Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2024, 01:32

General

  • Target

    4ad69c1a5f6459baf6fb722edf533f49_JaffaCakes118.exe

  • Size

    5.2MB

  • MD5

    4ad69c1a5f6459baf6fb722edf533f49

  • SHA1

    f47f0c62826013d8506700ec7c5c2a5f3dff6bc0

  • SHA256

    16b23e2f1893ebfd6d98d5ba8f6ff45d143a8b5fa0672fadaf0e44be72b359b4

  • SHA512

    0d91fc35dd06a457543f9163231ef39f6913052641a35e21d8f8e234705277f1ab3fd30072fbd2b880eff8f1548455d09fe6c8c4d84f9bb92424fdf3ec6724a9

  • SSDEEP

    49152:6QDgok303Zzl6QOy94YaJuFXkTIlrZ0ISiRctgVf0d2ZKwr7cUxEUotoKVbmqSEq:6QU/sZzNqNM+IbBcfdHVbY

Malware Config

Extracted

Family

darkcomet

Botnet

Adminastor

C2

psshackteam.duckdns.org:1604

192.168.1.21:1604

Mutex

DC_MUTEX-XQZH4JA

Attributes
  • InstallPath

    MSDCSC\msdcsc.exe

  • gencode

    FxgyqdzTfgm7

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies firewall policy service 3 TTPs 6 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 63 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ad69c1a5f6459baf6fb722edf533f49_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ad69c1a5f6459baf6fb722edf533f49_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\WIFIGUARD.EXE
      "C:\Users\Admin\AppData\Local\Temp\WIFIGUARD.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.softperfect.com/products/wifiguard/?from=auto
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2884
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:209932 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1320
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:930831 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2696
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:472082 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1584
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:537635 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2284
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:209973 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2924
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:2503715 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1148
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:2438186 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1424
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:2438212 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2796
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:2176057 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1368
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:1848408 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2128
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2716
    • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe
      "C:\Windows\system32\MSDCSC\msdcsc.exe"
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies firewall policy service
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DF3B10AC058C0D6973F46A2636A375DF

    Filesize

    345B

    MD5

    6088379b4589a6969fc196536e9ac011

    SHA1

    a32627866ffc7f8d40362f5b00984b4b4b0dca3b

    SHA256

    58560f53c5dc55498c7e5f236aeaaa4b345660f7be85b86815ddd32b2e1c6d81

    SHA512

    5ecff8dfa26dea3ecd3b22ffa3b8c1f55cbba63513aa52f8b8ed6152623a00a5e3f7cdb4f2dc1863c6624e0f29f8dc7bcff76609c9c4c9f41e32823e023d3367

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    c31b3b0b3aa9da0ddb64a4b7912be7d3

    SHA1

    c234de26b1fd259e8ba2588793c963337146c52f

    SHA256

    0ccb0829ab7c671c7c497b4f4efc7f8645279e0689438b7ff7b92e65ceed7e98

    SHA512

    244942f2df88f024044b1c71512666c49155a5f68aecd066e3e87a68635bc43c0592cd16d2d6929af502b8f3f914c091ae218be25132df82e9ea0622e2328196

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    de98a9c6a694af5e2247a17380edb431

    SHA1

    66db4c112e18d868544b2463ea8019bf35391abd

    SHA256

    22d4dca4abdef055d180ed6ca0b0bd0852c011a6612764ad17939acce14a6d68

    SHA512

    ba683988ca313b042fa4bf178e0f734a4669ebefbe6ae0c7a5f58be3b6f55e268045281de17a4aa9dee2f1edc50fc28d86b7a9d09ebe9be00d1efd081c8e62cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e4144633889a85e1a0feb0a0bd1b75b

    SHA1

    ae0b014c5793dd7ad32457a54ead4d834de983c1

    SHA256

    1e21c63e2f930e62d7403ffc73d34856cd7a4b15791384a7960be982ea22e637

    SHA512

    0eacf86dea6ff4a4ba0683ae6756a7016e797c41976f564ae8ec1c6ed94c0edfffd7114659e32d2b5ea12b539ee4e2f498c7a75964887673c8eacd9e980dd6e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ebbefdab009813b5de537efc16deb69

