Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 04:07

General

  • Target

    8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe

  • Size

    760KB

  • MD5

    8f128e6c0c42bd73084daf6f42e79663

  • SHA1

    26c5ebb8f7394f8d9a46b7b5cc13fddcdb786535

  • SHA256

    06d0053abd5c3b62b77f18d22db7bb4646e26c1433cfbdfe76747195c23d5654

  • SHA512

    229b8e7a5b1bcef6227dc9158b873730ce31e4e719861d1b63874c4f974a08e322e9622d70cd4e04a776a3001a356681edd093770762d18f84f77908b6a9b391

  • SSDEEP

    12288:Yc4HGMupg4/8gsJwI7hJiCc9NNfftsAd/cYbQQNWQvviR1qxYNpl/RF0k3hf1Q5l:H4HGPyRdozvtryiQQNN3iR1n7HNhf1QH

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies security service 2 TTPs 22 IoCs
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 20 IoCs
  • Drops file in System32 directory 22 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Runs .reg file with regedit 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"
      2⤵
      • Checks BIOS information in registry
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\a.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\SysWOW64\regedit.exe
          REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
          4⤵
          • Modifies security service
          • System Location Discovery: System Language Discovery
          • Runs .reg file with regedit
          PID:1832
      • C:\Windows\SysWOW64\msnmsgr.exe
        C:\Windows\system32\msnmsgr.exe 1424 "C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Windows\SysWOW64\msnmsgr.exe
          C:\Windows\system32\msnmsgr.exe 1424 "C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"
          4⤵
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c c:\a.bat
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1436
            • C:\Windows\SysWOW64\regedit.exe
              REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
              6⤵
              • Modifies security service
              • System Location Discovery: System Language Discovery
              • Runs .reg file with regedit
              PID:4012
          • C:\Windows\SysWOW64\msnmsgr.exe
            C:\Windows\system32\msnmsgr.exe 1480 "C:\Windows\SysWOW64\msnmsgr.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4284
            • C:\Windows\SysWOW64\msnmsgr.exe
              C:\Windows\system32\msnmsgr.exe 1480 "C:\Windows\SysWOW64\msnmsgr.exe"
              6⤵
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              PID:2516
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c c:\a.bat
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4496
                • C:\Windows\SysWOW64\regedit.exe
                  REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                  8⤵
                  • Modifies security service
                  • System Location Discovery: System Language Discovery
                  • Runs .reg file with regedit
                  PID:1424
              • C:\Windows\SysWOW64\msnmsgr.exe
                C:\Windows\system32\msnmsgr.exe 1504 "C:\Windows\SysWOW64\msnmsgr.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4788
                • C:\Windows\SysWOW64\msnmsgr.exe
                  C:\Windows\system32\msnmsgr.exe 1504 "C:\Windows\SysWOW64\msnmsgr.exe"
                  8⤵
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1504
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c c:\a.bat
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:1748
                    • C:\Windows\SysWOW64\regedit.exe
                      REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                      10⤵
                      • Modifies security service
                      • System Location Discovery: System Language Discovery
                      • Runs .reg file with regedit
                      PID:1832
                  • C:\Windows\SysWOW64\msnmsgr.exe
                    C:\Windows\system32\msnmsgr.exe 1512 "C:\Windows\SysWOW64\msnmsgr.exe"
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:2996
                    • C:\Windows\SysWOW64\msnmsgr.exe
                      C:\Windows\system32\msnmsgr.exe 1512 "C:\Windows\SysWOW64\msnmsgr.exe"
                      10⤵
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4672
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c c:\a.bat
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:4528
                        • C:\Windows\SysWOW64\regedit.exe
                          REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                          12⤵
                          • Modifies security service
                          • System Location Discovery: System Language Discovery
                          • Runs .reg file with regedit
                          PID:796
                      • C:\Windows\SysWOW64\msnmsgr.exe
                        C:\Windows\system32\msnmsgr.exe 1524 "C:\Windows\SysWOW64\msnmsgr.exe"
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:320
                        • C:\Windows\SysWOW64\msnmsgr.exe
                          C:\Windows\system32\msnmsgr.exe 1524 "C:\Windows\SysWOW64\msnmsgr.exe"
                          12⤵
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3916
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c c:\a.bat
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:2708
                            • C:\Windows\SysWOW64\regedit.exe
                              REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                              14⤵
                              • Modifies security service
                              • System Location Discovery: System Language Discovery
                              • Runs .reg file with regedit
                              PID:4184
                          • C:\Windows\SysWOW64\msnmsgr.exe
                            C:\Windows\system32\msnmsgr.exe 1356 "C:\Windows\SysWOW64\msnmsgr.exe"
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1644
                            • C:\Windows\SysWOW64\msnmsgr.exe
