Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-02-2025 00:18

General

  • Target

    JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae.exe

  • Size

    1.5MB

  • MD5

    c9040ddc80275bce629c71c50d2e42ae

  • SHA1

    b01c27424e01031bdc77f56bd55d04fe791661aa

  • SHA256

    7e3e3413575bc60710db5d575851dfd46c05e596eeb7e01ead584e671fe7af62

  • SHA512

    d39e783ba908e5d5853263a28c6744c892ddd549591bb24b8da95ef219d9df5ed9c6a56645689289f263a077015681b70f3c6a4b985a5cf8afe762d9f67437ac

  • SSDEEP

    12288:DLI2nmeC1Tg13XD7tfmCnZVcorOk4X/3K63S+/9HQKGP2ZbHfUK2jRhSGakKeiSt:fnmwnECnZtR6f/OKPOAGakqKitxKMM

Malware Config

Signatures

  • Detect Neshta payload 7 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Downloads MZ/PE file 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Manipulates Digital Signatures 1 TTPs 4 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 25 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae.exe"
    1⤵
    • Checks computer location settings
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec /i C:\Users\Admin\AppData\Local\Temp\adguard\setup.msi AID=11947
        3⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1156
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1116
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D52618583F9268D428A199496284BC8D
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI81BE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240681515 2 Adguard.CustomActions!Adguard.CustomActions.CustomActions.OnFirstInstall
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSI9779.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240686984 15 Adguard.CustomActions!Adguard.CustomActions.CustomActions.PermanentActions
        3⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:220
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIAD64.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240692625 30 Adguard.CustomActions!Adguard.CustomActions.CustomActions.OnInstallInitialize
        3⤵
        • Manipulates Digital Signatures
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4376
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Windows\Installer\MSIB30A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240694015 94 Adguard.CustomActions!Adguard.CustomActions.CustomActions.OnInstallFinalize
        3⤵
        • Manipulates Digital Signatures
        • Checks computer location settings
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4700
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\PROGRA~2\Adguard\ADGUAR~1.EXE"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1712
          • C:\PROGRA~2\Adguard\ADGUAR~1.EXE
            C:\PROGRA~2\Adguard\ADGUAR~1.EXE
            5⤵
            • Executes dropped EXE
            PID:1396
        • C:\Windows\svchost.com
          "C:\Windows\svchost.com" "C:\PROGRA~2\Adguard\ADGUAR~1.EXE" /f
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:220
          • C:\PROGRA~2\Adguard\ADGUAR~1.EXE
            C:\PROGRA~2\Adguard\ADGUAR~1.EXE /f
            5⤵
            • Executes dropped EXE
            PID:3952
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C "net start "Adguard Service""
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1312
          • C:\Windows\SysWOW64\net.exe
            net start "Adguard Service"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1884
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start "Adguard Service"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4828
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C "net start "Adguard Service""
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:704
          • C:\Windows\SysWOW64\net.exe
            net start "Adguard Service"
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4676
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start "Adguard Service"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:456
        • C:\Program Files (x86)\Adguard\Adguard.exe
          "C:\Program Files (x86)\Adguard\Adguard.exe" /visible
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4092
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 6E3151C923E416AA8354A29863B9B72D E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4524
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4MzAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTE0Njg3NjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTYxODQ5MDUwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:2240
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:212
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:3980
    • C:\Program Files (x86)\Adguard\AdguardSvc.exe
      "C:\Program Files (x86)\Adguard\AdguardSvc.exe"
      1⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Program Files (x86)\Adguard\Adguard.Tools.exe
        "C:\Program Files (x86)\Adguard\Adguard.Tools.exe" /install wfp
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Program Files (x86)\Adguard\Drivers\x64\AdguardNetReg.exe
          "Drivers\x64\AdguardNetReg.exe" adgnetworkwfpdrv
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e5880f4.rbs

      Filesize

      295KB

      MD5

      33107a8e68fb12cc104a211d082b0ac2

      SHA1

      ffbd2175aef2846db1f5004740d7ec1ba533125c

      SHA256

      f38cc624cc6e7f25a077324ff8940220d2d999c6b89cfd74bda6a00e73c87b48

      SHA512

      269572fe9e028191d045f7615a51c283e7955d110161e45d8562b109ca90790dd4e687467f21a6975f804f62d6e5836a5d63eed68ca85629b84d8ecdcf542f61