    SHA1

    e2adca0d3a509708a65ca971b04b42ea0f74ec87

    SHA256

    63f58bdd697a39c34264489f306dc42b5410663e64222aa0fc20e5e30d6b142a

    SHA512

    869a629e26ee2c9acd357ac6d65a9f4127adca9d8ab047bebe9c1dd32650e89ec17cc757a16b373ca88c3619d5b6bf932c27a0a6e076d2aff1fde6fcbbd78320

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d85e2b42bd3fe8c41cce60f26683e132

    SHA1

    ad4e15193be491b7293c878c3ec2aac6756a423f

    SHA256

    99b99d0c0668221f2fc5212899b2b064ab737995d4a2f0bcc4793ee1b1cf983c

    SHA512

    f25e66423d54bfa019e42881e8cbe35ea7246241f84e6ba1536e85d65619c85fb6e3330a08e66c64166c76bc25ad63a06fb02e9ea22bd9e8556ae850957da086

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de720df0785d5fd008af46516295960f

    SHA1

    c7319aea21d920421c66995c4ab3248f922587c2

    SHA256

    5df0cc709a0342c2de03a75990e9a5cd748bcdc29f2ce5814c52c8956f432cf1

    SHA512

    06256ec539579e46c30662b02f8eeefd6cfe6d5842be0e0fd76684f49f1dfd065541c5f281a06f3b9b8e7bcc3b5ad77325b2d757df2e0fed442098abbc69cb32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b02d30405a86f2abe4039ff9c284d0c

    SHA1

    96cb7290cee8940ea29f75eaf8400a1ecfd15a07

    SHA256

    db4e478f323774270eb82ebb9efc64b026b51198a1aff763f1158101bd699c7d

    SHA512

    40a68b5fe6bd63774610875e144d7fb6e47275189e8633b9322a15f8c14ec17cb270625387b702fe56bd4e8550b7cce3c9fc79d87cea4bacd3d125fded1fcd20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bfe899553fb24b035074144e7409f9c

    SHA1

    03955954eb482522366a2500c303351ab27468ab

    SHA256

    eb0d2953e5370e8252d06c6b82d65a3bc7c7717861ca398310c5169f6a0e21b3

    SHA512

    72a6ae1d4460f9468ff8e404e26da0bb82868feb4d639f7170a561f77cf11c7bd2cf3bff83e84b8ba30f0305ff1d15b846e89eb46fe33d600be9c6c03d46a9e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee4efc914e2cd907fc55b2886ade96db

    SHA1

    ef34e83113cfdecc8b0a66d0daf218950bc008a0

    SHA256

    ffd88f9287d7bb7fe71941e131c2d835cbee71dbbb332ebb93809bb4e2376338

    SHA512

    b0effc293ea4c1cc3041d7fd3e637370b87d42b23ab39fa81310fd0d4bb4682713ea1ed3f73e4ca9ea7eca8354f6cb9536be58c42fa55146e6d3e9e337eef163

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7aac356c1b56f97e8dc92a59090395e5

    SHA1

    3be1852f2b6443b6d6cdd7d15c116a91a73600cd

    SHA256

    2b038b2ff108f049cc969b319917a8d84c44f8bb00242512227019e159d3ec9e

    SHA512

    e59d7e7a40b22630e3bf8b0c82155753dec9c6ef928691145a4374184816f1d2952331f37354e36fdc5b8e7ca232371a52f903931f76aab24d59deb259cfcadc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b29fc93d44ed5f3f48d3451281f7f387

    SHA1

    924d519d973a6899ae0f8a28ab770df4c54833c3

    SHA256

    fa09aeae5c56ac91703e9fe83e7f53edd8f6c13e99630c326761e52104397abc

    SHA512

    7a17e98dd35a9616250b7cc01ec994de1cb2c43ab6aca70a3a4cc021cff158ab21dbda201388531830d22faa21d06021bd0fc4d8c4c909279ba8cbaaa3928efd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67afb5f4fec43e70ad29e9498aa3eb7a

