbar\Inbox.dll

            Filesize

            1014KB

            MD5

            cef98a42f1f86652b0ca1c31fdc2e288

            SHA1

            39d597dffab6d36bc47f21fe20f2eedba864a5ba

            SHA256

            39490eab802f21e6d00ef5eef0e1532b69a64dbed537c39f6c6129c14b6406bb

            SHA512

            498fe3191d3d9852c5d7ccd960847f24dc41af43cd2d4d05569b11a2b2f0b5b1c74d66ce520b58a7a6759bbc729d11dccfe5d0a1e6c5b2422ddd083adffae5e6

          • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe

            Filesize

            2.3MB

            MD5

            7bfb9bd61a69e7a4717f34f22dae8b4e

            SHA1

            a8b1ba82ee7172e9e5f184fef35bd41bdd373906

            SHA256

            f8404bd34230c1db313e2659ea483e7640c10987917e2cebdd4dd9c4ae67a19d

            SHA512

            19e6a0c065b1f6980b6927c6af5accf7b5d29f450daf37e57feb9ec901f3105cedd34e2129f2c5c320b516bd6a709a3b8a6885f4ee032e12dbae0dfd4b9a3273

          • C:\Program Files (x86)\Inbox Toolbar\Inbox.ini

            Filesize

            2KB

            MD5

            7e2839c0e98367690b3af21d6408aa17

            SHA1

            99d41f4b0c57b5e6ef1efa2350038e10d4188035

            SHA256

            8cec384377ada9c4f9bfa6d03b8e6a2ed0dc650cad45b82594e11338458271ba

            SHA512

            d637ad72dd205f47ba4a163a88eb503dfb24f03a4f0b0c01aef8c29dc49942679eb5db47a1c63ed042f1f1fecd06d8ca6121972f33360cce5b956c0fc530286a

          • C:\Program Files (x86)\Inbox Toolbar\Inbox.ini

            Filesize

            2KB

            MD5

            565371d1e7f731b426c5e36e61d9f003

            SHA1

            c7752a54f5ad38002ed6452c19570adc833f9e89

            SHA256

            ac43b254a21613bce70efc92a047cec6c5b9d5c4d6a2ab231ca5fd3b3665520e

            SHA512

            f498bfb9dc3016cf8be350b837d668441e0a4fd0611c1f28dff72f87d305ebbbf5656a8521245b7d388cff8a19d57ba1eb747f50d140beaab6a1902f66af0e92

          • C:\Program Files (x86)\Inbox Toolbar\Inbox64.dll

            Filesize

            1.5MB

            MD5

            5c2c888c50585ade35e03fa261e6c7a3

            SHA1

            228f8b2423945596d44892fff79cee851e725d89

            SHA256

            b88171732c2054dbc64a1649430646eeaf7b5d63c491e515a66736aacbb7aba9

            SHA512

            af463a375586f7a07f29c5855146be05ad74bd18fc90d46c653bc6911761b911472ab5bd7eab75a7bd8b9533704118d2d756368c74ccca7b88c4de294e8ee3d1

          • C:\Program Files (x86)\Inbox Toolbar\unins000.exe

            Filesize

            1.2MB

            MD5

            67e866dbad2c21354f585086d3f3e5b2

            SHA1

            6b0ccd164c9108b01a81f249a2d9c05ed3b5f67b

            SHA256

            6d7c851b4dc1acb135aa18ef28c5921472ca46d555358fc97bf2b10fc82ad8da

            SHA512

            ff0945ec265d3c04335e3a0ab08737ae68ba893455ffa3fa9e45e73ae2d58df737d247827e6b110f904fb18dd40e0d45882655f43b17c6bccd88265ad2aa494e

          • C:\Program Files (x86)\Inbox Toolbar\uninstall.ini

            Filesize

            66B

            MD5

            b084e06a7f942ae74c984674b59ab286

            SHA1

            6e5316501f88e432d7144b176f18202072146677

            SHA256

            806847b184ad90a37e734caf5cddd9e9eff80099f24810312e666f49a060a83a

            SHA512

            ab3194d6522f6592a28c3e583fc4cf63f3875287efbd9dafcb68be90239982b76b398569121a0317942b39956c28d8e93dd2a1c1f2bf568a9c3c88cc3ef2d04a

          • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

            Filesize

            30B

            MD5

            129a4ce81f9a7b3dc2d98e090a069f05

            SHA1

            a266de9a5f3fea40e7de85ddfde49f4b6c515c96

            SHA256

            9ec3cb3f9a5f238ab518e7b57bcad1ca765c429fb37be15057da7eb9170541f7

            SHA512

            3d15c7ddf93e944ed5ce634f35050f95989b1f1f35b4b8233e10658508f07953579c6dd62cced8efd22cf783c7e9565f39270e5bb46d2959a1312148af6414f2

          • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

            Filesize

            89B

            MD5

            96339d98a30c58ee7785f4f3d87b695f

            SHA1

            4c16cc8ecac6a5eb9f6e9df5ec120e49bf36e493

            SHA256

            1002a24d46b6a7a6fd8a1c007e18bcd8c3126d7b61143cc995d1c05262f349ed

            SHA512

            0f4a0cd146092218ca32eac7427173ab2aaaf52c22b5c1c6fcfda21e9b76ae1c3984da132e3a2363bba9de125c920740a908b7f8865f147898e7249ba63b737b

          • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

            Filesize

            119B

            MD5

            8ed0f33758e83f41443df65ffc614f9c

            SHA1

            f865889a4bd5da514bcc7a689a9785268451e29e

            SHA256

            f27e521eddd77cdf261cbec81d0db38b64e7358fc94fd87327543e888433275b

            SHA512

            e9585968b0651e1ef042578fe19ab73e24c413732d34c5ebe3bd9a7fbf99394c7ae4767151ba25be1b03b258f09bc2913d56220a5489578c4470b847d1e48058

          • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

            Filesize

            173B

            MD5

            41c522b00e9d9c6bb62cf78080474177

            SHA1

            84c04a068887f2d2243062b579b0e6740c4cf803

            SHA256

            7bd0fdf7cbc433c919ea4d27893fb90617b972f23f5c80c2f213502b4ef13402

            SHA512

            6c7e486942472fe4d52319109c9fea2f68cb0f31cf2a1a9a09f0cd69118edbc0e54d98eda301f5e694071d2b61267d427cd9ca746f2abe6aad8807dc0b03734b

          • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

            Filesize

            210B

            MD5

            1bfafc87edfc54b5b5d8c6b99866900f

            SHA1

            64dc96d7d8cafa91da7af16095090b11d73112eb

            SHA256

            256b70b47a943d08943819c40be014333bec2d1a163a70212ca0113380fde8c5

            SHA512

            facf9b8a7cd6a2f18bf015413f207549dd6a2deb4269b2e8e16f8c2c4edfe7df19ae2b4c3d8468ee3f2369bc42fa1f93b991c27e23d825b05e9c6bc4893a822f

          • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

            Filesize

            243B

            MD5

            b66ecbd801a3a7d8671a6178c9a75032

            SHA1

            6d22424e05e88a6f9910ec353c6da3dc5c085787

            SHA256

            31ade048867ac94d488557cbc8696efa048f6110a74e904398af641cef8e98de

            SHA512

            7b0112814f647ba3f9869ae76c2955f48df46c7de8214d292e2c2f390b4d1dc4a2b7a6d988a539581e66f7e988067f7e7370de8570c3d124009fc244dafa6350

          • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\translate.ini

            Filesize

            93KB

            MD5

            6aa650efb4605f4bb39bdcfd8a2198ba

            SHA1

            da12240ffb9984e3f3d8e93a859bc8d768a242a4

            SHA256

            8729058fc0a109bfaf82d84abdc954805cd46ed499ff235d5181ff3facdaf2cf

            SHA512

            6893a2f796546c859c1a9ab2a8c1960f2606fe779a07bbe3cf3c0ebdb9579defa87c3b1d4dbb7e4934839a0cd5062255fb6d019bee11cf57e09b0cf350ce2819

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

            Filesize

            717B

            MD5

            822467b728b7a66b081c91795373789a

            SHA1

            d8f2f02e1eef62485a9feffd59ce837511749865

            SHA256

            af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

            SHA512

            bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\832765B953AB3CF6C7F02DD7AAAC952E

            Filesize

            504B

            MD5

            8d26c59541600bc99c86ac8107839c76

            SHA1

            10f618005296484e687c1cc257092bc16c45a551

            SHA256

            826cca040a832a43ff3ebbc2fcb89935fb6661b9c24f0618a8bcb7607ff6fb54

            SHA512

            4379c3e14b5f3efa1c341b640e801f449724bfa3eb7a5e4edaecd4af233134351ba884f3105d45aa54692288973f57834d4ebff177b67b777bf0dc1fc176e4c2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B624848E7D0C04204BF0E664FB37FBEA

