Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2025, 11:44

General

  • Target

    JaffaCakes118_20b75aeb1a77a2d8899abb76b5a1ce80.exe

  • Size

    279KB

  • MD5

    20b75aeb1a77a2d8899abb76b5a1ce80

  • SHA1

    81fcf0e35d675477eeb35f1b44a8307b4af5f1a5

  • SHA256

    59af6a48ef67e21e809a8f20f54e72bef7c407f2369d30353fa91fa31b1a6515

  • SHA512

    2ca85c09c54b3aa0d8128a6278ce8cfa6119144845b04bcf458ee14b7ca70d6a5cb07a4f78a949808ef4fe2f520d8f69892df16fc56f7224eb2673c7b458ba67

  • SSDEEP

    6144:PuXY7no1T8TXVTrznSaVC5SyJzNetuf9tdUyZ/eP4AU:pno1T0zJCA4NA8tde4

Malware Config

Signatures

  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20b75aeb1a77a2d8899abb76b5a1ce80.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_20b75aeb1a77a2d8899abb76b5a1ce80.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_20b75aeb1a77a2d8899abb76b5a1ce80.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_20b75aeb1a77a2d8899abb76b5a1ce80.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.zorgee.ru/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2556
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/user/GratshDREiL?feature=mhee
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:320
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.rango-hack.ru/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2876
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://rango-hack.ru/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1264
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1264 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1248
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://cheatdev.net/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE

    Filesize

    859KB

    MD5

    754309b7b83050a50768236ee966224f

    SHA1

    10ed7efc2e594417ddeb00a42deb8fd9f804ed53

    SHA256

    acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6

    SHA512

    e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    2374e13e9ef2ba57e77d021d1c1bee28

    SHA1

    8e8a4c465c7687ac1dc96f11ba668eb213f51257

    SHA256

    d7a0a7fc97ed78ac6dc7f9db721aea8873f1f984b4f2f5aa5e43114cd82cad88

    SHA512

    1601fcf7b88d5dba1d7f64df3f02a3a0abe72224aea7509d9741028e3eea2eecf7523a59d85ffc14fb7150669cdd44f7586aaeaa298719ace245e4a976d0344d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c91522bff8f14c0b5e3b1788c483c55

    SHA1

    5c089d5781b201b08bb4433a39cffffb613571a2

    SHA256

    8a482757a3382b5ce7d1a1f31ebcdead6273852744a9b0f908aa375f43207f1d

    SHA512

    b4acaa777c01816e90ff9e572032da19d0183624ffce14be39ef0439bf6e2c91e019ec6c0b47e944e4f3752293e58a8c561d7f349139faa4ff543debd543e559

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cef6fab1b95b02be00f4ad7112df59a

    SHA1

    116cae1f8366db70c42a6c8c25ee77a9e8c17236

    SHA256

    91627c9482923b7a41d8fe04664ddec88b04f6eb4b041071bc58f938a8f5acd8

    SHA512

    6683905481c1ccda63fbb745e363cd97830950b6d138b2a2f9b1a3ab67e0dcdb3e7c5ba4ba750f89f2bf85a770fcb1d841a3da729eecf315fe6ecec0daf6fa9b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e315fe31f4e14934a192608cd244a832

    SHA1

    9efff1ae5ca2e3e9882ff99776396d0a92c6429c

    SHA256

    e9b3087c5c3c1b663292caf11a4e4dae919ba8ac309cfdd8bb566cd3ab8c0b13

    SHA512

    debe5b1ab97ecd506f646c13d5550e81b7586b7ba01391ba2f36b48845ad69dd21be60f28555504be63bd1804c7da93653116cab47e4fe6f4a47a20910a29864

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8f8d9bb594695f29f1a5f48d1b177e2

    SHA1

    97a719ccff089e0d6b7ed3ee0720c283900511fa

    SHA256

    176689a24430661203c4af3320734a6dd7ed775b7bb11e544fe0650a2a8e7eb9

    SHA512

    fb9749e775d60d7a71a5ccba387368bf4f089098b87f86146fd0a434b100227e47d60143c18f7b69d346ccfaa10a982ba481c5c1a8b7dd30d4d54431aafccf02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5596d2df068050f69dce59b4a6e96058