    SHA1

    e5159e3c32fb4a7e649cc6b6db42f718e3908435

    SHA256

    a9a9db96d380d8b480bba7b92f7ec17442cf8a05e007f0afc9b5757ad68ab175

    SHA512

    5742e3f0109cd2002f70c107664232c56af02dc7e8a8a8bebc50a07d0393825cccccc94b90eed94cacd7f3872226437a2585d985cc12d5ad03fb7cb9251d3ba6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    329b37a92d8454ed73c5e879714722e0

    SHA1

    9ca341507156eda045c6608ffff237995f21a1ae

    SHA256

    2cd235f8cbafcae5762e2ab3cfeac773f67f9225cc02b622e42fc618177a55cf

    SHA512

    9124905982d7e07e93d07d1f4c34ea8d8bdc23ee66ab3bb5ebddf845807f11315e8deb51baec6d949f2bcf1cd79143e650fd9eee0389cddea209caf3a6f22b99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e77c2f60313054a96622db9382f7255

    SHA1

    04379eea0599c82b53a6eb780d23687d26f54df8

    SHA256

    c35ceae8c8c19f0ac2a7d306493b9e33fd8106d73aba64fe196f25e7cca2c0a8

    SHA512

    70059b9eb8948d281c8e68258ebcd9a3522caeeac6e47f2dd53e82ce7f190371a031cf8ea32859bc350b139810c151dea97d64e87e769c40496386ec249e5084

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3b6e09873f8dc0c8b0d39d7bd33bf3b

    SHA1

    635ffd103584f3d91abcde32a02fdb3b136fe566

    SHA256

    b312ea4fbf18b7d8e34662cad864c046e135b8e535bee773bc74f0dc7211d6ea

    SHA512

    8df8d8ff7ece898243e3726c0e7078ae24ee5ba8ebfe885e51132fd27decf6f61b20492fcd2a42197c65073e34300c3a65ff4c0765dcc1b6ff26b0e0d66de567

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd8827d658ee7e8f64f8a7371441d465

    SHA1

    0ed013cf669c63bb208f1c4cf004dbe155ded180

    SHA256

    5ea44b593cface7a904e628efe316bdd137c07f08d1c1635775374d795b4c3c1

    SHA512

    3f28e86b3d311ef6739bfd612f733eeb29bac91e02ab6f9259dfd9d3b20bc6929e6d640de05d58cb2f0f16198405388cac4e970878c57d2cc74ac9acfacee5cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f06140104b886301e60dcb3244e9254f

    SHA1

    44b3f65aa766bc3a928410d74808d9d4948286af

    SHA256

    14065c5d71a5b0587cbd043b4aa45146774bfcdafd20e522ab4c2ddb1099309c

    SHA512

    55b06457e37567a61df7667503522ff5badab459d9225acecd47ef0278cccd53b9076519ad3fb6b0ea2cb1f397dea36cc6e1790fd3e9e189a5152c343062c6f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7f5eba377c573c7bd24c900df5e60ad

    SHA1

    23e6eaf8f2447cf0d31297b5bcfda1ce0066e443

    SHA256

    077b519c3d3387853046e6d903ffa9628cb14bba1415caa607fcdac22151758d

    SHA512

    66a94daeabde1bb4ea53cced235a02ab63d2fb1d4781434ce6b3ad1ea979d89bf61ea86be9911278a813479e276726ada4e7ec4f21ebdb4bc8ee0d9658c280b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8554fc0e92e224e33fae067c213a21ca

    SHA1

    21fe439b96c29fff8a3cd5e2531262c4c2d3b3e6

    SHA256

    a886c9b5731fdf8712c1e8d0065309636b99bc995f43a73de103929e7e4a466d

    SHA512

    d7289e962b5445e0fcb045789e7bfc9dc68038296e449ad6454ad18db1eafa86dd73acaa526398e75c9283ee806687045244d3ccd3394a019dc187e169ba68aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68b2014d7555475c1f79fb70752a7514

    SHA1

    9a6f29e2d0a9f74460b78cb221106d350eb02944

    SHA256

    2fa20c2557db7318e3789c73b133a50c934ddf08dc2794e40bbd50825f1efced

    SHA512

    1f0129a9f724adc1b506f5e54e5d659410c37c1317fdc3033dfdee932bf64c08eee5f703eb5b43b99aa592cd719e6500abbb7119d6dba1bd220bda0d0bd7d693

