Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-03-2024 02:10

General

  • Target

    4a67cb6ed0cf60ddcf3e45917898dec4_JaffaCakes118.exe

  • Size

    5.1MB

  • MD5

    4a67cb6ed0cf60ddcf3e45917898dec4

  • SHA1

    b219ad475097853384d95a0924727389e8610ccb

  • SHA256

    cebf4c9af84506f3b683d5d4867b739244b6ba595772d583b3455781c4d91b74

  • SHA512

    aa9c91076de6a134df17ef9a2c2b78dc268b7f7dbb2eafa36b63fdfd20b329a58f08e096e2a61dcbbd85399bd8597e08a6e493d1ab1d54fd840918612ff01620

  • SSDEEP

    98304:h3OOqyTG+H9QG7l1rvQjPleoGI9Wek2WiCU+gw6pTslbqXD09r/:9pRl1L0P4or9ytiG6WlmD09r/

Malware Config

Extracted

Family

redline

Botnet

sad

C2

107.172.13.162:42751

Attributes
  • auth_value

    e0d869e5b6b2c87306c1e350a5d1e544

Extracted

Family

gcleaner

C2

ggg-cl.biz

45.9.20.13

Extracted

Family

vidar

Version

41.2

Botnet

933

C2

https://mas.to/@serg4325

Attributes
  • profile_id

    933

Signatures

  • Detect Fabookie payload 1 IoCs
  • Detects LgoogLoader payload 1 IoCs
  • Detects PseudoManuscrypt payload 6 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • PseudoManuscrypt