                              C:\Windows\system32\msnmsgr.exe 1356 "C:\Windows\SysWOW64\msnmsgr.exe"
                              14⤵
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1732
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c c:\a.bat
                                15⤵
                                • System Location Discovery: System Language Discovery
                                PID:4944
                                • C:\Windows\SysWOW64\regedit.exe
                                  REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                  16⤵
                                  • Modifies security service
                                  • System Location Discovery: System Language Discovery
                                  • Runs .reg file with regedit
                                  PID:1528
                              • C:\Windows\SysWOW64\msnmsgr.exe
                                C:\Windows\system32\msnmsgr.exe 1484 "C:\Windows\SysWOW64\msnmsgr.exe"
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:540
                                • C:\Windows\SysWOW64\msnmsgr.exe
                                  C:\Windows\system32\msnmsgr.exe 1484 "C:\Windows\SysWOW64\msnmsgr.exe"
                                  16⤵
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4836
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c c:\a.bat
                                    17⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1808
                                    • C:\Windows\SysWOW64\regedit.exe
                                      REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                      18⤵
                                      • Modifies security service
                                      • System Location Discovery: System Language Discovery
                                      • Runs .reg file with regedit
                                      PID:5108
                                  • C:\Windows\SysWOW64\msnmsgr.exe
                                    C:\Windows\system32\msnmsgr.exe 1548 "C:\Windows\SysWOW64\msnmsgr.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:1164
                                    • C:\Windows\SysWOW64\msnmsgr.exe
                                      C:\Windows\system32\msnmsgr.exe 1548 "C:\Windows\SysWOW64\msnmsgr.exe"
                                      18⤵
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3864
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c c:\a.bat
                                        19⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4312
                                        • C:\Windows\SysWOW64\regedit.exe
                                          REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                          20⤵
                                          • Modifies security service
                                          • System Location Discovery: System Language Discovery
                                          • Runs .reg file with regedit
                                          PID:3004
                                      • C:\Windows\SysWOW64\msnmsgr.exe
                                        C:\Windows\system32\msnmsgr.exe 1572 "C:\Windows\SysWOW64\msnmsgr.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:532
                                        • C:\Windows\SysWOW64\msnmsgr.exe
                                          C:\Windows\system32\msnmsgr.exe 1572 "C:\Windows\SysWOW64\msnmsgr.exe"
                                          20⤵
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1216
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c c:\a.bat
                                            21⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3724
                                            • C:\Windows\SysWOW64\regedit.exe
                                              REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                              22⤵
                                              • Modifies security service
                                              • System Location Discovery: System Language Discovery
                                              • Runs .reg file with regedit
                                              PID:1808
                                          • C:\Windows\SysWOW64\msnmsgr.exe
                                            C:\Windows\system32\msnmsgr.exe 1584 "C:\Windows\SysWOW64\msnmsgr.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1980
                                            • C:\Windows\SysWOW64\msnmsgr.exe
                                              C:\Windows\system32\msnmsgr.exe 1584 "C:\Windows\SysWOW64\msnmsgr.exe"
                                              22⤵
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4568
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c c:\a.bat
                                                23⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4564
                                                • C:\Windows\SysWOW64\regedit.exe
                                                  REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
                                                  24⤵
                                                  • Modifies security service
                                                  • System Location Discovery: System Language Discovery
                                                  • Runs .reg file with regedit
                                                  PID:1608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    3KB

    MD5

    d085cde42c14e8ee2a5e8870d08aee42

    SHA1

    c8e967f1d301f97dbcf252d7e1677e590126f994

    SHA256

    a15d5dfd655de1214e0aae2292ead17eef1f1b211d39fac03276bbd6325b0d9f

    SHA512

    de2cebd45d3cf053df17ae43466db6a8b2d816bf4b9a8deb5b577cfedf765b5dcdc5904145809ad3ca03ccff308f8893ec1faa309dd34afcab7cc1836d698d7b