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76f83b9d5ccea4dfcba1ad3e890b8aa0

    SHA1

    2980e8e863aa13e0ddd6692a02e91070af71f867

    SHA256

    4a683a87b3717d731a429630b61b10d8c8b8a2dd40bbeacc7e76bcfcf48fb1c1

    SHA512

    0a1ef58394138a1e0349cc2245ea6a25d937b76e1914a479f17af00853dcf4685386d2990738c48fd12c628c7d6cceb65eca51285a63979da13766b91784b289

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b23428a1a43cc8a62cf9f5f85c7f7737

    SHA1

    17f11e5a05a36981c89e5d720cafc54f5a24f402

    SHA256

    ee8ee668f690a216eaeecb5eaa98247f40253f921f5544706d7ae6b6bdf3f20d

    SHA512

    b152c5bdcda53584182b8f96cf7823a8bc9684c847bf44bc52c5f1c8dbac3e5e285bc1f52d00d7190ced94534c37e4b33505aa7aaa212990aef68949a67219d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c2458fafe005f7022b44a1974d90e83

    SHA1

    28baeaf37940591509ea7809d2d236d3ee2d4b29

    SHA256

    1a2435fb6142d83095b1ecc258fd58453878de6f802f48ca8a214c0d9e8fe747

    SHA512

    3086fcff7bb553499ebaf58be6f70f8d094cf5bc6cd80615fdf5e9f344c098c81c4ccb3051cdbe969214da35b9c63f44d3817043c6499421d834f037d2523b58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ac3e4ff0b52b6f2303fd5956d556757

    SHA1

    1197efba1366e44e934996c8d40ff0955a4953a6

    SHA256

    e3b8663ce92e33065eea026ee7aee288763e9c626a85485ca5ca683f27a5d692

    SHA512

    52c78f521b90b7f152a17849a7b1f1c5d235c98d26c4cb42151ebf480973ec5841d025ab5996087f9c58f3107ba118ecd8c8a566749162a603f4e625e4a8ccde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DF3B10AC058C0D6973F46A2636A375DF

    Filesize

    540B

    MD5

    5fbad8ba67a70f385ced7fc9e2e41efb

    SHA1

    f87ea9c4aeee2a94acd67f9510688bf461725c10

    SHA256

    52cbe9e3b615524085389971763d1e717ddcca4a5ce9108b22dc999b477c0a8b

    SHA512

    f1e6931e941c12282a53ef54c30e4ec66eb52cc97b2029d7089b22e0f0292e9debd586aee644c654c095ccf036b82f545925f746bd009f48de245e4a0c385b09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    f6bcddd5698a14115908cc0fbf228b37

    SHA1

    3e55082828eb60d4fb1dba5c47a92840e32e2289

    SHA256

    f379f8adce0791ca5ab8d00e3b70d668ab439b51532fcc05c0a1b0a17b818273

    SHA512

    3dd8ca836f3d33d9c5b35c358e281844322b700eeb59687e9d248e961254983202fcc892bde43faaa034eecf4c0c47388a1fe97782f6cd2f083ea058f11e0615

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\e1ur8h2\imagestore.dat

    Filesize

    63KB

    MD5

    18f2c67489f72d6f2159f8ffb36dc7bf

    SHA1

    fbced26c64a31fb22763d1c26527b546b756e9fd

    SHA256

    62651a42900090ff0561410faf42b7a85aaca956e6857af8481a7c69623fe47d

    SHA512

    7e92b7ca4058fdce75665a3dfc3fbbe6f3ca87ff70bc31e71fbd42d4b54d8a98b9b82b345aeed43c0e82223f196c7576715ac7bc96776e5de829adee4b36530a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\css-dk[1].css