    PseudoManuscrypt is a malware Lazarus’s Manuscrypt targeting government organizations and ICS.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • OnlyLogger payload 3 IoCs
  • Vidar Stealer 3 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 44 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 8 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:468
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:844
        • C:\Windows\system32\wbem\WMIADAP.EXE
          wmiadap.exe /F /T /R
          3⤵
            PID:1704
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k SystemNetworkService
          2⤵
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Modifies registry class
          PID:536
      • C:\Users\Admin\AppData\Local\Temp\4a67cb6ed0cf60ddcf3e45917898dec4_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\4a67cb6ed0cf60ddcf3e45917898dec4_JaffaCakes118.exe"
        1⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Users\Admin\AppData\Local\Temp\inst1.exe
          "C:\Users\Admin\AppData\Local\Temp\inst1.exe"
          2⤵
          • Executes dropped EXE
          PID:1740
        • C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe
          "C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2428
        • C:\Users\Admin\AppData\Local\Temp\Soft1ww01.exe
          "C:\Users\Admin\AppData\Local\Temp\Soft1ww01.exe"
          2⤵
          • Executes dropped EXE
          PID:2632
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 1328
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:1996
        • C:\Users\Admin\AppData\Local\Temp\sad.exe
          "C:\Users\Admin\AppData\Local\Temp\sad.exe"
          2⤵
          • Executes dropped EXE
          PID:2476
        • C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe
          "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\System32\mshta.exe" vbScriPt: CLOSe ( CreatEOBjECt ( "WScRIpt.sHell" ). rUn ( "CmD.Exe /Q /C COpy /Y ""C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF """" == """" for %z iN ( ""C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"") do taskkill -f /Im ""%~nXz"" " , 0 , tRue ) )
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2724
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /Q /C COpy /Y "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF "" == "" for %z iN ( "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe") do taskkill -f /Im "%~nXz"
              4⤵
              • Loads dropped DLL
              PID:2024
              • C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE
                ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u
                5⤵
                • Executes dropped EXE
                PID:2564
                • C:\Windows\SysWOW64\mshta.exe
                  "C:\Windows\System32\mshta.exe" vbScriPt: CLOSe ( CreatEOBjECt ( "WScRIpt.sHell" ). rUn ( "CmD.Exe /Q /C COpy /Y ""C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE"" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF ""/pni3MGzH3fZ3zm0HbFMiEo11u"" == """" for %z iN ( ""C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE"") do taskkill -f /Im ""%~nXz"" " , 0 , tRue ) )
                  6⤵
                  • Modifies Internet Explorer settings
                  PID:2836
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /Q /C COpy /Y "C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF "/pni3MGzH3fZ3zm0HbFMiEo11u" == "" for %z iN ( "C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE") do taskkill -f /Im "%~nXz"
                    7⤵
                      PID:2752
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\System32\mshta.exe" vbscript: cLoSE ( cREAtEObJect ( "wSCRipT.SHELl" ). Run ("Cmd /Q /C eCHo | SeT /p = ""MZ"" > 4~T6.Kj6& cOPy /b /y 4~T6.kJ6 +JJDPQL_.2B+ Z8ISJ6._Nm+oAykH.~~ +kdDPiLEn.~T5 + MZaNA.E ..\Kz_AMsXL.6g & Del /q *& STArT control ..\kZ_AmsXL.6G " ,0 , trUE ) )
                    6⤵
                      PID:1944
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /Q /C eCHo | SeT /p = "MZ" > 4~T6.Kj6& cOPy /b /y 4~T6.kJ6+JJDPQL_.2B+ Z8ISJ6._Nm+oAykH.~~ +kdDPiLEn.~T5 + MZaNA.E ..\Kz_AMsXL.6g & Del /q *& STArT control ..\kZ_AmsXL.6G
                        7⤵
                          PID:2360
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" eCHo "
                            8⤵
                              PID:2884
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>4~T6.Kj6"
                              8⤵
                                PID:2140
                              • C:\Windows\SysWOW64\control.exe
                                control ..\kZ_AmsXL.6G
                                8⤵
                                  PID:2520
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\kZ_AmsXL.6G
                                    9⤵
                                    • Loads dropped DLL
                                    PID:1672
                                    • C:\Windows\system32\RunDll32.exe
                                      C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\kZ_AmsXL.6G
                                      10⤵
                                        PID:2276
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\kZ_AmsXL.6G
                                          11⤵
                                          • Loads dropped DLL
                                          PID:2116
                            • C:\Windows\SysWOW64\taskkill.exe
                              taskkill -f /Im "sfx_123_206.exe"
                              5⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3056
                      • C:\Users\Admin\AppData\Local\Temp\setup.exe
                        "C:\Users\Admin\AppData\Local\Temp\setup.exe"
                        2⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of WriteProcessMemory
                        PID:2544
                        • C:\Users\Admin\AppData\Local\Temp\is-FLEQP.tmp\setup.tmp
                          "C:\Users\Admin\AppData\Local\Temp\is-FLEQP.tmp\setup.tmp" /SL5="$201A8,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:2424
                          • C:\Users\Admin\AppData\Local\Temp\setup.exe
                            "C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:1992
                            • C:\Users\Admin\AppData\Local\Temp\is-7D0GU.tmp\setup.tmp
                              "C:\Users\Admin\AppData\Local\Temp\is-7D0GU.tmp\setup.tmp" /SL5="$301A6,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup.exe" /SILENT
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious behavior: GetForegroundWindowSpam
                              PID:1696
                      • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                        "C:\Users\Admin\AppData\Local\Temp\setup_2.exe"
                        2⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:2540
                      • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
                        "C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:868
                      • C:\Users\Admin\AppData\Local\Temp\zyl-game.exe
                        "C:\Users\Admin\AppData\Local\Temp\zyl-game.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:1228
                      • C:\Users\Admin\AppData\Local\Temp\3.exe
                        "C:\Users\Admin\AppData\Local\Temp\3.exe"
                        2⤵
                        • Executes dropped EXE
                        • Modifies system certificate store
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1500
                      • C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe
                        "C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"
                        2⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1976
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
                          3⤵
                            PID:2744
                            • C:\Windows\system32\schtasks.exe
                              schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                              4⤵
                              • Creates scheduled task(s)
                              PID:1756
                          • C:\Users\Admin\AppData\Roaming\services64.exe
                            "C:\Users\Admin\AppData\Roaming\services64.exe"
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2680
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit
                              4⤵
                                PID:2280
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'
                                  5⤵
                                  • Creates scheduled task(s)
                                  PID:2460
                              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                                4⤵
                                • Executes dropped EXE
                                PID:1784
                        • C:\Windows\system32\rUNdlL32.eXe
                          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                          1⤵
                          • Process spawned unexpected child process
                          PID:1668
                          • C:\Windows\SysWOW64\rundll32.exe
                            rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                            2⤵
                            • Loads dropped DLL
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1376