    • C:\PROGRA~2\Adguard\Adguard.Commons.dll

      Filesize

      337KB

      MD5

      7284d34b31acaba49c50c2daee5b4bf0

      SHA1

      c52f6a1aa24ae4d447d3df15826b9579fb6884ff

      SHA256

      a61a3674bf842c9836917f72bf0b2be4466931d11f4e8f1a4931dc0736414450

      SHA512

      a0b39aa61db99049527fa6bbe4d9808f277c6b5efbcc19cea53bcb43f7872cb0d7b0014788724ba372251a3e9cfb315843d1e484414147c6ce386100119d895c

    • C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

      Filesize

      86KB

      MD5

      3b73078a714bf61d1c19ebc3afc0e454

      SHA1

      9abeabd74613a2f533e2244c9ee6f967188e4e7e

      SHA256

      ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29

      SHA512

      75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

    • C:\Program Files (x86)\Adguard\Adguard.Tools.exe

      Filesize

      126KB

      MD5

      246012bdb779acdcb4f058dd33bedbff

      SHA1

      32cb320b20582fc3be192f921a9258b5094eea09

      SHA256

      e4909b7e113f0761ceca4b51edc367955ab4e544132957486cce23dfd2f8d29e

      SHA512

      f05066e9d6a82923962dcaa152ef0439f8c3bc9cf6a53134b069938a7dddf9f3e96f42a3292dc34cfb9c784cd11310bca1fcde4829ea51be0f56791639f092da

    • C:\Program Files (x86)\Adguard\Adguard.exe

      Filesize

      1.9MB

      MD5

      1036a5756f04cba6c7f01deeeecf8ac6

      SHA1

      8fcff1106409bad8974d74b16ae6035e006ef8dc

      SHA256

      a753557051177a292c07e936952558e266a3038fc60c324edf7333b32e635f19

      SHA512

      18a3b31915d94df9958056bd94eeb4ca7957717deac970f98db441fd9374763aee62409308574ae18a93c6aed75ccb05fc1f7a12ca4c7620dcedd2c4ecb00245

    • C:\Program Files (x86)\Adguard\AdguardSvc.exe

      Filesize

      117KB

      MD5

      fe392e13fb5c8be2ce9128449885bcb5

      SHA1

      0659e107869ca13d135e4ca5bfb47c28112f401f

      SHA256

      d5a62598b0b4348a626d92fd2fbbf9d00f593587e2aacc93bb18136662fbd8c5

      SHA512

      1b7ea1d684c80b0c56b81a4ad81536e1956a25b8f126c42a0ef2d55f1d83cc9c77d0d5dfd0c172fa16fa7251ff5e91493ca9c2c0f8eef21ea1cef6a5a6535fed

    • C:\ProgramData\Adguard\dbase.s3db

      Filesize

      40KB

      MD5

      749e9a44ae656a51851ce13ee0a1b9c8

      SHA1

      e9236af4f8ed8bb1ac5eb0c23676a5f2583cb96f

      SHA256

      17846f73646a7251a56bd6c42981bb9e7b64806df29558e5baaecdf8c598b90b

      SHA512

      f11b9367fbc4133ca14073b84d617bfcdbd13b3f42507105084d4f4a69f31f796ab6bafcad1de750469cb81c582b5c8a2f89cc4c5d7f99aa9abb49599c828fdb

    • C:\ProgramData\Adguard\dbase.s3db

      Filesize

      4.0MB

      MD5

      84b686e30f670af4366f4a346bc2b5e2

      SHA1

      80c9d333e98e79db72b00b28878cd9762c5ecf1d

      SHA256

      bf9e8985e38420cbdd1705844ca58f264e69e35db66b2be84336125e5291d764

      SHA512

      f9ab5996ca1dfe08792134baef6ad54b43f9df6642918aa7e51017159adf9c2f8da21543a44a4d26e46d59eac3a93a34d2d7cb878c8d13a0baca34957787c8eb