    Filesize

    4KB

    MD5

    5eb58e36f226ed5ac0b39fe8bf3a5bf8

    SHA1

    8be9fefc4833935172c0449782e2158e0d465634

    SHA256

    a7b7444c08e658d57c96145ab1ce75fe7081e37225240a6b2d922fbe4bfccbd8

    SHA512

    eade66783d7a52458bea1c57111c7b2002b659de05fe01b65247a9ecc35fed7b88b6f4c5e0cebdafd5f6723cd31f3ae3769dbca28abab2806853cc7e251895b4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9UR26M8S\softperfect-logo-s[1].svg

    Filesize

    5KB

    MD5

    57acee621c2578d8952e66be36243501

    SHA1

    f98de09fbdcfdf08485a9b460dc2c742b810d50a

    SHA256

    770cc580335ffd627ece7f827b4eb2a9e7f04c20e7959a1c8bd4d79831b681f3

    SHA512

    8556bf96310310060dcc0e668fdb20aacf882e513cac243841c6f9335f90f9dbbd8a65d50f47032a08e096a0e20595e4fb4ce19d7d8f64e261d930038bd63ba0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\bg-logo[1].png

    Filesize

    203B

    MD5

    ee55b4d347d739c3484222866d33ea27

    SHA1

    01a76737c918d666adc5b593225673e52b6d4308

    SHA256

    5b213869edba120f2b2fb3a5b75ccdfe8c46ceee97e615f1fa69bd4a7cb1354f

    SHA512

    a507395da2f8312859d931c5d0b16250dc5321c0e6dbde9fc1d52d5efd0bcdefe76e051d98deaea7af4a5437c565b274c7848ee02a335ec23a10c5bb5c00a1f5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\main_windows[1].png

    Filesize

    40KB

    MD5

    ad164eda2425f9015b8ddddf0f00aa9e

    SHA1

    4209419389f5eed0454869d1603594381eb811e0

    SHA256

    2e072c108f892e4022af122896bc77e82085fdb301f713f7d4497fb869ee7a31

    SHA512

    223f8a0cff3443ed61fbc424f703b135ebd855b5a03e6c08b587c0c91c4c73a289340fe752a853a7c787e5ca99f8345afc8147e77b60716a8ce2b075a2a6b8f6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\softperfect-logo-l[1].svg

    Filesize

    17KB

    MD5

    fed002bc0f7cd0c730a6e1aef8023d44

    SHA1

    6bfd4a2375f34801d608e6910f1b13a1c687ca05

    SHA256

    e3297c3718aa5c7392bd384c2c46cfea23ecc310e6118af8893c1979fe342276

    SHA512

    66020183a7076d7bec5ed6b70108e510114fee6be89a347435f625f76db498ac93a2ae58a76879f93e6e5e76d4462ff0d94e3eff55687b35d13709ecb5b4723d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\wifiguard[1].htm

    Filesize

    9KB

    MD5

    f46a2ac3d64497cc938b9dace12b2100

    SHA1

    9813b5b119c8fdd26b884818c62eca55d84835fa

    SHA256

    0aea1045fa905cac2576bd1323d7aae0754ac35a9bc139420fce1a51562470cc

    SHA512

    e2f236402401c284415150b4a0082e42017fe57327cad0cb72ab43b64e11934148509fbacc9c4f3a0357d54e56e203a607e631a6813edf5790dff714d0d102d7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\css[1].css

    Filesize

    16KB

    MD5

    76944e2c174fee52c9a72e21ed8e4c3b

    SHA1

    fdd773dfd8c25c3b5adb3159c10fb0a5d2aa12ff

    SHA256

    432d52f3ce00de95e5f9198f28659b789562671059e06303a9c98f5e9d295ff4

    SHA512

    a8c8bf378901347a8390073e1aef5585448a093edb8962baae4d9ca4e8d7ab309126d2b1f702319388d85dafc15c09abe894938cbf014a5e42122d5b50ae9b09

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\favicon[1].ico

    Filesize

    62KB

    MD5

    fd2053ac9e7e2e09a34cdf287a1f4c35

    SHA1

    1a5a45b59ef8378b27864e933145903a7de71738

    SHA256

    9a75522ff30e8e570ed1bcc8e092bfa061f332deadfb64781dd09e1a5f7419f8

    SHA512

    98784838112e7bea93f578f43de12cd87c7c259a1382645738bb82289cff195fd8c670f7f3951f6b407ad5027db9eabc3d2ed7b789c3cd0d2359e1b46e135fcc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\logo[1].svg