                        Network

                        MITRE ATT&CK Matrix ATT&CK v13

                        Execution

                        Scheduled Task/Job

                        1
                        T1053

                        Persistence

                        Scheduled Task/Job

                        1
                        T1053

                        Privilege Escalation

                        Scheduled Task/Job

                        1
                        T1053

                        Defense Evasion

                        Modify Registry

                        2
                        T1112

                        Subvert Trust Controls

                        1
                        T1553

                        Install Root Certificate

                        1
                        T1553.004

                        Discovery

                        System Information Discovery

                        2
                        T1082

                        Query Registry

                        2
                        T1012

                        Command and Control

                        Web Service

                        1
                        T1102

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                          Filesize

                          68KB

                          MD5

                          29f65ba8e88c063813cc50a4ea544e93

                          SHA1

                          05a7040d5c127e68c25d81cc51271ffb8bef3568

                          SHA256

                          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                          SHA512

                          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

                        • C:\Users\Admin\AppData\Local\Temp\Cab864F.tmp
                          Filesize

                          65KB

                          MD5

                          ac05d27423a85adc1622c714f2cb6184

                          SHA1

                          b0fe2b1abddb97837ea0195be70ab2ff14d43198

                          SHA256

                          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                          SHA512

                          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\4~T6.Kj6
                          Filesize

                          2B

                          MD5

                          ac6ad5d9b99757c3a878f2d275ace198

                          SHA1

                          439baa1b33514fb81632aaf44d16a9378c5664fc

                          SHA256

                          9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

                          SHA512

                          bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\JJdPql_.2B
                          Filesize

                          232KB

                          MD5

                          770b27fbf31087cc450783085296dd4b

                          SHA1

                          e11b5a284842ee442a18646611eb8d2fe34b3e59

                          SHA256

                          4338a7e054ebab8a375330b93e3d99faa0d3bccd53b2c0c5d3cfd560f977c386

                          SHA512

                          46b78e590c4634b8d16c9d9f72fd61bae01e35828b204b19a1ae13156dc688be994ac9bf7cdce048c4907eb52c7a9240705fad6c42899fec29ed32eff396bfcd

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Z8ISj6._Nm
                          Filesize

                          373KB

                          MD5

                          dcae4cf1f6df8ecee8a59809270d12df

                          SHA1

                          0e4fc026ae3795f14f3f7606bee2cde9ce0726bf

                          SHA256

                          caf0ca04e918436343125e04b29443d566ade372504568ee5a883958f67049ec

                          SHA512

                          cdea06242802cc4cb1b0ab2c663a7ee07abed801743036201576680eb61ae59da1f624428fed46cbeba9c225ffa4a068290f3fa26f4103abde76f3322c23d8b0

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\kdDPilen.~t5
                          Filesize

                          103KB

                          MD5

                          3a5d1bdea281c18ea044795ada56759b

                          SHA1

                          18a7d75b598dbd93baa5e77ce2e57bbbd18c0975

                          SHA256

                          436d167234c2913c51685816549be0a32fb5f6b4eb7724797aa211a6b98f1b54

                          SHA512

                          3f58d8c995b32f0724fb295c7fdcfed6f884a6d0338193bd29a6fc97d3ac907516dfc04aab0eb41f565db110fcb0a0d4e5a78140860b73fa2ad8696ccdc7ad3f

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\mzanA.e
                          Filesize