            Filesize

            504B

            MD5

            e49cbf003fd1bf3261a452e0903698c5

            SHA1

            824d5990e3b2fd35890a7fd79aef2ddf2971c3d3

            SHA256

            a66382fa0de352ba46c0005a7c92fde4c6d094007746feea72bdeb2a890680a5

            SHA512

            e0af28d72b4152780ca083c7e6f2c386de9f18a8ae42577dad4122a84983c5c1e2a9c2b0c9f54083ed0443f0573ba8f50969c777d728673cfd8a80ce89a0df37

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

            Filesize

            192B

            MD5

            4405383f9f9c4dcd1d63f201e707e09b

            SHA1

            c69edf7fd641a45d3bb7d20cc530ae3225b5d0b1

            SHA256

            8d94913b5f0d098130f3d3d14e54d6a635b267c6426ac55613d418452e84a4db

            SHA512

            73caadb11b6149d5b352adde0618282369b8e3092cc409c791a38c0775298f354d4a4a178591e85c49ba5d0b22d0589919a2783c54c181cae94d49a94a83ebf0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\832765B953AB3CF6C7F02DD7AAAC952E

            Filesize

            546B

            MD5

            56702df23b488b0d9b2217c05d155d35

            SHA1

            376ec6d3fd5bc6eb2033f8d77d90f0e2cf1aa301

            SHA256

            6e58b5f36479fe6208d3d9ae3e159f9f43baebbad8f6d6192981dfdf6f1d1f29

            SHA512

            d5a09a7d7b6dccd3e3a3c200bc1d444dad7d8d8a2239942cbd780a18cb79157eeb4646d10e2b9d6125d71a0210ede39d0654a0e0bfa81f9f0cebaf8abe64c197

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B624848E7D0C04204BF0E664FB37FBEA

            Filesize

            550B

            MD5

            fd0ee7e6af637d4cbd7ea03711e02941

            SHA1

            483224dcf227a94c7a36fd55d7330ea8c653b9d7

            SHA256

            446fd79006e3944d7d5795bb14c2377109fd41acf99e5dbe393a0b9061b9c45e

            SHA512

            394d8369459d4af4f93c70c50257c2791f3aa91b7f688910a6785936e6aae81a83fcf2cef4a16eed5a0bacd19e6fb4150d9e048d7e1c2ccd677b50bd4353ef2e

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verC2ED.tmp

            Filesize

            15KB

            MD5

            1a545d0052b581fbb2ab4c52133846bc

            SHA1

            62f3266a9b9925cd6d98658b92adec673cbe3dd3

            SHA256

            557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

            SHA512

            bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\5a279vn\imagestore.dat

            Filesize

            15KB

            MD5

            b2057fe01e01c39312ac3ba7acaf6a83

            SHA1

            81ea52f1cdcd7049df0f392eca2dcb2884a92828

            SHA256

            48e25ab527065a8e16608575b6151e049b7af217eee60a82f50cc692e829258c

            SHA512

            416d8804fb9c662ed95ed7b7c6e85f5f638e410e2f14b73ba86619b19aebd386a208b88a88948f60ee2e395387cafaf38a24b28b5fc2a738e99d7979efb529c7

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3DWZNJ32\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OIPZWEW8\favicon[1].ico

            Filesize

            14KB

            MD5

            de4c71e881f03193bb0884185b51bbdf

            SHA1

            8f51bb36b81298f9fb57824716539520553b77fe

            SHA256

            1f8e952702b912ccb4326c9bfd76f4cb49459787a2955924798792c20ed45580

            SHA512

            cf91b32ff05ce6fab615d727c6a1e25c9f4f08d51af5cadbba74650921333b0f0f3a0444a36c4c4ae77abd3ea54c846c8248af7cc0256c06ca4aabac457eced0

          • C:\Users\Admin\AppData\Local\Temp\is-8FUVN.tmp\4310d664e629499a4fbfa199076842e3_JaffaCakes118.tmp