    SHA1

    8f23b5a5f1e71823b678637f1cb775ea9de488b3

    SHA256

    601a40a13a86fb12e21d9c0f41b88b80867c979f0580545b61a02565ad6f187c

    SHA512

    f78ea46aa3ecd2b2b6849d9166eeda0d2c61b770a3a653249ab1ff21c41b67a8041c7a6ad0f99362e7724bbd72d0b29c4608c5626ca6335bedf6246ed38bf2be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8dbeee2740c0c2e720263c429258fef

    SHA1

    cdf836d2d9166f31342d5d187df9c5e556a059a5

    SHA256

    6a03861ce5ff2aaaa128de76867d9f816414ed8980884c0e0ff137a07e0f19a0

    SHA512

    08529d4b401746f48902a78feb51deb2c9e528e9d69816fa0a9b78b9a95db90b6502ed49e29452fb85983be13fcc90c94c01bb6be6b7a5b3261761be95aa3630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21c055d9625f3be7ce47a23fa884600b

    SHA1

    612079ce084ad3a8e1bb2f3920c7661c1d3006be

    SHA256

    0f5f7855eff413f9dbd5fdbd6fb766717360b6cc97de48e4776590b0fc85c72f

    SHA512

    9dd3a3908a1b205eb98b7d46b30eebdc8a2b221df93065f5299eb6a36c448e477f77ff236771b98dce210996773569bd610a990ae70ec8fb26c9796acb1bd2c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5ebae728041437ccc25f52ab4215280

    SHA1

    3e997144b7a888484a4048f7f113d821aae90682

    SHA256

    0ff8576623cc5b9c5e1836348e7edba17339a892b194a800462ee573361f5e3d

    SHA512

    8fb514c18553a50d2bc265d82831c4abad01a0ff4c54faeb57a3cc7b4fde676ac2a9aaab76e65a133d32734f270a089b6240044dc936c53adb6acee3d7f14318

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7bdc08002d309da78d1fb41789f11e8d

    SHA1

    914d407ed62aadf703a68a335fd17bfba7467e78

    SHA256

    21bda45d535569a97b986e50ecc3cb1390f5add8415f561b91db0e10f36d8a8c

    SHA512

    ab81689807940bddf56698c05eabeb9e5db5ff6967dd2150d466875abe44283a973cff84e94cb94ccb1283775390ef62368f481649716872defc29316d3e183b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f34a7829d9fd6386a397ca7f424591a

    SHA1

    a75f991373d2b5cdb796007d43febfeea3fdff58

    SHA256

    5f920c2352b9ea0d636a0fe12c8a0f01f04ae8f0f64ca3c4f2f7dd25df535930

    SHA512

    ae63660deaebbd6060909f8d5b538161ff856acffda12ce7b8971c8a2393cba39e173ee2c959f173a85b8fec7cc6d4addebfa1a6a662c0fe3dbfc05b86746054

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3135c5e3b4ab2b64a599c734260da81b

    SHA1

    130494567f317f3cfa92a4b5a6799e39cfceed22

    SHA256

    2b1dea9266b98c4a7b354070dfff22b8b8b4ca155b317826f408fd528f6a2354

    SHA512

    756450c8eb4d87014f523d4cf03e011070c788de88cefdbec6fada271526b332d92d0e963e04c148ab47c046cb567b5614fe4bed17478368ca52e2b34fbdb708

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54ad7efc31be5dc73367078db2ddd39e

    SHA1

    85f02d493d319a9e5f0df70a7bf3a18b7309776c

    SHA256

    ccb99f3b5d6331bf058e8f11be0d29b773fe7f359febf022ecc21ece23598747

    SHA512

    071fe754a376787186d9f3b8c69956e6624156e543171f7f901538f6bb64ecc2292e1ceccb1ef6f5853117d8e91b6abf7e293a1fc2db69ac2e5c80e9192e9a43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef342d46c5124f8c803fdedeeee57b60