                          270KB

                          MD5

                          4048075ba32058b2ffb4d02fd8f88568

                          SHA1

                          9d35c34fdadce90fa5e8debce667429b9a126059

                          SHA256

                          98f66e3e4a0015b41c8598da139dc3ef4f9a7d5795ec8ebeeee1afa48bef2d6b

                          SHA512

                          4670adf32f1d1843e4fead5d78946c46ea1b5eaf3d1967ac87ff474b076d0f2f279ad115b22bb6dbfe72fc4b251f6fc86fa1cc12d5f24048e4801cafbef2eb18

                        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\oAykH.~~
                          Filesize

                          261KB

                          MD5

                          da678f3df8a1104ec2ce8c9816b5156c

                          SHA1

                          f25f50f2a134270ff5d68fb9334e05e04a499798

                          SHA256

                          0f3a327e883e7fd4ec2377e0bf624504fdf91ba8a998d90bcd5d3c0895a26456

                          SHA512

                          b040d9211ba1504fd0807c9708a9e925fc33ec2819c2d4aa05462ccc1fc2794fd10d045533b9e4d584147f5c8882cfec0f06213e177b6b932d64fccd30852991

                        • C:\Users\Admin\AppData\Local\Temp\Tar86DF.tmp
                          Filesize

                          171KB

                          MD5

                          9c0c641c06238516f27941aa1166d427

                          SHA1

                          64cd549fb8cf014fcd9312aa7a5b023847b6c977

                          SHA256

                          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                          SHA512

                          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                        • C:\Users\Admin\AppData\Local\Temp\Tar9630.tmp
                          Filesize

                          177KB

                          MD5

                          435a9ac180383f9fa094131b173a2f7b

                          SHA1

                          76944ea657a9db94f9a4bef38f88c46ed4166983

                          SHA256

                          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                          SHA512

                          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

                        • C:\Users\Admin\AppData\Local\Temp\kZ_AmsXL.6G
                          Filesize

                          1.2MB

                          MD5

                          e141dd69d1cf6a3a0bd9c185a0064b49

                          SHA1

                          959a997e66acd8410343ed3efed3e5929494b125

                          SHA256

                          3a15463ef6c1296aecb36fd653f22938adfe9f9f42c6d5ef24630f22827a70a3

                          SHA512

                          efdc55d1c729f08275c5f6cda531baf6db98347b91db377e9f3cddb9399afb0d20bbcadbb103c25d7af48b90409e8bdf77c0065d2285b955a047c66349263999

                        • C:\Users\Admin\AppData\Local\Temp\sad.exe
                          Filesize

                          113KB

                          MD5

                          f15703864ad725983c94a69bcd77eb1d

                          SHA1

                          86bf8ba0c6ac14995f6df861b46051843724e1d0

                          SHA256

                          c59f1d0fff08dc8cc04ea445b3dd56b4db707352b2d7c9839f1c5467bea33024

                          SHA512

                          2e21b64d2b5b03e8f34c3f0921bca460fa720a8b2006e646f8d707a7efada81aa0b6a7fb66f1058f642c18fcdd66c13ec3e23f9584356c3e364fe181e46cacf4

                        • C:\Users\Admin\AppData\Local\Temp\sqlite.dat
                          Filesize

                          558KB

                          MD5

                          2c7eca6d53a2c2e3f863f75523205168

                          SHA1

                          4c95f3afc24c4403d0657f5ed4f4e055193d223f

                          SHA256

                          a279b9a19acca64ff8529a519e89d15662c40b753e4163ad9fb24f5c43275b8f

                          SHA512

                          ccfc724e33234d711650984166eb3c4f9b2ce11398b437388f56fbbb9c0849c821f3946d8705d34288da35cc4c2dd0e5fd36dd67d8abc5287e17a3091869b8d1

                        • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
                          Filesize

                          80KB

                          MD5

                          993b4986d4dec8eaebaceb3cf9df0cb4

                          SHA1

                          07ad151d9bace773e59f41a504fe7447654c1f34

                          SHA256

                          4412b9732c50551bf9278ee0ee4fe8e0e33b713f6eea5e6873950d807e9353ec

                          SHA512

                          ee70123e2a4bad0ba6fe181ae9829f77257a4d162e2a01a478a5e37a70688370f3f2d2c833d253b093a99642e90512a3be684f004da23981c66cb9faccfa143e