    • C:\ProgramData\Adguard\dbase.s3db

      Filesize

      4.0MB

      MD5

      e304083dc56a02c3208e280de2b2569a

      SHA1

      38b9bb7cea98e22faa3522b6c79894216540b33c

      SHA256

      55fae7d3c722e7be48d40c12d1f1dab9e51ad1e6b41517817542fa9713789293

      SHA512

      5d0123f76e1e3ec85fa72cdbbd575a3db4f960ebed6926337ed79cfa804a4bd565327dec0bfbd4a605331075c83c100196eceff5e9f4f5373afcefcb6630121d

    • C:\ProgramData\Adguard\dbase.s3db

      Filesize

      4.0MB

      MD5

      2af22f1dd0aea7c0058bcc42f51829b9

      SHA1

      92057b688f7890bf533da9f6bb5e216a2fbf091b

      SHA256

      9d0107db561a29c656e8170f921a6ae6ec37172d2d7f837132e3168493c58518

      SHA512

      f64571cbd11bed0c7281b01ca2d5054ace57541357dbe387cf9a1b07f1e59c3fecf7772330d65bda00053f28063f24bdfbea55d0f78878de314812d350bd7ede

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8A9510437CB4EEB09F4B3AC2BC980E19

      Filesize

      1KB

      MD5

      5e6295e7a66d37c86542a268e660a499

      SHA1

      d2806d11b81849475b13888e0fcb0ce2db5518bf

      SHA256

      34d5e9da5133fdac0b86a40136ef54ebe854084ee6c0933a22cf4593de214fa7

      SHA512

      3a9d52a8ed5878eae427d69d083fa5df03b3c26aa4ad489d85e80cd3c094831ffad7942229f80cc601663e6303cb7854c034a5bb12b5755de5fd6b29b0a57d6c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E7EC0C85688F4738F3BE49B104BA67

      Filesize

      1KB

      MD5

      c9be626e9715952e9b70f92f912b9787

      SHA1

      aa2e946d9ad9027172d0d321917942b7562d6abe

      SHA256

      c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4

      SHA512

      7581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8A9510437CB4EEB09F4B3AC2BC980E19

      Filesize

      208B

      MD5

      ab2d90e31f879636619b699c51380024

      SHA1

      e95fde8a7502ba5d2e7669b2eaf3b048d48f4652

      SHA256

      f6beb29d7f5e616dda8eb02f798e1225c0777dd32c2ed14ea57951867fdbc14a

      SHA512

      48235221414c525ffc092de28a69f0ba13ed703626ca02b9272c3de22f3dfefd11a88882ae1d7b9d2abf8cab9e62542d77f3c0385b3de828ccf9750938c029c0

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E7EC0C85688F4738F3BE49B104BA67

      Filesize

      186B

      MD5

      2575dcae6f9f81af332dd8caf78c7b79

      SHA1

      cb06420804e957f45f613be8f610de22f0bc6c51

      SHA256

      4d00f694f95360b8a2bb9a1e499455615a536df65975ad6bf77d190f24782a31

      SHA512

      e0d7c6d18353102d3ef5994e5c0271e78219273d88f2fc6ed8e36c1348a6a44e274afff39de44f21d0402b413cae7400c6cefe4c8759e5ff64e6d28cdd229514

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log

      Filesize

      651B

      MD5

      9bbfe11735bac43a2ed1be18d0655fe2

      SHA1

      61141928bb248fd6e9cd5084a9db05a9b980fb3a

      SHA256

      549953bd4fc8acc868a9374ec684ebd9e7b23939adf551016f3433b642697b74

      SHA512

      a78c52b2ddc057dabf260eeb744b9f55eab3374ad96e1938a291d2b17f204a0d6e1aa02802de75f0b2cd6d156540d2ddee15e889b89d5e619207054df4c1d483

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ACNMRJCC\setup[1].msi

      Filesize

      11.4MB

      MD5

      5b8303360f8d585409d41be1a9513187

      SHA1

      c09f1ece40407ee6260f31ea84c1a9ff685931e4

      SHA256

      0eb35eb02667d3d23c14a2275db8e5ab292602b838e763f188a764765086c5c4

      SHA512

      eb2d2e659adb638e372cd032fd1bdead5185586281df715f7c740b9cacae8f8e8da08bcbdc03088896a235493c4f16ab6b25db8dca3a048ea18bb8ca8b4dc382

    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_c9040ddc80275bce629c71c50d2e42ae.exe

