Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 16:19 UTC

General

  • Target

    ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    ea6726790536078f1519a965c44a11e8

  • SHA1

    eb72a91a1ecc6b3fd5960d092d90de50ae502999

  • SHA256

    dceb5e72706fa58a20c908932dd9a5bd2445ea2c6e412f13253e7f8c2c51e655

  • SHA512

    254a61124f1c5fa0001e5cc4aab7c0fcd3aeb6d4b269529d4c92a897aef6c3aea1a016a2bda6c768ae6cf796083d1f3bc91dee847a8455ed12e907eefc00db6d

  • SSDEEP

    24576:zLgG1Z5DpRkcBLahuWfsFddDz7YXQpwr7w2:P71ZTRk1h1A8XQpt2

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Users\Admin\AppData\Local\Temp\oflete\vts.exe
      "C:\Users\Admin\AppData\Local\Temp\oflete\vts.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\SysWOW64\dllhost.exe
        dllhost.exe
        3⤵
          PID:3956
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Giu.mui
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4792
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4300
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^kQLkrNVqMvVPjUboJryRqVXWRCKioBIlzPmMjILBcJFMqlgOxKxlShsdTPxBeNRkOLcvxKVqsEcdfkVGhVNnubsunpTbglnIRxYgORx$" Sento.mui
              5⤵
                PID:4368
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com
                Quel.exe.com h
                5⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:3328
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com h
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:1808
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\nifsifq.vbs"
                    7⤵
                    • Blocklisted process makes network request
                    PID:3976
              • C:\Windows\SysWOW64\PING.EXE
                ping ETDALPOV -n 30
                5⤵
                • Runs ping.exe
                PID:1876
        • C:\Users\Admin\AppData\Local\Temp\oflete\frey.exe
          "C:\Users\Admin\AppData\Local\Temp\oflete\frey.exe"
          2⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            PID:4732
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 968
            3⤵
            • Program crash
            PID:2236
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 824 -ip 824
        1⤵
          PID:3964