                        • \Users\Admin\AppData\Local\Temp\3.exe
                          Filesize

                          8KB

                          MD5

                          4eadce04b9864f714c0cea72262c9283

                          SHA1

                          f7d19493abe9e58aa76cfd13ad5d80298f1d1cf0

                          SHA256

                          12e476ad2796f908407e54bd0dc69a3a4623be1d85bf40a0bf2d60e203b1e1d4

                          SHA512

                          e4c19f7774ea89af9f4c7d0cf4673e39421600fe284c444e1be0c12607d423a4691fe01c715cf279a767ede53ef89cf3d37210c3ff4ca0521a76851a75060a08

                        • \Users\Admin\AppData\Local\Temp\Chrome 5.exe
                          Filesize

                          43KB

                          MD5

                          93460c75de91c3601b4a47d2b99d8f94

                          SHA1

                          f2e959a3291ef579ae254953e62d098fe4557572

                          SHA256

                          0fdba84fe8ed2cf97023c544d3f0807dbb12840c8e7d445a3a4f55174d78b5b2

                          SHA512

                          4370ae1a1fc10c91593839c51d0fbae5c0838692f95e03cac315882b026e70817b238f7fe7d9897049856469b038acc8ccfd73aae1af5775bfef35bde2bf7856

                        • \Users\Admin\AppData\Local\Temp\DownFlSetup110.exe
                          Filesize

                          58KB

                          MD5

                          676aee8e3c561467e73d45e1205534e4

                          SHA1

                          0d7983c29868dca5d007f8462b11991d1ba74fa5

                          SHA256

                          a966e362af7fac45819e17b8464a7d6ff5741e5717c90b8a22e253762bcb5a70

                          SHA512

                          0440a8717b8b4940fb1e1845e8d82990bf6d3862b35d665f05d607a57d0a7e705d10beac11ec150997903ab612b458c92044abc000173fcc772e5b759efe69bb

                        • \Users\Admin\AppData\Local\Temp\Soft1ww01.exe
                          Filesize

                          723KB

                          MD5

                          024d4b5990a8cb1b35390f59c3b8fe64

                          SHA1

                          ecb3a6f61dc2f3f633723606172f5040c5381c7d

                          SHA256

                          a5801d29a200ba60479be888d7c5bcadae08e0e635d069a797af4232c7f06a8f

                          SHA512

                          17ac3162689c1bc8d497244d908c999f3f7519df9b52845094f785891be2ce8deb39d68713d3bc118e9a9a4f8681b1e75856aa5a78f72d5e3cb450f0cccf2bd7

                        • \Users\Admin\AppData\Local\Temp\inst1.exe
                          Filesize

                          221KB

                          MD5

                          39bf3527ab89fc724bf4e7bc96465a89

                          SHA1

                          ac454fcd528407b2db8f2a3ad13b75e3903983bc

                          SHA256

                          460cd65ce2698135e30e978ea9e4048a015c34dd4284d735b0f7061e4b9c1a69

                          SHA512

                          bc9cdb005b54187e1277cb4de9a6e273a3efda886c7735ccda188f164745ceb2a3a449c94f02b18ed71e79ae0c0f289c846f5f0e66290e299429f1458d7f457b

                        • \Users\Admin\AppData\Local\Temp\is-FLEQP.tmp\setup.tmp
                          Filesize

                          691KB

                          MD5

                          9303156631ee2436db23827e27337be4

                          SHA1

                          018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                          SHA256

                          bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                          SHA512

                          9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                        • \Users\Admin\AppData\Local\Temp\is-LHJCB.tmp\_isetup\_shfoldr.dll
                          Filesize

                          22KB

                          MD5

                          92dc6ef532fbb4a5c3201469a5b5eb63

                          SHA1

                          3e89ff837147c16b4e41c30d6c796374e0b8e62c

                          SHA256

                          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                          SHA512