      Filesize

      1.5MB

      MD5

      33c788ad055127fd3a37ca958a9adb51

      SHA1

      4fa0b653e27516d7186ef56117e197e6c89ff987

      SHA256

      8d88f1eddb421c04f090fe09cfbc33c46244658fe77852e309014448bcc1da7f

      SHA512

      91a2c604d69be7cc4c887dfa48c959c418b8c812db9ff3287bf4fe6219aed23f46f5bdc123ed3ce041ca4ba4977eedb901fb4e6ae9dff0953d41e5ac215e4d52

    • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

      Filesize

      8B

      MD5

      2ddb82ce1fe2405f94574cf2ef2dc03f

      SHA1

      edb26df1b8be2cee7bd2f8cb0a3dd3aa499b64b8

      SHA256

      a77122e7b44ab00063d5f50371abb8db042311e66137aa2e426f72e18ab5d819

      SHA512

      41e37309d87d88cbb3d6b2eb2a24e9a3dd7476027ee1765a0cb0fae108957878346a17e091e385acde30285ddebca104d21ce636b7ec6e3f3b50ff83e8b2fcaa

    • C:\Windows\Installer\MSI81BE.tmp

      Filesize

      291KB

      MD5

      e9b6b9fd50a6a3a13fad66d497fd7950

      SHA1

      db392075dff3bffa5773dfcd5263dfd0d79159fe

      SHA256

      51f161358a273a3035c8b0d9d8f0261cb7eef20e180d4276a3d046d05436e138

      SHA512

      efd7253b81990b174d9daa1a13679ea7795a01d987e93b7ac82166aedaf482964fd00d91855d1457e6496267264b8f9ca008f5b89e43f71d9940b72e7aa8bdd0

    • C:\Windows\Installer\MSI81BE.tmp-\Adguard.CustomActions.dll

      Filesize

      365KB

      MD5

      6ee23c8c7772171e6e894fa986f81bca

      SHA1

      358751731976c09f5fadbd2616f36d07126982aa

      SHA256

      964e10b474e406457581cf6717db6a917783532ce73d1ef8e76f01f06d40ae32

      SHA512

      0255541b0e7b8483fb335bfbe920e80e514503769cfd863a60d465c671f83cb059d6795856db56f1ce50352f15b328d694558c0f49383ee4c6092912f380046a

    • C:\Windows\Installer\MSI81BE.tmp-\Microsoft.Deployment.WindowsInstaller.dll

      Filesize

      180KB

      MD5

      7d625fe73ab5f25390d5b663b0760bb8

      SHA1

      5dccf0b59215e47bd477ae563db9fb53fd1970a0

      SHA256

      20af4ea25c5bfb6cf5ae236d2f213402c6040ebca2e7ab5c0983267d34ca1673

      SHA512

      a7a12744afb89ff52d7cc5785edc9c42da0c796d3389cd39e7815623d9bdd4735f2410885714bc25e8fdf74e5cba8a1e3e691c0e47b775a2dce05bd0a5662a93

    • C:\Windows\Installer\MSI9779.tmp-\CustomAction.config

      Filesize

      234B

      MD5

      dfbc95544efd4fd9aca13ca4d43440b5

      SHA1

      0b84c31f88a2e2c36732336b5674266205e1260e

      SHA256

      93e7b3276f8bbaddf70f808df1b605cfbfd2b8b16c31f459efa66f6028ec1c10

      SHA512

      6450d56de9767a09aacd8c880c10daaaeaee1e604553f47a7df2595b20e8dad7eadf5bd641524dee600a50c1b41e7cd26f85e211792bf9609701654c1df5c8a9

    • C:\Windows\Installer\MSIAE7E.tmp

      Filesize

      181KB

      MD5

      b1298b75b1c09fdbb3906aeec500f066

      SHA1

      d84b4fe247a47ea7649f75e88791d34a60454f2e

      SHA256

      826289b33e9046fd86c559ac3c888129451534bfb2f31fa264d0c62760e0e35e

      SHA512

      2359518d0c5a19123b3491143d20f453e09d973323863b51b917434a5989790f0aad47ac41fb142ab5aceed973ad924392f7efa7244a17d2374d262cc2b8fac5

