Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe
-
Size
524KB
-
MD5
ed2da68e28594d135d1d50f1be586a6c
-
SHA1
54c4e40e6c25c91d277fc21784f8405aba4e3c56
-
SHA256
d67f2cfb48f83bb34a78ec2403b1a9de14351511cacaeb69b7539784042fc4f9
-
SHA512
a9043a70c05977f53abcdcc98fba52ca9912323ab94e235468117a56046507ed3b529438d41b84cecbcb66bda6c73597ce03789bf2ebb2ef34b9269809c5b951
-
SSDEEP
12288:UkdztRkp33eVbM/XFZk5Cfw2+nJN9mAOHmXnmCP9LCgrV8jkiDEwKzPxzOjm+F4J:8KNnLPVCQVnEH/t
Malware Config
Extracted
cybergate
v1.07.5
Cyber
corehacker.no-ip.biz:100
10617TU3P1C2EL
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
explorer.exevbc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0J67G77N-I7BN-G163-42RU-V78Y8068AY8H}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{0J67G77N-I7BN-G163-42RU-V78Y8068AY8H} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0J67G77N-I7BN-G163-42RU-V78Y8068AY8H}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{0J67G77N-I7BN-G163-42RU-V78Y8068AY8H} explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
vbc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation vbc.exe -
Executes dropped EXE 3 IoCs
Processes:
vbc.exevbc.exeSvchost.exepid process 5092 vbc.exe 3680 vbc.exe 3220 Svchost.exe -
Processes:
resource yara_rule behavioral2/memory/5092-16-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/5092-76-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4788-81-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3680-153-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/4788-539-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3680-1443-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vbc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
Processes:
vbc.exevbc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\ vbc.exe File created C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exedescription pid process target process PID 2952 set thread context of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid process 5092 vbc.exe 5092 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vbc.exepid process 3680 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
explorer.exevbc.exedescription pid process Token: SeBackupPrivilege 4788 explorer.exe Token: SeRestorePrivilege 4788 explorer.exe Token: SeBackupPrivilege 3680 vbc.exe Token: SeRestorePrivilege 3680 vbc.exe Token: SeDebugPrivilege 3680 vbc.exe Token: SeDebugPrivilege 3680 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vbc.exepid process 5092 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exevbc.exedescription pid process target process PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 2952 wrote to memory of 5092 2952 ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe vbc.exe PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE PID 5092 wrote to memory of 3460 5092 vbc.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed2da68e28594d135d1d50f1be586a6c_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Admin2.txtFilesize
224KB
MD5d410baaec6f27f06a7e0aa8ea7478905
SHA1276125317eb9476078f6f8b82b31ac66a55f1be3
SHA256569e5ae5f1cf40713f43262fb7fc20a17a1acdce49b024dd1c0b5545f9bb84a6
SHA512c35394f05c0301ec2769e936a0bb98e49552a07acf9a6e8ea9ba60dccfe4a46ef9d042401599889b4b3bc6a5824ce276ba589bb5454e4dcdab5d9b1e71a51fe9
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD535021ea8131be124a2baa656b3c76fab
SHA1ff6f8bfd9b28dca04c8f7e243ef6617d8ea24764
SHA2563fb3f07e220112bd34a4368f2dd17a0b765044afc52335f10aa86519c3fa7277
SHA5126bfe34577e7d62f03aeae84fed51441d5f13c08a0c5afb35cc299bc3afce3a52fa4dac292e93d8b45e31a92a18f51c0bc184d6d4ebc01af5daeafba511fc0072
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD55d98f39740cf21a8bb0e88dcf01067cc
SHA1b58ff502db99e7bedfeb1e0f904ad532e45688ab
SHA2561b2fbeaef7872bae9d756d21d8a4f0e3cf0909f8a1d078c4b0aee4f3938eed6c
SHA5125d5d54687e6a0069d7a11439907e0e16434699cf26f8930d4b7e957df69820e625949e4791867d806523c69795a034be3a7d79c4e8dca18de0b6e837c3821a59