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    3KB

    MD5

    9e5db93bd3302c217b15561d8f1e299d

    SHA1

    95a5579b336d16213909beda75589fd0a2091f30

    SHA256

    f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

    SHA512

    b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    1KB

    MD5

    5002319f56002f8d7ceacecf8672ce25

    SHA1

    3b26b6801be4768cc7582e29bc93facdf2a74be3

    SHA256

    f23f4854d17525744e8028db6dde6eb7d5d664b0ee1b08870c9c01b639e0124c

    SHA512

    8eae0fabc7f5a7e452abacf988a3632874c556af409da5e60c5e529524732b40f22d4e1d860ccceae87642875c819fc8a8120eceaabd25861f920c8c066a9aef

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    1011B

    MD5

    5088b4be1b90717121e76c1fc33c033a

    SHA1

    090676b012c30e6b0d6493ca1e9a31f3093cad6f

    SHA256

    d1d8c8ac4136082ac60938e8148c43d81fa91a124eccf34048e629d22daeef3a

    SHA512

    0cac2dcf138b1a66f857a54c92afe467ef7544655cd1c4aec3b4084c92c9186d9ba10e0e74a54a6e43e676068d3747f668f7286d44fcefce7ee4d385a3a96962

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    1KB

    MD5

    bf7ee07851e04b2a0dbe554db62dc3aa

    SHA1

    cad155b66053cd7ce2b969a0eb20a8f4812b1f46

    SHA256

    13dc8dc70b7bb240f6f4cf6be5ff0ec55c606267a328bb9c9e34e5fa70cce0d9

    SHA512

    9ed79305c81287cf01d0138d87c6ec981b5bdd9195c56f8def4c74fdbc9b4816661d084fc1314f99b40102945b61d05121f4eaadec6403d4295a80847b797bc4

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    2KB

    MD5

    d8be0d42e512d922804552250f01eb90

    SHA1

    cda2fd8fc9c4cdf15d5e2f07a4c633e21d11c9d3

    SHA256

    901619f668fe541b53d809cd550460f579985c3d2f3d899a557997e778eb1d82

    SHA512

    f53619e1ec3c9abc833f9fca1174529fb4a4723b64f7560059cd3147d74ea8fe945a7bd0034f6fb68c0e61b6782a26908d30a749a256e019031b5a6ac088eb97

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    3KB

    MD5

    5aa228bc61037ddaf7a22dab4a04e9a1

    SHA1

    b50fcd8f643ea748f989a06e38c778884b3c19f2

    SHA256

    65c7c12f00303ec69556e7e108d2fb3881b761b5e68d12e8ae94d80ab1fd7d8b

    SHA512

    2ac1a9465083463a116b33039b4c4014433bda78a61e6312dde0e8f74f0a6a6881017041985871badee442a693d66385fe87cbfc60f1309f7a3c9fb59ec6f2aa

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    784B

    MD5

    5a466127fedf6dbcd99adc917bd74581

    SHA1

    a2e60b101c8789b59360d95a64ec07d0723c4d38

    SHA256

    8cd3b8dd28ac014cf973d9ab4b03af1c274bbc9b5ee0ee4ab8af0bdb01573b84

    SHA512

    695cafc932bc8f0a514bc515860cb275297665de63ca3394b55f42c457761ebf654d29d504674681a77b34e3356a469e8c5b97ff7efc24de330d5375f025cba5

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    2KB

    MD5

    501effddf60a974e98b67dc8921aa7e8

    SHA1

    734dfe4b508dbc1527ec92e91821a1251aec5b2e

    SHA256

    672e3c47827c2fc929fc92cd7d2a61d9ba41e847f876a1e5486e2701cbc3cb06

    SHA512

    28081046c5b0eb6a5578134e19af2a447d38afda338bd3ae4c2fc0054460580d47f9ab6d8c9001ff605e76df462e7bbcab80be15deaf3ca6264e20717dfb9c1c

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    3KB

    MD5

    7fe70731de9e888ca911baeb99ee503d

    SHA1

    0073da5273512f66dbf570580dc55957535c2478

    SHA256

    ec8ce13a4cab475695329eddc61ff2eee378e79f0d2f9ca3a9bc7b18bd52b89a

    SHA512

    4421df7085fd2aac218d5544152d77080b99c1eaa24076975a6b1bb01149a19a1c0d6cc2c042cd507b37af9a220e7ce1f026103cdabfaec5994b1533c2f3eeac