        Network

        • flag-us
          DNS
          58.55.71.13.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          58.55.71.13.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          240.197.17.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          240.197.17.2.in-addr.arpa
          IN PTR
          Response
          240.197.17.2.in-addr.arpa
          IN PTR
          a2-17-197-240deploystaticakamaitechnologiescom
        • flag-us
          DNS
          fYkRnLiyNmVjHRcBr.fYkRnLiyNmVjHRcBr
          Quel.exe.com
          Remote address:
          8.8.8.8:53
          Request
          fYkRnLiyNmVjHRcBr.fYkRnLiyNmVjHRcBr
          IN A
          Response
        • flag-us
          DNS
          17.160.190.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          17.160.190.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          28.118.140.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          28.118.140.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          13.86.106.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          13.86.106.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          239.249.30.184.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          239.249.30.184.in-addr.arpa
          IN PTR
          Response
          239.249.30.184.in-addr.arpa
          IN PTR
          a184-30-249-239deploystaticakamaitechnologiescom
        • flag-us
          DNS
          ip-api.com
          Quel.exe.com
          Remote address:
          8.8.8.8:53
          Request
          ip-api.com
          IN A
          Response
          ip-api.com
          IN A
          208.95.112.1
        • flag-us
          GET
          http://ip-api.com/json
          Quel.exe.com
          Remote address:
          208.95.112.1:80
          Request
          GET /json HTTP/1.1
          Accept: */*
          Accept-Encoding: gzip, deflate
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
          Host: ip-api.com
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Date: Tue, 09 Apr 2024 16:19:43 GMT
          Content-Type: application/json; charset=utf-8
          Content-Length: 297
          Access-Control-Allow-Origin: *
          X-Ttl: 44
          X-Rl: 41
        • flag-us
          DNS
          1.112.95.208.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          1.112.95.208.in-addr.arpa
          IN PTR
          Response
          1.112.95.208.in-addr.arpa
          IN PTR
          ip-apicom
        • flag-us
          DNS
          50.23.12.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          50.23.12.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          56.126.166.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          56.126.166.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          17.143.109.104.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          17.143.109.104.in-addr.arpa
          IN PTR
          Response
          17.143.109.104.in-addr.arpa
          IN PTR
          a104-109-143-17deploystaticakamaitechnologiescom
        • flag-us
          DNS
          iplogger.org
          WScript.exe
          Remote address:
          8.8.8.8:53
          Request
          iplogger.org
          IN A
          Response
          iplogger.org
          IN A
          172.67.132.113
          iplogger.org
          IN A
          104.21.4.208
        • flag-us
          GET
          https://iplogger.org/1RrJa7
          WScript.exe
          Remote address:
          172.67.132.113:443
          Request
          GET /1RrJa7 HTTP/1.1
          Accept: */*
          Accept-Language: en-us
          Accept-Encoding: gzip, deflate
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
          Host: iplogger.org
          Connection: Keep-Alive
          Response
          HTTP/1.1 200 OK
          Date: Tue, 09 Apr 2024 16:20:03 GMT
          Content-Type: image/png
          Transfer-Encoding: chunked
          Connection: keep-alive
          set-cookie: 294132843211120935=1; expires=Wed, 09 Apr 2025 16:20:03 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
          set-cookie: clhf03028ja=191.101.209.39; expires=Wed, 09 Apr 2025 16:20:03 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
          memory: 0.4126129150390625
          expires: Tue, 09 Apr 2024 16:20:03 +0000
          Cache-Control: no-store, no-cache, must-revalidate
          strict-transport-security: max-age=31536000
          x-frame-options: SAMEORIGIN
          CF-Cache-Status: DYNAMIC
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BGrVjDwEXXfkQ5lYlaBKZOpa4m5eB9By%2F8jKLYZABWRqRBs6r3tLw98d3iyXn5eu%2FS8Q6WuvbTBFWWC50qLPDS4vfvE7fG17djkFGrLpTo2WhbAgKfVM0tjeGhFkUNY%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
          Server: cloudflare
          CF-RAY: 871bd2800d70651f-LHR
          alt-svc: h3=":443"; ma=86400
        • flag-us
          DNS
          x2.c.lencr.org
          WScript.exe
          Remote address:
          8.8.8.8:53
          Request
          x2.c.lencr.org
          IN A
          Response
          x2.c.lencr.org
          IN CNAME
          crl.root-x1.letsencrypt.org.edgekey.net
          crl.root-x1.letsencrypt.org.edgekey.net
          IN CNAME
          e8652.dscx.akamaiedge.net
          e8652.dscx.akamaiedge.net
          IN A
          23.55.97.11
        • flag-be
          GET
          http://x2.c.lencr.org/
          WScript.exe
          Remote address:
          23.55.97.11:80
          Request
          GET / HTTP/1.1
          Connection: Keep-Alive
          Accept: */*
          User-Agent: Microsoft-CryptoAPI/10.0
          Host: x2.c.lencr.org
          Response
          HTTP/1.1 200 OK
          Server: nginx
          Content-Type: application/pkix-crl
          Last-Modified: Mon, 12 Feb 2024 22:07:27 GMT
          ETag: "65ca969f-12b"
          Cache-Control: max-age=3600
          Expires: Tue, 09 Apr 2024 17:20:03 GMT
          Date: Tue, 09 Apr 2024 16:20:03 GMT
          Content-Length: 299
          Connection: keep-alive
        • flag-us
          DNS
          113.132.67.172.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          113.132.67.172.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          11.97.55.23.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          11.97.55.23.in-addr.arpa
          IN PTR
          Response
          11.97.55.23.in-addr.arpa
          IN PTR
          a23-55-97-11deploystaticakamaitechnologiescom
        • flag-us
          DNS
          172.210.232.199.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          172.210.232.199.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          23.236.111.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          23.236.111.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          249.197.17.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          249.197.17.2.in-addr.arpa
          IN PTR
          Response
          249.197.17.2.in-addr.arpa
          IN PTR
          a2-17-197-249deploystaticakamaitechnologiescom
        • flag-us
          DNS
          25.173.189.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          25.173.189.20.in-addr.arpa
          IN PTR
          Response
        • 208.95.112.1:80
          http://ip-api.com/json
          http
          Quel.exe.com
          504 B
          566 B
          5
          2