    SHA1

    da0beac9dc1a54dcf951a60104e131f14232aaf9

    SHA256

    a98a51a5ebea360798c67d69dc59b107e2c97f4d57d5b124d63e522c886d3a16

    SHA512

    a296b4acb1d9ace19cc011e18588f2485d19d520b375c8e305c9487b9f39f0230d5d02fe61fe1d32cfe81b92a06bd5710d8f7ae11f65a4f05beab78b2f4c06a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a99d092ebe8693dbf81f080bb52e3600

    SHA1

    f635e1af74b6cbdb3a8c0e4be330e6ae4095ebab

    SHA256

    67b47abb858aad85f3af4c0d4d43892729f07c291ab46a78f5870c8cd3b76870

    SHA512

    2188980a4ebf5a815fd3ab996a6c5c8c128ad9855e12178ece6d3f48a658e7296d67cd53931ea5f8fd311eee0dd5ea520fe5e255a81c69cbe722e840fca9dd39

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2461d355d3ed9128419d6d2e9d482078

    SHA1

    983c7ccafbd10510d8c90d5f7e435051d16f5f05

    SHA256

    daf65e2ed44ef5ddd43f94fa18a25bbf2561d523bc35299e5d62d954f3463e86

    SHA512

    cb9321859c30934b4a8c29c2e4a574cd9746b247c02d8555056f996b5de3c195e825ac5674f432be4d0dde3c0c7cb505c3f7ebfc9776b864610a7e2a4400c523

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64b2763cc187fdcde0da1fafa1ffb782

    SHA1

    c66a78d51d393c29395d65e02f82b3b46ba6a264

    SHA256

    2a7f8540be2fb499de6b2631f39c864256d48cade34498dc160f8d602ef895b2

    SHA512

    9a6a78a05ba03e69320aa9fee104451e3ec69db2037b7240815b84c0489046270d070c7d6046d981e792ffac50994e1b7ae8748fdd76f74ebf2914505f14e7f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33b100b1d66073367a7087aef0bf6ea9

    SHA1

    dfe9c3d4b427526e9b8e0cabfa2dd1fe138d80b4

    SHA256

    4560c6cb550a4080f7bca886135fb902319a2cde162958c4fb41a4128abe0b4c

    SHA512

    48553fb9eef1a51e562a9f94b45e22cd52c9f8843397c263bcd7ac591d6147f2a79bea5afebee6d624a17f6bfb7548ecc85b996cada62e3b0b677588a55da2b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    636d54ef958a6099d8c42d134b091767

    SHA1

    dd641c8afbd70814e4efeab26e0a1023ed9174e6

    SHA256

    381f4c3353a163abc4e5c9158517f591f87450a2a5b8996820f470d78377c252

    SHA512

    8cde5e0d15b37191f1342694f70a70eb89a3ca1845005fcbee77d5f81b0f83635bdedbeac478f9ab917173d8c7a1493967b0d680fe67f70fbacda40c0f0e8eeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71b3e6a5f566749afbf2f470dea575c3

    SHA1

    d6879b8ef11471efdebc8ac6de5c4833d26ff901

    SHA256

    26ccf5e6c6464effa18295f95e70525b65077bc57fd3cff181723f17f2af2c13

    SHA512

    d482e6e08f2b2d8a961d08ef05a5bc73cd14aed453b8041005a8919c9a2b0437bdf3ace1ccac78160fa33c2e30e401119cf4221319773ad4ba9c578d5d2834da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82038e134675c613d64d36992bb0f5fd

    SHA1

    73575d85d3559f8329cd3ac8d409b1f5a002b7c7

    SHA256

    42454212c6974666d8fa48915ce936cf59cc46010f9440febcc8c0b6f3df865a

    SHA512

    9f227dda43da825a5bd9db6859e5a9322861d8d3ca5b59525b58177a5a114347631883dbf76300a6ba0496c809a518aabd7aeff57fa15ed7c952d70040422632

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f127056798e5ca2047c08fd5f066731d

    SHA1

    3a38abcdb3126042315bde5c5ae699dc62358042

    SHA256

    fbcf6037ed02f7af761f950c84442e878d00f4333d29dadf3bb2d2e169d3f1d4

    SHA512

    73b966f1caba2da8fe0480501edaad9c4db6605825775e510c3faa4fb2b411587c3ba8d102017554d56c15025d1ceb83f32ed60da20e5dcc556b55d03b6bb693