                          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                        • \Users\Admin\AppData\Local\Temp\is-LHJCB.tmp\idp.dll
                          Filesize

                          216KB

                          MD5

                          b37377d34c8262a90ff95a9a92b65ed8

                          SHA1

                          faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                          SHA256

                          e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                          SHA512

                          69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                        • \Users\Admin\AppData\Local\Temp\jhuuee.exe
                          Filesize

                          1.4MB

                          MD5

                          558a043fe2f63bd22545e130c944cff6

                          SHA1

                          b670bac2e2531734d272bcca87764b1124bd22df

                          SHA256

                          4fc0fe3ed3d6c0d4d090ea2cffef94e1c98d9a4e834d57c3d01903f2da3a4ec8

                          SHA512

                          1df8b1016a9c63c2a80b7f3aa5491f55aaa1f5ce794a00a5c30a115c7f55f4f4c0217266f4f7055daf7bbc769696dae6776fe7581215ba922ad3d48a713c46a1

                        • \Users\Admin\AppData\Local\Temp\setup.exe
                          Filesize

                          379KB

                          MD5

                          662af94a73a6350daea7dcbe5c8dfd38

                          SHA1

                          7ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c

                          SHA256

                          df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8

                          SHA512

                          d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a

                        • \Users\Admin\AppData\Local\Temp\setup_2.exe
                          Filesize

                          381KB

                          MD5

                          fac4ea5c88c18ba88fb8691694e10c5a

                          SHA1

                          6352b44fa56433062704201754454189946ddefa

                          SHA256

                          9975fc18101f6f7812d5656d5872f7d7cc7748ca5cbeb5ab0e78e00c0efe2e83

                          SHA512

                          63053399aa5ac64dbadc68f54118b0087391e601dfe4f3142ee9d2b719a243af496a6f5b9d6e955a6032b7d3915a8e5814a36a17bca28b6b5a428839f01bab7d

                        • \Users\Admin\AppData\Local\Temp\sfx_123_206.exe
                          Filesize

                          1.0MB

                          MD5

                          f39dd2806d71830979a3110eb9a0ae44

                          SHA1

                          fd94b99664d85eede48ab22f27054ab5cc6dd2d3

                          SHA256

                          c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213

                          SHA512

                          ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82

                        • \Users\Admin\AppData\Local\Temp\zyl-game.exe
                          Filesize

                          865KB

                          MD5

                          dc18833a5782359021cc033ec28db8c8

                          SHA1

                          7b1f91181f1da4fa8af7dafb5a134c3f7d5e97d2

                          SHA256

                          6304025b1257897362538a402ecb3fc47af94868332ff843d5f2075a9d58d81e

                          SHA512

                          2ba43a08083e439fa2b1fa685e7655bab073d3f9a2f79f1d4ab2db306be63fbcb37c5e332f3ef1959c783ddbf36bad9ca98879472fd929c4de5f1e4d17ce98d4

                        • memory/536-226-0x0000000000470000-0x00000000004E2000-memory.dmp
                          Filesize

                          456KB

                        • memory/536-177-0x0000000000470000-0x00000000004E2000-memory.dmp
                          Filesize

                          456KB

                        • memory/536-172-0x0000000000470000-0x00000000004E2000-memory.dmp
                          Filesize

                          456KB

                        • memory/536-225-0x0000000000470000-0x00000000004E2000-memory.dmp
                          Filesize

                          456KB

                        • memory/536-168-0x00000000000E0000-0x000000000012D000-memory.dmp
                          Filesize

                          308KB

                        • memory/844-169-0x0000000000910000-0x000000000095D000-memory.dmp
                          Filesize

                          308KB

                        • memory/844-166-0x00000000015F0000-0x0000000001662000-memory.dmp
                          Filesize

                          456KB

                        • memory/844-165-0x0000000000910000-0x000000000095D000-memory.dmp
                          Filesize