          HTTP Request

          GET http://ip-api.com/json

          HTTP Response

          200
        • 172.67.132.113:443
          https://iplogger.org/1RrJa7
          tls, http
          WScript.exe
          1.2kB
          6.6kB
          13
          9

          HTTP Request

          GET https://iplogger.org/1RrJa7

          HTTP Response

          200
        • 23.55.97.11:80
          http://x2.c.lencr.org/
          http
          WScript.exe
          345 B
          720 B
          5
          3

          HTTP Request

          GET http://x2.c.lencr.org/

          HTTP Response

          200
        • 8.8.8.8:53
          58.55.71.13.in-addr.arpa
          dns
          70 B
          144 B
          1
          1

          DNS Request

          58.55.71.13.in-addr.arpa

        • 8.8.8.8:53
          240.197.17.2.in-addr.arpa
          dns
          71 B
          135 B
          1
          1

          DNS Request

          240.197.17.2.in-addr.arpa

        • 8.8.8.8:53
          fYkRnLiyNmVjHRcBr.fYkRnLiyNmVjHRcBr
          dns
          Quel.exe.com
          81 B
          156 B
          1
          1

          DNS Request

          fYkRnLiyNmVjHRcBr.fYkRnLiyNmVjHRcBr

        • 8.8.8.8:53
          17.160.190.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          17.160.190.20.in-addr.arpa

        • 8.8.8.8:53
          28.118.140.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          28.118.140.52.in-addr.arpa

        • 8.8.8.8:53
          13.86.106.20.in-addr.arpa
          dns
          71 B
          157 B
          1
          1

          DNS Request

          13.86.106.20.in-addr.arpa

        • 8.8.8.8:53
          239.249.30.184.in-addr.arpa
          dns
          73 B
          139 B
          1
          1

          DNS Request

          239.249.30.184.in-addr.arpa

        • 8.8.8.8:53
          ip-api.com
          dns
          Quel.exe.com
          56 B
          72 B
          1
          1

          DNS Request

          ip-api.com

          DNS Response

          208.95.112.1

        • 8.8.8.8:53
          1.112.95.208.in-addr.arpa
          dns
          71 B
          95 B
          1
          1

          DNS Request

          1.112.95.208.in-addr.arpa

        • 8.8.8.8:53
          50.23.12.20.in-addr.arpa
          dns
          70 B
          156 B
          1
          1

          DNS Request

          50.23.12.20.in-addr.arpa

        • 8.8.8.8:53
          56.126.166.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          56.126.166.20.in-addr.arpa

        • 8.8.8.8:53
          17.143.109.104.in-addr.arpa
          dns
          73 B
          139 B
          1
          1

          DNS Request

          17.143.109.104.in-addr.arpa

        • 8.8.8.8:53
          iplogger.org
          dns
          WScript.exe
          58 B
          90 B
          1
          1

          DNS Request

          iplogger.org

          DNS Response

          172.67.132.113
          104.21.4.208

        • 8.8.8.8:53
          x2.c.lencr.org
          dns
          WScript.exe
          60 B
          165 B
          1
          1

          DNS Request

          x2.c.lencr.org

          DNS Response

          23.55.97.11

        • 8.8.8.8:53
          113.132.67.172.in-addr.arpa
          dns
          73 B
          135 B
          1
          1