    Filesize

    13KB

    MD5

    97d9f2e10784beeb3770af8cecc9c4f5

    SHA1

    574f3c9972782607fcab33a84f76b087ee3bdf6e

    SHA256

    af3ca3387a1f6b98467fb33d04ae6c13275484951088de37436f322aa176b8ab

    SHA512

    04c64a03c9a6514bd187467c9f5d2de521b6c836521de23645d5f98a5f4cc77b3cddfaa8b8c36424fbb6bfecb6d0d2cdb2b15622bd5dad1f9094fdd7ed34acb2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\unfold[1].js

    Filesize

    298B

    MD5

    d94be89de4bb7e9de5cbefda965d2c8d

    SHA1

    22d338d4f108c29bc49045b741375e8a2dfe9676

    SHA256

    cb3efeb73d05da8a44efbd18fc7f4ae20575eabefa5931ece6f6044b025229c3

    SHA512

    3025376231979997dab0be52723514c96fa1252d8f4e36621e91835bec48aa6c26dce4e106d000b46313d75f053cb994f92fac01f98450c55ea5526681c97d1b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\wifiguard[1].htm

    Filesize

    265B

    MD5

    47c35d4766147798311149d504f5c048

    SHA1

    3d52f9ff471a727fbb24306d0acb2515deccc87a

    SHA256

    8226888f87dcae7712e652da2eee1cc5603d89a489cd81ae36cc59bf0cfa4d42

    SHA512

    1063617c38404494acf4fcd5aa93564e8185bf0d03f0c9a3a88f68c82726c92db4dc7dc5cd47bdcea3c7795b403ff16a917875726b86e698b6c58591b2c3b139

  • C:\Users\Admin\AppData\Local\Temp\CabE86E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE86F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

    Filesize

    3KB

    MD5

    a16053c088a65cd92a8a344f9edf81de

    SHA1

    e504dc9fb7e49cd493daaf1d15c11b7babc9d8c0

    SHA256

    5214f6a8de06693f7756a2b515f72baf8cc5da1d51921c79ffec42a657144606

    SHA512

    eae9546b40a6da16f7316250c8d8b8f3c11f970b50e853ffb4050eeb50a4b6c30c5f5c8525377b921157151cc53a44ce4bf3fa8b11c47ee94c6f176999461055

  • C:\Windows\SysWOW64\MSDCSC\msdcsc.exe

    Filesize

    5.2MB

    MD5

    4ad69c1a5f6459baf6fb722edf533f49

    SHA1

    f47f0c62826013d8506700ec7c5c2a5f3dff6bc0

    SHA256

    16b23e2f1893ebfd6d98d5ba8f6ff45d143a8b5fa0672fadaf0e44be72b359b4

    SHA512

    0d91fc35dd06a457543f9163231ef39f6913052641a35e21d8f8e234705277f1ab3fd30072fbd2b880eff8f1548455d09fe6c8c4d84f9bb92424fdf3ec6724a9

  • \Users\Admin\AppData\Local\Temp\WIFIGUARD.EXE

    Filesize

    4.6MB

    MD5

    2253164fc86c103493550a99bdec3fff

    SHA1

    334a9e294f1862da6610e592c8c23648f1aef2da

    SHA256

    13e6f822599155fb327cf673f5aa719d4d58f94f2ba05c76fbaafa70bb759aa9

    SHA512

    086b73ac1f57e84a1e17be535ae7878cd1e34c0cdde5d4bf79609d73d14775a1585b0d1b176c17143e78be6420de495e87caf3edf8a7ee3bfebc62fe190a02ec

  • memory/1904-0-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1904-46-0x0000000000400000-0x0000000000948000-memory.dmp

    Filesize

    5.3MB

  • memory/2672-44-0x0000000000400000-0x0000000000948000-memory.dmp

    Filesize

    5.3MB

  • memory/2716-15-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/2716-34-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2776-85-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/2828-45-0x0000000000400000-0x0000000000948000-memory.dmp

    Filesize

    5.3MB