                          308KB

                        • memory/844-159-0x0000000000910000-0x000000000095D000-memory.dmp
                          Filesize

                          308KB

                        • memory/844-161-0x00000000015F0000-0x0000000001662000-memory.dmp
                          Filesize

                          456KB

                        • memory/844-456-0x0000000000910000-0x000000000095D000-memory.dmp
                          Filesize

                          308KB

                        • memory/1376-164-0x00000000008C0000-0x000000000091D000-memory.dmp
                          Filesize

                          372KB

                        • memory/1376-167-0x0000000000980000-0x0000000000A81000-memory.dmp
                          Filesize

                          1.0MB

                        • memory/1376-173-0x00000000008C0000-0x000000000091D000-memory.dmp
                          Filesize

                          372KB

                        • memory/1500-378-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/1500-146-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/1500-131-0x0000000000EA0000-0x0000000000EA8000-memory.dmp
                          Filesize

                          32KB

                        • memory/1500-160-0x000000001B290000-0x000000001B310000-memory.dmp
                          Filesize

                          512KB

                        • memory/1500-383-0x000000001B290000-0x000000001B310000-memory.dmp
                          Filesize

                          512KB

                        • memory/1672-304-0x0000000002680000-0x000000000272B000-memory.dmp
                          Filesize

                          684KB

                        • memory/1672-246-0x00000000027E0000-0x0000000002872000-memory.dmp
                          Filesize

                          584KB

                        • memory/1672-249-0x00000000027E0000-0x0000000002872000-memory.dmp
                          Filesize

                          584KB

                        • memory/1672-227-0x0000000002730000-0x00000000027D4000-memory.dmp
                          Filesize

                          656KB

                        • memory/1672-210-0x0000000002680000-0x000000000272B000-memory.dmp
                          Filesize

                          684KB

                        • memory/1672-204-0x0000000000960000-0x0000000000A9A000-memory.dmp
                          Filesize

                          1.2MB

                        • memory/1672-208-0x00000000024F0000-0x00000000025CD000-memory.dmp
                          Filesize

                          884KB

                        • memory/1672-250-0x00000000027E0000-0x0000000002872000-memory.dmp
                          Filesize

                          584KB

                        • memory/1672-302-0x0000000000960000-0x0000000000A9A000-memory.dmp
                          Filesize

                          1.2MB

                        • memory/1696-145-0x0000000000240000-0x0000000000241000-memory.dmp
                          Filesize

                          4KB

                        • memory/1696-253-0x0000000000400000-0x00000000004BD000-memory.dmp
                          Filesize

                          756KB

                        • memory/1720-128-0x0000000074730000-0x0000000074E1E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1720-0-0x0000000000CB0000-0x00000000011D8000-memory.dmp
                          Filesize

                          5.2MB

                        • memory/1720-1-0x0000000074730000-0x0000000074E1E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1740-10-0x0000000000120000-0x0000000000132000-memory.dmp
                          Filesize

                          72KB

                        • memory/1740-9-0x00000000000F0000-0x0000000000100000-memory.dmp
                          Filesize

                          64KB

                        • memory/1784-499-0x000000001BEA0000-0x000000001BF20000-memory.dmp
                          Filesize

                          512KB

                        • memory/1784-474-0x000000013F710000-0x000000013F716000-memory.dmp
                          Filesize

                          24KB

                        • memory/1784-475-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/1784-495-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/1976-379-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/1976-384-0x000000001CB70000-0x000000001CBF0000-memory.dmp
                          Filesize

                          512KB

                        • memory/1976-385-0x0000000000670000-0x000000000067E000-memory.dmp
                          Filesize

                          56KB

                        • memory/1976-441-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/1976-129-0x000000013F730000-0x000000013F740000-memory.dmp
                          Filesize

                          64KB

                        • memory/1976-147-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/1992-143-0x0000000000400000-0x0000000000414000-memory.dmp
                          Filesize

                          80KB

                        • memory/1992-88-0x0000000000400000-0x0000000000414000-memory.dmp
                          Filesize