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    1KB

    MD5

    3637baf389a0d79b412adb2a7f1b7d09

    SHA1

    f4b011a72f59cf98a325f12b7e40ddd0548ccc16

    SHA256

    835336f5d468ac1d8361f9afbc8e69ff1538c51b0b619d641b4b41dcfaa39cba

    SHA512

    ea71a49c3673e9ce4f92d0f38441b3bc5b3b9ef6649caa21972648e34b6cec8694fa8fb7fc0ddad1e58f0464e0ba917c4500090a3db3fc07e1d258079c1c2506

  • C:\Users\Admin\AppData\Local\Temp\1.reg

    Filesize

    2KB

    MD5

    fa83299c5a0d8714939977af6bdafa92

    SHA1

    46a4abab9b803a7361ab89d0ca000a367550e23c

    SHA256

    f3bb35f7fc756da2c2297a100fa29506cb12371edb793061add90ee16318bf03

    SHA512

    85e46b9f1089054e60c433459eea52bec26330f8b91879df3b48db1533a307443dd82006ac3bb86245bbd207c1d8c75c29949f755cc0dc262ede888a1d531599

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    4fc73d2a3c107fa2cbc47157af62583e

    SHA1

    ba3de0c5c5a8bd796b81e70e902e7a15070ef3b7

    SHA256

    325582cc2b96526f10d01c66b6e9c5e963f419357cf1e175a7b3852c39d38ef3

    SHA512

    c29c0b358f96c8eb7c43ec86356af6427d83a1da57eb148a2faff442931da00e6f0f41a751dbf1c47e507c8e52a5b8185fe6eea804aebf6f90259bbe06478d46

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    e49cbcfd86033ec08441ef167e7fb714

    SHA1

    010bc49dce8b0b12f0734eaab7fb903aabcbf646

    SHA256

    4584533c7dec16cff6d0593f7963c6cef2639e9f02b53342104564993e1ac07d

    SHA512

    46cce53dc117cee0895b90cb6155e16f402381d2fe947495f851ab014fe21b5af303c9a7a86996aa098d9a69b087cd04316b719b12cc64949ac37e473e1983af

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    25f0c1942df173dacfec677273069085

    SHA1

    bd023d639f008f331f28da6d51787b94d19d4d43

    SHA256

    ccc690db6419202e84ae6cd7a4221382f0e3c6a2ba8a071c02268aed8d9659be

    SHA512

    f80ce0aa047b72b528f2928997733488826ab69bd6deedc715b00cd0a2df0f47163755db2fb4ecfa625400ec54843b5a5326d1a12faccef983c7541eaef34ec7

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    04ee0608b4a12575db05f1fef28746fe

    SHA1

    825b189e1db63e890d8fdc029412f08e5601dc07

    SHA256

    f2a823b29e54fb252b038766a65e2fd1ec9298b98c3bfb069ec7e1f53bef5387

    SHA512

    90f0d5724cc521fc7b224e1279533f60c5debf39d8c5f95bc2a432eabb8256a619e80da559973ded3663b94b2a1cfb968ca72de651134b0f27439505424f554a

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    34c3a2a6d09dcc3d48843fae4a38dbc9

    SHA1

    b202130541b6d96331b0ddb5e17cdbdf840bdeb8

    SHA256

    d390715324cccb9593fa877e9d94ce21a6e6838897e30752a890d0456226977d

    SHA512

    25443d1ed83bca9c7cf11734eb36b7e0244e65f0867bd088cc5f87177ce895f98950bd64152cfa69b4dc4b14cb6c1b26889e064bdfbf74f2c59b0c62c010832f

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    5f876d649321300d803a3b5582dcb76b

    SHA1

    ce5559609adccde3683221886e103d55d2bea2e3

    SHA256

    da5af8ca7376a019130871105e1efa929337d58b6bd005035121e5d6d06b4daa

    SHA512

    a6e4b6e99ef41ad6d5086130ec56a32ac3329049e30d6486afecd81913e0fcbe80241c9a20d74933474dd9812c0240c2289e033b53fe01a8b342a49e50d4e976

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    292aabc8163b68309bb4f29742677ff4

    SHA1

    1a03e07b10d5ae573699e224f214703fc792f1f2

    SHA256

    37ff821e54501d412e9a8d8d0f796535f69722670ece5981fc0f57b15409c9a3

    SHA512

    caf735bd963440602d11ab586e3009f444b062aedfc84e9be8f28a1f3944ae94cc70cfaf83cf8eb2f9a1b6d6dac706affdd5f711ac57636ac1ece5b130b04806

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    06c3b4af068844143c60afa970dda9fe