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9acf8a5bf578094f41e92ac48adcffb3

    SHA1

    d517970b18ee7d3dcbeaaea0139db6f678f72754

    SHA256

    1b6104a8d46e7039f1fab9b095e60df0601c64e5321fa7b6cf6de9ef479ca2f2

    SHA512

    7d41b40c83ebd35ca4490405e00ca4b2c4a08cf5f49a9196e4c28d5e41f2544b042f3ae76c6721321caddb29dfc8e16470270b5712aab04bf635ef74efcfa823

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e612df5df307e39380e3c69262ed321b

    SHA1

    783d1b213528a219dabca02d80a0719006e8aa43

    SHA256

    4dc92527efd993f8292339e57ce17cc60ec4eeb3c8073579fd7e71bc19016a66

    SHA512

    f5838ce72149a240646da2d487cae75458c1cee0776b6981401d0f206018f23b5c935c81f8d3624441b8ec5605f682bc170d42aeef1ae12b61b7882b170b0cf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f37d5869fb40de561e2657a291bbff1

    SHA1

    015fc14dbf8c0d7092f5347f175e8318047cf197

    SHA256

    968a5149bb268716b8ae7c2356fa8ebab6e34f4abe065a14dbdbbed1b8f5bbb7

    SHA512

    d28ad968d22818d7c9d430ceed565867267e76c33306799802cad3cdbcfc9b00b57b8aa414a83f7a129b3ff9f783b914293017f2788e30c641efdf74c17ccbc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddcea847bab3c10a1ac59d5ba68d6ddf

    SHA1

    c5cae9acad1b580f8d6502ce0a986d6258e3fa52

    SHA256

    e109137dc16109f0ad2ac675e4f1a71a4006f0043b233ff745854643f64fc423

    SHA512

    450eb1f8ebbb639de49e1636269099a173ef5c43456c004d2eee0d19bc01a7f38c28a87e915f273612287dd8f391f6a31584c845f6075ee30648bb7c4f30eec2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9a5c8ec73a8355fd3dd7667c552eee3

    SHA1

    33d657933b66a233ca7d562db6d2bcf0605c6c3b

    SHA256

    1a10655c08573439718d54313da6b46c59bd21a77a5b5f38d5faeef499154e9b

    SHA512

    5575d4996a7ae06509427ffb6400e9b381f378339d3cf5326072b200b753fd9f7d28bfcdb853746b3ac07228e8eba8462f63cd4df5e193507c97067304b58d9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f1828fe51967990d4e02f8f804d2b5a

    SHA1

    5f65f687c71f258fb8e2f361179c3dec5bf4438e

    SHA256

    0d8a58e9a8492ba09459d3b3028330649ef155a2fa29d6ef59df6f2a894bfaed

    SHA512

    1cdffc6603a9158157e0561fe9e1f1db6c3fdb4f9dd70281bdf6a230c29e786cb36d1f5e60d37f1433581348a74e0e1649b5ecb342ff473904ddcb8cbeda66b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f031c42b18d8919647958aaa03ec347

    SHA1

    a7565e475a97031a999611e5553ae7e2f34549db

    SHA256

    3cd9c77709ebda7d9dea2c7bb2f95c80526771f504c28022bdefa2aa847ea04f

    SHA512

    fc201ec783fea934938e88ce9c79cb2f4ef4691101806e564a33e797267dbced5e270bb640bee06967bfc109eddd31f92ef918ec9f1266056bae42ba2bae3aef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39764aaee6e3735133570254d71f3d4e

    SHA1

    ab8611d13333640688368057f4f19600c283ddbb

    SHA256

    fa64b69318f1b87fe587e0d738ec9e975d7e82f911792f34b8ce2c63aecddb3e

    SHA512

    4596ef41b0aadf6149d9fb6e3d506f3d911630d87cc6aa0f6880b4cf3688a8afb0e55f29e11f103117cac3baecdafe6bf92141fd32b80d275f6847ec42e3bd67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ac3cbe56df75672981e93fa2ec53b31