          DNS Request

          113.132.67.172.in-addr.arpa

        • 8.8.8.8:53
          11.97.55.23.in-addr.arpa
          dns
          70 B
          133 B
          1
          1

          DNS Request

          11.97.55.23.in-addr.arpa

        • 8.8.8.8:53
          172.210.232.199.in-addr.arpa
          dns
          74 B
          128 B
          1
          1

          DNS Request

          172.210.232.199.in-addr.arpa

        • 8.8.8.8:53
          23.236.111.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          23.236.111.52.in-addr.arpa

        • 8.8.8.8:53
          249.197.17.2.in-addr.arpa
          dns
          71 B
          135 B
          1
          1

          DNS Request

          249.197.17.2.in-addr.arpa

        • 8.8.8.8:53
          25.173.189.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          25.173.189.20.in-addr.arpa

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\FE85.tmp

          Filesize

          297B

          MD5

          bd0c2d8e6b0fe0de4a3869c02ee43a85

          SHA1

          21d8cca90ea489f88c2953156e6c3dec6945388b

          SHA256

          3a3e433f615f99529721ee766ad453b75d73fe213cb1ab74ccbb4c0e32dcd533

          SHA512

          496b1285f1e78d50dd79b05fa2cbf4a0b655bb3e4515646be3a7c7cdf85d7db6ab35577aa1e294f3d515d707ca341652b5ae9d4b22197e4480226ef8440294b6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Abbozzo.mui

          Filesize

          639KB

          MD5

          4e8629baecebd43750f2bbe47802bd9f

          SHA1

          84f87ce1213739e98d38d9878a535ec130dd2004

          SHA256

          e7f1abdf2fb4607f636e416b062f5b05a23aeba881a4f09a8083ca19a553811f

          SHA512

          3c355d3899100845d04be80b5537881e7ee5fd2516d4c2c89b3f2e511070c5455e8bee5dc6c6b71a0b55d6a9af6cd8a1f97fb4f46ce19a0a1412a5615340724e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gia.mui

          Filesize

          139KB

          MD5

          0f8a38c30c0a09f00eaf19395d8a40f2

          SHA1

          298afde1f0db4b527822370df772b7dc0371b92c

          SHA256

          aa12257d1c3ee82287d6c617359aaa2592f3bb9d0cca991f89660bb696ba8183

          SHA512

          ba89f3e76af52d7fb11e0d29c3e68a947611bcf3f18125c3ae2ba4538ff349c0fb13dac573bb3bb76cde231c464f623e266b34cdf58bd0321c96c856795a98be

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Giu.mui

          Filesize

          501B

          MD5

          c4f3aeb64246483fc44207f319c5b121

          SHA1

          b1ce99afe2e145d6e7a5d419c0b9e5614f680729

          SHA256

          0a718358ad31b418775f66874a055d4174f0f81326cd76513db2e086f908beeb

          SHA512

          deaf054f84f600b122bc7f2bd71e716fc05e0f2818cfe63b38573a9af7789ddd3134a1b2f796ff131ba1c7cd4bf74c82bd7d5136507288e872648fbe0ababd2a

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com

          Filesize

          872KB

          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sento.mui

          Filesize

          872KB

          MD5

          84b0184010185fb22db4d7451492ae5f

          SHA1

          6f5a12664555342f958030c118db7e5b78d78d7d

          SHA256

          ddabd3d20c02f109925f46c56cba701f2bec2cffbe1f3800b2442a6cd4ab3d2d

          SHA512

          6d38495a4b85862787c7de720d2e0c71762202c770212cc91a389a8768b80fd920f52adf3e0bc0f8d81fedd15be95afa39d14c96a07617eb476908f088aec814