    • C:\Windows\Installer\MSIAF2C.tmp

      Filesize

      101KB

      MD5

      543f75540b657c47619488d9d479de17

      SHA1

      4b30aec5ad9e96f8101f116c1945eb3ae1b9bce7

      SHA256

      aaf422c618cd70950c600b2890440ac24d9ebda82b9072ac3d59bd44a6ef2392

      SHA512

      c1ff2ff0928e49a03e6204274273bb9ff581e7bba7bb3bf4534f7734ecc45bf3596c6a63386428248a1c1a733fd880c5ccdee2062a94227c6fcec2a8a9417ed4

    • C:\Windows\directx.sys

      Filesize

      34B

      MD5

      efe1b69e738f8520e0c7c7831e32c5bb

      SHA1

      e243f6ac1d686e8fb475a414cccfc67259fd67d2

      SHA256

      4e9df86fd4e68ad09aa7075634b3846ddcd9b5869f2b26dee5159d9e517dca4d

      SHA512

      886105b7e1f537cbaf8931217f81fbcf3712b776850eaffea7856b7d522d25d45d3dcf11f8ea74bff1c37d34ce6c46ef34e70fd3f1e4ebfc3ef0e29735cf6d3a

    • C:\Windows\svchost.com

      Filesize

      40KB

      MD5

      81baeae62298eda5bdb5d6bc28da08dc

      SHA1

      2eed11ab623bbd8cd71aba1fa9e30db5c82fce1e

      SHA256

      3a87dd25b3cd5fd9e111bd1b6bd169a4a89e4edc021c7a8ad5e6d66b7adb244f

      SHA512

      3e8f5acfc92ec0f3cf7c539369a16a75adc488de20384ce1f508f87d98818da03ab26be39c1b7c8d418c5aa8794752a48b0985415dd89633e38abf451b8ce402

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      7d79321d3b9001bbb54de49af460eb8e

      SHA1

      de1717fa0791699552872983343961e0b36a74ba

      SHA256

      5c75dd5991a2fcfc5f32edb60d5420b5f53bead7e52efc852668a7cb5081b6db

      SHA512

      7ca98eeeb8a0bfe338295ed028b8783bfe44a69c4ff947f90a3cbd333437f78c3daa5ffca55aa01b3b4e5044db2e17a941db067792a316559c7f34f3873ea990

    • \??\Volume{dd488ace-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{1f45c86c-0cdb-44b6-84cd-e0b77d830f2b}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      97a0f6858c5e2c250c30e7475063015a

      SHA1

      62b01946ae0dc0b4e5c67e1ac74f88290c9ee0f4

      SHA256

      939bbecd59eb06af5e92e061e1e6018f3c7028368eb8f432d8ee2d1dd8ac9979

      SHA512

      c5c51ac00ce1b4ef2f35057f95da809f9cda4a3f4d8d14a7b44384df9b9b50166ed0c6953ad67eb1431b9056d02f5a9bd6fbe1facf8a62a41ae6b6c53a9a1e0b

    • memory/220-364-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/220-206-0x0000000004E70000-0x0000000004E92000-memory.dmp

      Filesize

      136KB

    • memory/1396-366-0x0000000000A80000-0x0000000000AA4000-memory.dmp

      Filesize

      144KB

    • memory/1644-132-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1644-146-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1644-131-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/1712-356-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3952-370-0x000000001C630000-0x000000001C7B6000-memory.dmp