            Filesize

            1.2MB

            MD5

            e7106fbf42fbc6d5b08a18ada4f781b4

            SHA1

            36d4a629f79d772c0b0df8bd2ae2ea09108d239d

            SHA256

            64e1f1fa7d91920b17bc7bc679a4cd8d87ff5b104318b6921bb6bf6a19055635

            SHA512

            adf876296a952aadeb4f25211c0939bf5a278809b5d3007ad7e26c5d4975e7684d242c1b3de796efd474a47cb7ecdb80f9047935924a1108bf0e4d7c973d1845

          • C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\AGupdate.exe

            Filesize

            873KB

            MD5

            a3ccbbb0735800b89931b73ccb69f9b1

            SHA1

            53c70f80017eff22ad88a53fdb3ffc518354af59

            SHA256

            97d0684ab1ecb2f89a3c8e53dc383aede506a1f9367aa283c0b9992a19854d43

            SHA512

            e4461a7cf5e8b8e655a2985be672af25e44276b018b7b532a665f26c1a44032bbada7e5a071a78827020c3f18d9d5c79bd0f59fe97876b1eb4279ec4094f3704

          • C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\DownLib.dll

            Filesize

            183KB

            MD5

            db25dfdd4c1f2b65c68a230881072695

            SHA1

            94cd6a3438041f0e61b0a1bea7b66461854efe69

            SHA256

            1b66aaf1e7e3c493dd96af3b7442ea60072f6e93ba45281eacd31a14ca7e7e73

            SHA512

            db69e4ab2218856e5184d9094e7e39705b83e3efdc15225067205c8faf6e5836145364f1d509192defa3b48864e72b9f8c0f2dc53a7adb2b86c655318b7afc2c

          • C:\Users\Admin\AppData\Local\Temp\is-MC7EU.tmp\setupcfg.ini

            Filesize

            85B

            MD5

            00e9d0f34b3a913968be26c46c156644

            SHA1

            20e7a6b33595bc4444c696533f6182836d997aa6

            SHA256

            7a837a30f1812197812e6a8a231034c51852d57f0a1e444b2bb5a33be6c1d83a

            SHA512

            fcc04e08d263042c991a8d320f4720f4410b66ac365946dd6bcb1a829b7b129a073fa4b2180b06aae65f5a72ef431b8916d38f5866f9b739054bd71a7c224555

          • memory/568-93-0x0000000000400000-0x0000000000660000-memory.dmp

            Filesize

            2.4MB

          • memory/800-393-0x0000000000400000-0x00000000004E5000-memory.dmp

            Filesize

            916KB

          • memory/1896-404-0x0000000000400000-0x00000000004E5000-memory.dmp

            Filesize

            916KB

          • memory/2020-514-0x0000000000400000-0x0000000000660000-memory.dmp

            Filesize

            2.4MB

          • memory/2020-381-0x0000000000400000-0x0000000000660000-memory.dmp

            Filesize

            2.4MB

          • memory/2384-148-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          • memory/2384-408-0x00000000047B0000-0x00000000048B7000-memory.dmp

            Filesize

            1.0MB

          • memory/2384-163-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          • memory/2384-150-0x00000000047B0000-0x00000000048B7000-memory.dmp

            Filesize

            1.0MB

          • memory/2384-23-0x0000000003C20000-0x0000000003C57000-memory.dmp

            Filesize

            220KB

          • memory/2384-378-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          • memory/2384-64-0x0000000003C20000-0x0000000003C57000-memory.dmp

            Filesize

            220KB

          • memory/2384-130-0x00000000047B0000-0x00000000048B7000-memory.dmp

            Filesize

            1.0MB

          • memory/2384-7-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          • memory/2384-406-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          • memory/2384-63-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          • memory/2384-430-0x0000000000400000-0x0000000000536000-memory.dmp

            Filesize

            1.2MB

          • memory/3216-420-0x0000000000400000-0x00000000004E5000-memory.dmp

            Filesize

            916KB

          • memory/3976-432-0x0000000000400000-0x0000000000660000-memory.dmp

            Filesize

            2.4MB

          • memory/4152-62-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB

          • memory/4152-431-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB

          • memory/4152-2-0x0000000000401000-0x000000000040D000-memory.dmp

            Filesize

            48KB

          • memory/4152-0-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB

          • memory/4544-306-0x0000000000400000-0x0000000000660000-memory.dmp

            Filesize

            2.4MB

          • memory/4564-123-0x0000000000400000-0x0000000000660000-memory.dmp

            Filesize

            2.4MB