    SHA1

    757338341c72b9b0afa98db2e9a824265d007295

    SHA256

    1a236f84deba465199ef4ef034d774f6abba2d74a423587ae553d084bdc3bf9e

    SHA512

    d8d3c5155c40d2f8b363e65454250a8a33e3760d20ae1c528cdc77bb4fee7e58b44ea0d2bf106424fb782fab046cb19aac44edd8f4cb23c850148bbf28b59337

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49b58dcdbce21086706b272c5d75ef4b

    SHA1

    96170db69c487cb21d91ba736c3b8e0962f56979

    SHA256

    dde0386a7c8004a6e61dac3e0f1f76b8b73cc002df5e2e23671e5dd16d4efb34

    SHA512

    aace1ae89c9c335afc04b3bc4b3a7c06162c06a1506f332c16c99e63224e81efe94ae5c9c1f0d0fe5a56a99b8bcc273434621c855eba3d14eca211bd7aa62178

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    118ac604ac371ee5c48aed2232268aa9

    SHA1

    0b3265f96a07331b0809f52363ca090073ee89bc

    SHA256

    55ce284ab863f683181636fa23179f843c1671b8f577a8bf2ec1e6a88a69d408

    SHA512

    113ab822a94984d7f65444c2cf13b9f5bdebb3a7af217c0876c36168638baf4a15d063d49bcd921a7b3029acc41b53659b09af55f66e1f2387221eb11a65d112

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9D942BC1-F1DB-11EF-AD58-7ED3796B1EC0}.dat

    Filesize

    5KB

    MD5

    9a66060d950da0d34b0a785a4ff02bcb

    SHA1

    17a34f03ce3a8ff903ffa39d5d2aa2aa56d8783c

    SHA256

    1029e2082a2f3a59e94e782d6aec50f9f73abdb6db5d4a2ea692fed4e160d62c

    SHA512

    3aa5f531f718fea77e9bda1e8f068ef5f24f70044f28f3e3493ebdcf93d56eb32f0d1e4f2499ee0e5396106ac1c304d18c858578db0491a051a3c8baba6f9871

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9D942BC1-F1DB-11EF-AD58-7ED3796B1EC0}.dat

    Filesize

    5KB

    MD5

    b7c5a0539d4ece8f5f47762ad7b625ba

    SHA1

    51f9d447f1324a641cbac71717ca0ecf3e2f6116

    SHA256

    109479c4c62c6f69136ab5cb127fa72a52e5359e3c24732116aeabc1ff868ba5

    SHA512

    4be8a9d18c6b3ff2d668008305e3e60fbc3d926b6484a1408db15fde376a714859ffb3835ff290a864d03110bbdc652465ae21666e6042ceaeb78a7312141f5d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9D968D21-F1DB-11EF-AD58-7ED3796B1EC0}.dat

    Filesize

    5KB

    MD5

    5e34a90f04cd9929d58646f1e7586707

    SHA1

    be42f853f2a9ab5675096624358e047f1948ffa6

    SHA256

    afafbb39203328daa242c23a4da70018e49f8423c76acff0b6789ab619ed15b8

    SHA512

    886f1679a73ecfdc4eedc0f368b7efc6db894b5e4bff07197cfc0f08aa0a7384a4ef29a5b64d9d873c9ba001831d9bbfa38cd913446dbc55ae5d1890c2e00d3b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9D968D21-F1DB-11EF-AD58-7ED3796B1EC0}.dat

    Filesize

    5KB

    MD5

    09acfed81340243d3d45d04ab56c41aa

    SHA1

    1ab2ca7ec306352fc278d1e3f746bfa275a7af35

    SHA256

    b4c38f93bd4c4b0a9012cd98a44a32c33a957c4c8f6a271063eb686f3c7d9bac

    SHA512

    97fcb41112318907106f7ab8e112250565a5a7383a89856c0ec9092a866bc430d465d9effcc78d38ca0a0826bc57d01c480606cf9a59bfe77a9043009c9fdcd6

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9D968D21-F1DB-11EF-AD58-7ED3796B1EC0}.dat