      Filesize

      1.5MB

    • memory/3952-368-0x000000001B390000-0x000000001B3EA000-memory.dmp

      Filesize

      360KB

    • memory/4092-653-0x0000000006F70000-0x0000000006F7E000-memory.dmp

      Filesize

      56KB

    • memory/4092-652-0x0000000006F80000-0x0000000006FB8000-memory.dmp

      Filesize

      224KB

    • memory/4092-691-0x000000000BD90000-0x000000000BDD0000-memory.dmp

      Filesize

      256KB

    • memory/4092-663-0x000000000B6E0000-0x000000000B6E8000-memory.dmp

      Filesize

      32KB

    • memory/4092-650-0x0000000006F10000-0x0000000006F18000-memory.dmp

      Filesize

      32KB

    • memory/4092-636-0x0000000005AC0000-0x0000000005AC8000-memory.dmp

      Filesize

      32KB

    • memory/4092-635-0x00000000069B0000-0x0000000006A42000-memory.dmp

      Filesize

      584KB

    • memory/4092-664-0x000000000B800000-0x000000000B822000-memory.dmp

      Filesize

      136KB

    • memory/4092-599-0x00000000066A0000-0x00000000066CA000-memory.dmp

      Filesize

      168KB

    • memory/4092-598-0x00000000052D0000-0x00000000053B2000-memory.dmp

      Filesize

      904KB

    • memory/4092-594-0x0000000000640000-0x0000000000832000-memory.dmp

      Filesize

      1.9MB

    • memory/4396-377-0x0000000004450000-0x00000000044EC000-memory.dmp

      Filesize

      624KB

    • memory/4396-651-0x00000000078C0000-0x00000000079CA000-memory.dmp

      Filesize

      1.0MB

    • memory/4396-387-0x0000000004840000-0x000000000487C000-memory.dmp

      Filesize

      240KB

    • memory/4396-386-0x0000000006690000-0x0000000006A6A000-memory.dmp

      Filesize

      3.9MB

    • memory/4396-385-0x0000000005F50000-0x00000000062A4000-memory.dmp

      Filesize

      3.3MB

    • memory/4396-384-0x0000000005520000-0x000000000563F000-memory.dmp

      Filesize

      1.1MB

    • memory/4396-383-0x00000000053B0000-0x00000000053CA000-memory.dmp

      Filesize

      104KB

    • memory/4396-608-0x0000000003DC0000-0x0000000003DD6000-memory.dmp

      Filesize

      88KB

    • memory/4396-382-0x0000000005450000-0x0000000005512000-memory.dmp

      Filesize

      776KB

    • memory/4396-381-0x0000000005320000-0x000000000536C000-memory.dmp

      Filesize

      304KB

    • memory/4396-380-0x0000000005930000-0x0000000005F48000-memory.dmp

      Filesize

      6.1MB

    • memory/4396-644-0x0000000008780000-0x0000000008796000-memory.dmp

      Filesize

      88KB

    • memory/4396-648-0x0000000008900000-0x0000000008912000-memory.dmp

      Filesize

      72KB

    • memory/4396-649-0x0000000009D20000-0x0000000009D5C000-memory.dmp

      Filesize

      240KB

    • memory/4396-379-0x00000000052B0000-0x0000000005310000-memory.dmp

      Filesize

      384KB

    • memory/4396-388-0x00000000043E0000-0x0000000004401000-memory.dmp

      Filesize

      132KB

    • memory/4396-378-0x0000000004680000-0x0000000004806000-memory.dmp

      Filesize

      1.5MB

    • memory/4396-375-0x0000000004270000-0x00000000042A8000-memory.dmp

      Filesize

      224KB

    • memory/4396-376-0x0000000004350000-0x00000000043AA000-memory.dmp

      Filesize

      360KB

    • memory/4396-659-0x0000000007F80000-0x0000000007FE6000-memory.dmp

      Filesize

      408KB

    • memory/4396-658-0x0000000007EC0000-0x0000000007F0A000-memory.dmp

      Filesize

      296KB

    • memory/4396-374-0x0000000000DA0000-0x0000000000DC2000-memory.dmp

      Filesize

      136KB

    • memory/4396-781-0x0000000007AD0000-0x0000000007B36000-memory.dmp

      Filesize

      408KB

    • memory/4396-666-0x0000000007F40000-0x0000000007F58000-memory.dmp

      Filesize

      96KB

    • memory/4396-746-0x00000000081E0000-0x0000000008200000-memory.dmp

      Filesize

      128KB

    • memory/4396-707-0x0000000008080000-0x00000000080A4000-memory.dmp

      Filesize

      144KB

    • memory/4396-698-0x0000000008030000-0x000000000803E000-memory.dmp

      Filesize

      56KB

    • memory/4396-700-0x0000000008040000-0x0000000008050000-memory.dmp

      Filesize

      64KB

    • memory/4700-346-0x0000000005A50000-0x0000000005FF4000-memory.dmp

      Filesize

      5.6MB

    • memory/5016-173-0x00000000052B0000-0x00000000052E0000-memory.dmp

      Filesize

      192KB

    • memory/5016-177-0x0000000005350000-0x00000000053B2000-memory.dmp

      Filesize

      392KB