        • C:\Users\Admin\AppData\Local\Temp\nifsifq.vbs

          Filesize

          148B

          MD5

          9e22e079be50bc3a9bce6ebb256478bc

          SHA1

          1f8ffbf6bfa85e617144235fcf809869150e50bf

          SHA256

          7ed4fc0c163e66302c9b35b1592b8752729231daa755ecfcfa43c14cc385c895

          SHA512

          490d9c2e540f04bda6c242ae5adb9be9ec4deb7d4a0d0d30ef461b0adeaaca6f97c715b12fa8b8baee712f11e430d3499a5dea6f2522c0ccaeddb776689e7e8e

        • C:\Users\Admin\AppData\Local\Temp\nsg6FA3.tmp\UAC.dll

          Filesize

          14KB

          MD5

          adb29e6b186daa765dc750128649b63d

          SHA1

          160cbdc4cb0ac2c142d361df138c537aa7e708c9

          SHA256

          2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

          SHA512

          b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

        • C:\Users\Admin\AppData\Local\Temp\oflete\frey.exe

          Filesize

          302KB

          MD5

          f795be6a5ce28f6e7f766e48dc5cb44e

          SHA1

          364b5b20afddd8f046bf3e673a5f590e2b84ceb1

          SHA256

          c7ad728ccbf4101c21bd646b604731764ab02d097b6cb35b251f5cd4dc3baf2a

          SHA512

          731d13194f146a7368e64407c03cef811043fc2ed68bcc1f941cacdcee21af933ee7b507bc16644476d55e992272ea3061650763eaf64b3c4dcb24eaab0c5543

        • C:\Users\Admin\AppData\Local\Temp\oflete\vts.exe

          Filesize

          917KB

          MD5

          bbecb93aeacc1abf8cee9d9b91833900

          SHA1

          97d303be086f700918a9ddf4da58685961526738

          SHA256

          844922b5e7c0681325cfd27ece32c4c8a319c6054d4e2dd6d5b7f22ed31c22db

          SHA512

          af59d9ad84bc3381eb556f78d8578b76db145048fca4bfd48afa31cd03a54d75ae806f30b3f01207a5a75cf188735154c79dc5f494f5785a52b4868979150cc7

        • memory/824-53-0x0000000000400000-0x00000000023B6000-memory.dmp

          Filesize

          31.7MB

        • memory/824-36-0x0000000002700000-0x0000000002800000-memory.dmp

          Filesize

          1024KB

        • memory/824-37-0x00000000001C0000-0x00000000001E6000-memory.dmp

          Filesize

          152KB

        • memory/824-48-0x0000000000400000-0x00000000023B6000-memory.dmp

          Filesize

          31.7MB

        • memory/1808-58-0x0000000003B80000-0x0000000003BA7000-memory.dmp

          Filesize

          156KB

        • memory/1808-55-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

          Filesize

          4KB

        • memory/1808-56-0x0000000003B80000-0x0000000003BA7000-memory.dmp

          Filesize

          156KB

        • memory/1808-57-0x0000000003B80000-0x0000000003BA7000-memory.dmp

          Filesize

          156KB

        • memory/1808-59-0x0000000003B80000-0x0000000003BA7000-memory.dmp

          Filesize

          156KB

        • memory/1808-60-0x0000000003B80000-0x0000000003BA7000-memory.dmp

          Filesize

          156KB

        • memory/1808-61-0x0000000003B80000-0x0000000003BA7000-memory.dmp

          Filesize

          156KB

        • memory/1808-64-0x0000000003B80000-0x0000000003BA7000-memory.dmp

          Filesize

          156KB

        • memory/1808-79-0x0000000003B80000-0x0000000003BA7000-memory.dmp

          Filesize

          156KB

        • memory/4732-52-0x0000000000400000-0x00000000023B6000-memory.dmp

          Filesize

          31.7MB

        • memory/4732-63-0x0000000002450000-0x0000000002550000-memory.dmp

          Filesize

          1024KB

        • memory/4732-51-0x00000000001C0000-0x00000000001E6000-memory.dmp

          Filesize

          152KB

        • memory/4732-50-0x0000000002450000-0x0000000002550000-memory.dmp

          Filesize

          1024KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.