                          80KB

                        • memory/2116-285-0x0000000002690000-0x0000000002734000-memory.dmp
                          Filesize

                          656KB

                        • memory/2116-299-0x00000000003A0000-0x0000000000432000-memory.dmp
                          Filesize

                          584KB

                        • memory/2116-252-0x00000000009B0000-0x0000000000AEA000-memory.dmp
                          Filesize

                          1.2MB

                        • memory/2116-301-0x00000000025E0000-0x000000000268B000-memory.dmp
                          Filesize

                          684KB

                        • memory/2116-254-0x00000000025E0000-0x000000000268B000-memory.dmp
                          Filesize

                          684KB

                        • memory/2116-300-0x00000000009B0000-0x0000000000AEA000-memory.dmp
                          Filesize

                          1.2MB

                        • memory/2116-298-0x00000000003A0000-0x0000000000432000-memory.dmp
                          Filesize

                          584KB

                        • memory/2116-295-0x00000000003A0000-0x0000000000432000-memory.dmp
                          Filesize

                          584KB

                        • memory/2424-85-0x0000000000400000-0x00000000004BD000-memory.dmp
                          Filesize

                          756KB

                        • memory/2428-139-0x0000000000240000-0x0000000000246000-memory.dmp
                          Filesize

                          24KB

                        • memory/2428-130-0x0000000000340000-0x0000000000356000-memory.dmp
                          Filesize

                          88KB

                        • memory/2428-374-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/2428-162-0x000000001AA60000-0x000000001AAE0000-memory.dmp
                          Filesize

                          512KB

                        • memory/2428-140-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/2476-141-0x0000000004280000-0x00000000042C0000-memory.dmp
                          Filesize

                          256KB

                        • memory/2476-444-0x0000000074730000-0x0000000074E1E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2476-42-0x00000000000B0000-0x00000000000D2000-memory.dmp
                          Filesize

                          136KB

                        • memory/2476-158-0x0000000074730000-0x0000000074E1E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2476-380-0x0000000004280000-0x00000000042C0000-memory.dmp
                          Filesize

                          256KB

                        • memory/2540-382-0x0000000001890000-0x0000000001990000-memory.dmp
                          Filesize

                          1024KB

                        • memory/2540-151-0x0000000000400000-0x00000000016D2000-memory.dmp
                          Filesize

                          18.8MB

                        • memory/2540-156-0x0000000001890000-0x0000000001990000-memory.dmp
                          Filesize

                          1024KB

                        • memory/2540-148-0x0000000000240000-0x000000000026F000-memory.dmp
                          Filesize

                          188KB

                        • memory/2540-207-0x0000000000400000-0x00000000016D2000-memory.dmp
                          Filesize

                          18.8MB

                        • memory/2544-93-0x0000000000400000-0x0000000000414000-memory.dmp
                          Filesize

                          80KB

                        • memory/2544-49-0x0000000000400000-0x0000000000414000-memory.dmp
                          Filesize

                          80KB

                        • memory/2632-144-0x0000000000310000-0x00000000003E6000-memory.dmp
                          Filesize

                          856KB

                        • memory/2632-142-0x00000000005C0000-0x00000000006C0000-memory.dmp
                          Filesize

                          1024KB

                        • memory/2632-381-0x00000000005C0000-0x00000000006C0000-memory.dmp
                          Filesize

                          1024KB

                        • memory/2632-149-0x0000000000400000-0x00000000004D9000-memory.dmp
                          Filesize

                          868KB

                        • memory/2632-206-0x0000000000400000-0x00000000004D9000-memory.dmp
                          Filesize

                          868KB

                        • memory/2680-442-0x000000013FD70000-0x000000013FD80000-memory.dmp
                          Filesize

                          64KB

                        • memory/2680-467-0x000000001C690000-0x000000001C710000-memory.dmp
                          Filesize

                          512KB

                        • memory/2680-466-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/2680-446-0x000007FEF5860000-0x000007FEF624C000-memory.dmp
                          Filesize

                          9.9MB