Malware Analysis Report

2025-08-05 14:55

Sample ID 250704-w8g9faej4z
Target JaffaCakes118_1c7b949e018c7f9d91244241f9340560
SHA256 ff8485e49bf81bddbcb968be0d14f87475c104047c974e7c8d7ea0a54d0aa2bb
Tags
adware defense_evasion discovery installer spyware stealer upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

ff8485e49bf81bddbcb968be0d14f87475c104047c974e7c8d7ea0a54d0aa2bb

Threat Level: Shows suspicious behavior

The file JaffaCakes118_1c7b949e018c7f9d91244241f9340560 was found to be: Shows suspicious behavior.

Malicious Activity Summary

adware defense_evasion discovery installer spyware stealer upx

Loads dropped DLL

ACProtect 1.3x - 1.4x DLL software

Executes dropped EXE

Reads user/profile data of web browsers

Drops Chrome extension

Installs/modifies Browser Helper Object

Checks installed software on the system

UPX packed file

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

NSIS installer

System policy modification

Modifies registry class

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-07-04 18:35

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-07-04 18:35

Reported

2025-07-04 18:37

Platform

win10v2004-20250619-en

Max time kernel

105s

Max time network

139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7b949e018c7f9d91244241f9340560.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\miohollinjgeeodcpmdnjjnnbjeecdnm\1\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E} C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E}\ = "wxDownload" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7b949e018c7f9d91244241f9340560.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\wxDownload\\50fc14ce6083f.tlb" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E}\ = "wxDownload" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E}\ProgID\ = "wxDownload.1" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E}\InProcServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E}\InProcServer32 C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E}\InProcServer32\ = "C:\\ProgramData\\wxDownload\\50fc14ce6083f.dll" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E} C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\wxDownload" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A

System policy modification

defense_evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{4AAF1CAD-684C-5B3E-F2C2-79EBE1E3139E} = "1" C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7b949e018c7f9d91244241f9340560.exe

"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1c7b949e018c7f9d91244241f9340560.exe"

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe

.\50fc14ce60806.exe /s

Network

Country Destination Domain Proto
GB 2.18.27.82:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.180.3:80 c.pki.goog tcp

Files

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce60806.exe

MD5 b78633fae8aaf5f7e99e9c736f44f9c5
SHA1 26fc60e29c459891ac0909470ac6c61a1eca1544
SHA256 d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA512 3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\settings.ini

MD5 bb9ff3def8a3d1f0e6cf508eaee8d490
SHA1 9343e4b50aaf710e28219cf1fc0d59034feb8e2f
SHA256 1f3a56e174b9ff7e31f4ba49a0709d24bd6f6350930d8aa94db2e632ea91df05
SHA512 64b450e3a41beafd6001792949212d0b4523844c3fa8265ec9ec62c33f94784b1601b98a0895547757335295271e4e90f6091521d18d955f83c926cf39a080c9

C:\Users\Admin\AppData\Local\Temp\nsq7ABF.tmp\UserInfo.dll

MD5 7579ade7ae1747a31960a228ce02e666
SHA1 8ec8571a296737e819dcf86353a43fcf8ec63351
SHA256 564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512 a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\[email protected]\bootstrap.js

MD5 8204361d65bcf10ac9e3848bd73e0c2f
SHA1 2cea2025efc9ed41170ce8f8a947bcc0af620314
SHA256 b01663c84708d88aa5792368c31deaf43125e24a32527e6b5b064652ebb6da44
SHA512 b64dd326f21823529ed7de0aac6af7d1f578408b9dc1487d92e5f273d1e754323e61b917046d8066b5161d7671e25a8a867b918f60d45b42600215a58ca2669c

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\[email protected]\chrome.manifest

MD5 78c7e2a73441bafa827af12fcd70d89d
SHA1 40e0159240d2297b6da4296cf09ae2a121ed9416
SHA256 ee00698868cefa685a125213a5d5a0f159f308498fa76a4791d530effd810bc3
SHA512 f84954c41711b95655690dd8b5521fd4f168f000f8838ecfae09bdc2a42a6d2740898967efb6057ba733c8f67072dedba2a6719f6527969df3c5d6694e96534a

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\[email protected]\install.rdf

MD5 5fc5a054f7a6fb709f91bfda644eb11c
SHA1 d32bc8abf9eb1ed6f9de4cb975021c772d4e3a1b
SHA256 dd5f1fb7b776d4ab1bc52bf35d6d657ade6c9ce7c7beae12b6a27db21fc3c8a5
SHA512 f8c6eca740cf56620839010bf8ceb64031b3c90ad35e36ba1cfcbb050519ac81716ab67fb64c4d6f274ff2ffa2069188691bbf42b00daba6ac8451f3323b9840

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\[email protected]\content\bg.js