    Filesize

    3KB

    MD5

    f284f9fbef4bb0a5fb8ab572572264e3

    SHA1

    716839067c22bd529a474afd9f33436546adfc29

    SHA256

    ccc4f5ba8085028ceb8ad038a0c34264f81ea2d802e06e00f4c6a1f930727d07

    SHA512

    248e655d4b06fe827e83d59b0c1f961d96ac1891b83b43176af9972f4259a00f257a9e12577ed86260077649bfec2d74878cab93ee4e5b7061fb22bd2d055525

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bl977i7\imagestore.dat

    Filesize

    5KB

    MD5

    5913dd1e88ba8eb23ff694e3d0cbae6c

    SHA1

    e90f8b68c717f4d64021b2192c4407ce951a2d96

    SHA256

    3c518748a5ebdccc9ddd205f284f576d68f345429b64bb4ac3a7a60ba9b0898e

    SHA512

    35a838a6591993f936fe950b2d0a0edf148af2d5a521797dea2591b38a7a466ab59d7c9cd895af70bb7af22a0a324275f7d64294d0f3a2d1d2addf5c2aad03fd

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bl977i7\imagestore.dat

    Filesize

    14KB

    MD5

    7b1e87e4385679ff96ae54c8fb2c434a

    SHA1

    b9c39f68e0c4f7716332977bc3e16931cc7bd49c

    SHA256

    b90f6e22e02062f37149e88d5bcee1a275b13605de4889ab097aefa1ed992345

    SHA512

    d8f8971ab02d8755f461e5084cc884d633531e3e46ac1c0c5cbfc307f017511d7073897d4d3c109b40f5e87651d3739a45b1cdf8d6234ccc8d2082ad1ce1764a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\favicon[1].ico

    Filesize

    4KB

    MD5

    c8fed426dc3c03f2919408430a95adb1

    SHA1

    1cf6be8b31d8e0a43838cf0c45e586f94ddd3e0b

    SHA256

    a5936733b993e33788f656125d17571bbac9f544b001da6db0dbf29ed467cd7a

    SHA512

    c9eb9117db11abc5346a7b3ac61c27a1391a792bf0babe7005aef098e9da7a1b5279dbbf02470b50fb383a185b2f659fbcb7016ffa467d0532d41669be2b8dfa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\logo[1].svg

    Filesize

    7KB

    MD5

    bf8955d15a3d42e210ad584c8559de3b

    SHA1

    d6a7e61324f0d0353e3f9b635c5b5d938c2cc85c

    SHA256

    f070010c4a9edd2a07746aaecfb544bd59aced3a857d6ad954515dc647bab593

    SHA512

    016974ebe1e7bb3de876707c36ca0b4bd7e8130a3dd08296d7a647638f3f07e6561b90f1bde228d4a24cd84ce6c18bb6c90d9b5f10837d32cf5bc8d8cfdc4a84

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\placeholder[1].svg

    Filesize

    840B

    MD5

    42f109d58ecd50f9ee02ed05efbf95b4

    SHA1

    e9a9395dbbcb8c40f6e215003aaf73500a997b05

    SHA256

    76dd41ae9dc56e04a07e28a17d4a27ac5d2374079c3603e844af5565bd5b8541

    SHA512

    24a3bfefae6227c59b083cbd9679196ee48a235cc1609184a809ca740258948cf7ef46ba046b0d52ae7be3bc6e40bf86db43376944eb9e8f34bb77f516413384

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\scripts[1].js

    Filesize

    6KB

    MD5

    7d6973807f6da9641b1eb3ce8522153b

    SHA1

    86fcb67e9f0f398efc02c2a42990d66601d2907c

    SHA256

    e3fe309f193693667de941cc25423338a3cb354233e3c16b2991434034bfaf1b

    SHA512

    cf6df3f2d065c4d1a6feeb9fabd1ea3b7fa0a1079e677f804deb834bbe2ae945bd84ec159b7051b4493f8a245e9844687f29524bd9c3e8cde245fe8c61b39421