    SHA1

    ddcb509c7e75178b66f05f6427686c51ef59bee0

    SHA256

    bc39cc6d6bd5335d81ecc3dd83067a487f546713c80d78c34127c6b36583d7ff

    SHA512

    d5840cf22c9af6c937264807675689c400fde6113cd93b2de855671709d5a0387682dad48f25ee7eda58c58fbbb23a5887e71754677907db6bb04857938f4477

  • C:\Users\Admin\AppData\Local\Temp\FA36D0AD.TMP

    Filesize

    113B

    MD5

    fb081935bdfb90023445deb8eeb679df

    SHA1

    e448655759d50a7258455a843df4de8a0e8adb53

    SHA256

    916b2db930e0b2d6bd5caaa90245e1e32f8c7871ee936eb9bc0f8cb43755b963

    SHA512

    52feb654ff02aa19026dac4148bf19572ea19038e44000680290eef283e7474b5fceaea970a36ec1326f33220d33a5939543cf336f86457b291bd63524887bf7

  • C:\Windows\SysWOW64\msnmsgr.exe

    Filesize

    760KB

    MD5

    8f128e6c0c42bd73084daf6f42e79663

    SHA1

    26c5ebb8f7394f8d9a46b7b5cc13fddcdb786535

    SHA256

    06d0053abd5c3b62b77f18d22db7bb4646e26c1433cfbdfe76747195c23d5654

    SHA512

    229b8e7a5b1bcef6227dc9158b873730ce31e4e719861d1b63874c4f974a08e322e9622d70cd4e04a776a3001a356681edd093770762d18f84f77908b6a9b391

  • \??\c:\a.bat

    Filesize

    5KB

    MD5

    0019a0451cc6b9659762c3e274bc04fb

    SHA1

    5259e256cc0908f2846e532161b989f1295f479b

    SHA256

    ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

    SHA512

    314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

  • memory/320-821-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/320-812-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/532-1369-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/532-1360-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/540-1095-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/540-1086-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-1223-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1164-1232-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1504-421-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1504-412-0x0000000002090000-0x0000000002125000-memory.dmp

    Filesize

    596KB

  • memory/1504-546-0x0000000002090000-0x0000000002125000-memory.dmp

    Filesize

    596KB

  • memory/1504-536-0x0000000002090000-0x0000000002125000-memory.dmp

    Filesize

    596KB

  • memory/1504-423-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1504-425-0x0000000002090000-0x0000000002125000-memory.dmp

    Filesize

    596KB

  • memory/1504-424-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1504-420-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1504-422-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1644-958-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1644-949-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1760-149-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1760-148-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1760-147-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1760-263-0x00000000007E0000-0x0000000000875000-memory.dmp

    Filesize

    596KB

  • memory/1760-272-0x00000000007E0000-0x0000000000875000-memory.dmp

    Filesize

    596KB

  • memory/1760-139-0x00000000007E0000-0x0000000000875000-memory.dmp

    Filesize

    596KB

  • memory/1760-151-0x00000000007E0000-0x0000000000875000-memory.dmp

    Filesize

    596KB

  • memory/1760-135-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1760-150-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/1760-146-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2516-286-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2516-284-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2516-285-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2516-409-0x0000000002150000-0x00000000021E5000-memory.dmp

    Filesize

    596KB

  • memory/2516-273-0x0000000002150000-0x00000000021E5000-memory.dmp

    Filesize

    596KB

  • memory/2516-288-0x0000000002150000-0x00000000021E5000-memory.dmp

    Filesize

    596KB

  • memory/2516-399-0x0000000002150000-0x00000000021E5000-memory.dmp

    Filesize

    596KB

  • memory/2516-283-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2516-287-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2776-264-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2776-278-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2996-684-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/2996-675-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4284-401-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4284-410-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4424-0-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4424-137-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4672-559-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4672-561-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4672-558-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4672-557-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4672-560-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4788-538-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4788-547-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4984-15-0x0000000002190000-0x0000000002225000-memory.dmp

    Filesize

    596KB

  • memory/4984-14-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4984-136-0x0000000002190000-0x0000000002225000-memory.dmp

    Filesize

    596KB

  • memory/4984-13-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4984-10-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4984-11-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4984-12-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB

  • memory/4984-9-0x0000000002190000-0x0000000002225000-memory.dmp

    Filesize

    596KB

  • memory/4984-4-0x0000000002190000-0x0000000002225000-memory.dmp

    Filesize

    596KB

  • memory/4984-3-0x0000000000400000-0x000000000060F000-memory.dmp

    Filesize

    2.1MB