MD5 7340b1a043215d50a850772fe6719eb9
SHA1 9f92bad6cc0a469516ec1499d9e88de0c43bad0b
SHA256 af65b86c1b76683b68dd169b7edd216722f6d4bdc6ba5d4f86ff78a7c1f6dd24
SHA512 868cd33e45901d990e5198722ff752ca5d7e9a734f6371195d09e0a02e20fe4700b957fae8510e74b08d1c0192be0d57cbb97e9af41bd25619077f72c88aebfb

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\[email protected]\content\zy.xul

MD5 edd40c10dce3b73655bb3b95fc729ec6
SHA1 fa6cfde7f09670d520d4f935cc2643c1aada4d48
SHA256 9b91ec3293103cc9bc5592ef4c6aa01cf373af268ecd40d011b71220bea019d6
SHA512 eda25b87d07d2b68ebd844f479cf4233e937e61510b7593706fa0271382c16030d48468aaa4a16c79041a794a7091333cf0c5346d80f2ddd7279b9fe4a8a1a0f

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\miohollinjgeeodcpmdnjjnnbjeecdnm\50fc14ce606107.73852767.js

MD5 6d362c59508cc470462f85a40dc52a1f
SHA1 e4808ad1ad8f9096d43d9decfd3a16f725977d12
SHA256 fe100d4b0c84e3c3f32a6a426f840585a5dccb8a707be69ebb285207e30d7ca4
SHA512 7f54a42f6ed4075d6b4347b8a26b3b94504a4ae9f12a67f8fd488be68ef8d69e71872bcb852bcc3b5939496368a3b1f9ef9ceb1f50c1438dd02a6ba1341bf143

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\miohollinjgeeodcpmdnjjnnbjeecdnm\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\miohollinjgeeodcpmdnjjnnbjeecdnm\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\miohollinjgeeodcpmdnjjnnbjeecdnm\background.html

MD5 a653d4156b5ea21c582260ea2c34cafc
SHA1 694ce134a3cd1ffc3b86e43a638ebe949900fe11
SHA256 42354aa146050348e8649496e61bee0ac895399864cc51e6cf2c3c812b1a45f1
SHA512 9aaf3c8d18be553b2143adbbff832b8a9dc1594cac40f0cbfd13f0fe6e78831522cb18d82bf093fedd8de4d4fe164ff3939c60eb3d8ee0b32de72fc0cabe455a

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\miohollinjgeeodcpmdnjjnnbjeecdnm\manifest.json

MD5 b291aa19fb5be7dbf8fb98e6abe09a02
SHA1 13fc81cb113e069be41f97dc144d8e73c9f2eb9c
SHA256 c6000b329213e18808cb2d8cd2da4a7d6b52365f0936440e1b6fd52047122aa3
SHA512 0fcf42847583b8aba05d8d70944a43b739736889a3d4b86b85ff4c89003de873f57fbf367a5815f2c18e7ec04f959c91784ee3e38d9142f93dac3cd6d96776b3

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\miohollinjgeeodcpmdnjjnnbjeecdnm\sqlite.js

MD5 09f2f44a4ed609596820209925f71956
SHA1 826e6d62e48e1bd01e5a00ac18d7e85fc78d2036
SHA256 038870f80900938678f6bcf0e7d40cb266871f8f74b837c1cc80d7eae6abfdde
SHA512 497d04a9ba6da580f331574f4693af6a585ca299d851e623cf64de4d19d48d071d8abba9d4a8ae8c13b449935f31b03985d195a5f95f23e98f7e6d27e8436f02

memory/4300-79-0x0000000074D70000-0x0000000074D7A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsq7ABF.tmp\nsJSON.dll

MD5 b9cd1b0fd3af89892348e5cc3108dce7
SHA1 f7bc59bf631303facfc970c0da67a73568e1dca6
SHA256 49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512 fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce6083f.dll

MD5 44f1dc155d3d083b677f20ed0fab8404
SHA1 a696c5a0d50145afde3d3a71f70b1c3006ac2199
SHA256 67014a6fc8a77ae480dae9b09f800a1f40a40399ef967f86843a80eb4c9eb470
SHA512 04a7098abd589eb1a533af6f89d0d982d2faf9c4e7e29d02abaacf81635b789acfb5ca026f7a0c6b4a263934f0425c69f5225488c450e864f8dc8000ffbf94f6

C:\Users\Admin\AppData\Local\Temp\7zS79D3.tmp\50fc14ce6083f.tlb

MD5 c749bca713cf6481411b5c4eaac4506a
SHA1 539cb813dea7e37eff8c1b696eb0ab42c815ab62
SHA256 0a94d2086eb6ac57ba5ee365d3f6f64f33e7c8d18419f04715460bc04ebddf2d
SHA512 11b3b333b97b1bbbbbf01b6d367188698470877e180a3854ec9762f706755156136b404f2b95a7304a890686d8f5f697232e6c28497aca20e0aa76988b0f179a

C:\ProgramData\wxDownload\uninstall.exe

MD5 f3c79bda3fdf7c5dd24d60400a57cadb
SHA1 1adb606aaeedb246a371c8877c737f0f8c798625
SHA256 a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512 c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935