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\logo2[1].svg

    Filesize

    7KB

    MD5

    5f39d95f7f545780827b915e1ba1c31a

    SHA1

    c52375f430da07ad6a56e5f4d79e3e61833f4a42

    SHA256

    3399f845401442dee241bc9ce881ed3fb93106a3156a4cd578d0de3e4fc769b2

    SHA512

    734653c48160ac960ae0b7218be58f0444854599173303d2d1266f60b7a2bb560f022a754a17caedaf62b8533d63cded87e0ea2d9ad42c1015c5ef0b34f7947e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\custom[1].css

    Filesize

    1KB

    MD5

    61ac3482aeab31e876c806790d9fd04c

    SHA1

    a4f6f74da342c95f9a248dbc0cbf2bfa473d0bae

    SHA256

    51eaa168a50d066b342e826649c13871f13eb0a5974434f93d3661de76fa850c

    SHA512

    d7097358a365862c55621660cb74976b712f7cc692d2a0a75bd9f0e78cbdff3330467b1633b5603c579b6ac9d972c0fb9e592365540137cdc31c960753b0dcae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\main[1].css

    Filesize

    148KB

    MD5

    e593052c350497654669aa735a29096d

    SHA1

    0e76fdad95c3dd32df6d36a399cb1855cbc557de

    SHA256

    cacbf8e6d7e8af1199b198f188f48a753d41932878448c85daa838f582755cf7

    SHA512

    41691135a7a76f0e700b99fcbd535f63590a45faae57707726d33ed19593e40ba5a8043f83c8bff3ce2718850c1b9215b6e28d06b67d5116ffb75dbb9f4ce346

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\main[1].js

    Filesize

    47KB

    MD5

    ba8b05751ce09769a2e68304ab79fbac

    SHA1

    665e17ca57aa3ad02a3194251b140637178b97e3

    SHA256

    5c6e3c38d6b7d28d3f5e5a2f92ddfbc714c800546d2aebc2e43e92e5933c155b

    SHA512

    c5e3488ea45bd3bb79480abb5f49dec98c15e9b1d70bc7a005f4c27cc3af0fb22034626f2ab585e00f5ff6f0d9290be785d534651358620b5373a5f121ba0896

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\bonus_fg_ru[1].webp

    Filesize

    30KB

    MD5

    78abaed11633ec22c5874d8a5d4054a8

    SHA1

    426510a09e5388bd038e038b9f331bfcb63bf0ec

    SHA256

    f2e86c34c7fefb0bac4645c015f5e5ed286048d9efe724a5936df94d4a62908b

    SHA512

    52f974a6204513eea37dae353f8af05befeccd0a0d4af25c6e987b3ab23b82d7982b6cd7837a67d7234b2a0d2a65eb41d580d1da5f2d75bb3d0b05e7974fcf92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\email-decode.min[1].js

    Filesize

    1KB

    MD5

    9e8f56e8e1806253ba01a95cfc3d392c

    SHA1

    a8af90d7482e1e99d03de6bf88fed2315c5dd728

    SHA256

    2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8

    SHA512

    63f0f6f94fbabadc3f774ccaa6a401696e8a7651a074bc077d214f91da080b36714fd799eb40fed64154972008e34fc733d6ee314ac675727b37b58ffbebebee

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Temp\Cab10D2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar255E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \Users\Admin\AppData\Local\Temp\3582-490\JaffaCakes118_20b75aeb1a77a2d8899abb76b5a1ce80.exe

    Filesize

    239KB

    MD5

    c2a0c95ef3ed5277ebb4836fc657795b

    SHA1

    0ea3a56c701e964244f5535398a26258a37a43b6

    SHA256

    900aa172c24292890aad0b1e9b4f7253ae819c6662afdddc05cc1001b741b1e8

    SHA512

    36a676c1857b9cd2c8af5834107c647c5dd884f9e692f18f59551d5ae71103a85a279dad3de1a7b356d703d6ebe7be9802ac6e12242352db95920ea9b9232fa5

  • memory/1036-681-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1036-246-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2160-92-0x00000000749F0000-0x0000000074F9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-247-0x00000000749F0000-0x0000000074F9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-14-0x00000000749F0000-0x0000000074F9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-15-0x00000000749F0000-0x0000000074F9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2160-13-0x00000000749F1000-0x00000000749F2000-memory.dmp

    Filesize

    4KB