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5f656709d33c1c183674becaae874caa6
SHA145056ac3f82e0d73b0e7684cea6bebf24e14c129
SHA256eb12576004e83f86d83332b11e0617e0f976678a778469f613d34d485eaae55a
SHA5123bfd7be02bcd89d1e5a8c47f43d2bd6c6f9623c3579465f7b288ad71b8e9346e852c9faf292640a73058ebf179487974ccab075bbf75a5536e0434c4e04ee269
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5ceaa81dfc994477efe6842b3ce314cbe
SHA16a2390a6c776563ef7e3bff6b460847c9c2a678b
SHA256f8a79c91c0e62ec9e3e379af71e4694693714f8add99e3d8447c0b76b31bb428
SHA512673d68fd79af5e8a8d3def1c213f282356b929a2e3e11efe30106b15544da22b20de06bb6291ba3e4e2f55e41a26806f9ac5f807f99e92d59e255122c011c2d1
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD514027c6c67d975b5a978fc51781f3647
SHA1bbe95b507073ec271a7c73adb904de71842ff551
SHA256206a1c48d1ee603208d06b9bdad5acfc7a4bec7a4b6bdc6261afe7b00c4e4fa9
SHA512c4423b521a15cb428d0bff813bd4780431761a3da3ede3ee2e061e7b9a391a0aeb70588515aa75863432d891cd2d67b67fcd943f1da8459c10788fc11f906332
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5c25ed528e6e124058c3594dcb145f685
SHA16dd805e19c99e73ef24b0673b2cd5899b339d307
SHA2563a2046f5c8f240aa68a36a7d07c24ea89aabe263f9bfb11c28825f97228dcb36
SHA512e8233295d66117a48712cc2b355a2f26304e9285624ba66fc13972c4f3675e442e9ff4833b0f781d5d294bdfe7e5fcaa9057e6fdd0c13647631ef3eb7b33faf3
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD54b2ac3ff83fbb92084552d23c9bd2a9e
SHA107ef00fa9444bab9a0949f48ec0aeea8635b5f8d
SHA256c01a5d1fb15bbd1332a6ac8873122ef3d1fc5c0e85439110ee3b3b54e331f440
SHA512769312a9cfa0f12ef82899b41f8c825e4c4ab07523505136781410099852cf02beacaa0013d96150f241097ab21eeb08f7bbdbf8e71b3ae798680a70e3ed1187
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD574096849c8ed94b2e16973578ab4790f
SHA17719f8197fed121b7619e23d25094e24cfed337c
SHA256a2ccebfc203e7cab8e45b409e8eaf3d56f4dd51b379d007a147f17aab3f08a70
SHA5120627fbe4afef41cf96f9d64120a2f42c7120607f6f60240d5b33f07beb099a909f79fd53687e56a4b7c6cda662211f642888ff05e937d3e06caef45169101796
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5ab46084335359f7e3c17cb3102daab5a
SHA1b47812a9a08dbc4606acb3ad2c004e8d4449bea9
SHA256103e25025bfc0d509e2622737efeb5bd466c7adbcb2e78987f52cb58224fefa6
SHA5120efc0ebc53614fae50b49661e75d1463fe7a5fad9b6c926839f34c595216f0b9e340df5729de78ffdaed838da04d1e07bb4713c8a1576305eba9f21fb98c49c7
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5f5d6c640e648e809f14dd3fc130e97ec
SHA1fab8384a96d2fdcef7a0c1078546c73b75916a46
SHA256aeb88923c1f4213b0ca5ea7d131ccf566cc88ab3a7ecc530f8685719ac7c92d8
SHA5123ff44bb942afabcf80d1c6611c8ac743c739ab6e81f74921184f25fc51c9c08f0e07655c18f7c3704bb31f4c2a36672073923ee9e4176d04d31ba5a961252135
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD535f198b79152e3d18ac3fb2451a3789e
SHA16cc43aff1b04269585594b0b0f1b872f82caaa0c
SHA256e73434dd87442a7bf635fdbf47890132efc4125cb76c3f8275019abffbf1fd8b
SHA5128da1c2f89a52ed857c12e342a5df5d4a007bced56f6354a8fc037fe342ddeeb0cfe6ce4db54669f3b77d524443bbb98fbb495afc3baffd29a41a91a964231883
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD57df372b93fa5bf43f6c6f50627127b25
SHA1abe0b726df2943618e739c5a057842b76a335f53
SHA25657991b84c99e80ddc0c02db8d7d5a8d16945d4222dca69f500ccedcfee2fbad5
SHA51296eb9cae10f6d5534681b85f637c3e45648166bc7478fa80ec4d7c477aa840668e3738bf574a647ffb90c5fa5b58cb020389a277a7b3e8625479026fe71fbfa5
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5c1c9d3efa30aa0b9869de19af5aca2f2
SHA14fadb1a239cafef48ae029ea865a5cd8690e557f
SHA256cd66f78fb17d93f66db1f0064aeda06971e90ec324662c007bffc0d8359590b9
SHA5124704ec45e1be41da6befd99011f52798079a36f3ec47093291f0139d45bbe78edbe00062f4ecfb9315dde59b3c8d0a6cf1fa6d6bb92e4aff49b21794ba3d1ee5
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5cc619e137e994db2389f515af8cefb97
SHA1e5ff3b2fe76a6301a3b5ff73f788becb8047d3f6
SHA256b285e721465f68c62641f91fd316d1b047c571b1b673118a4a6a3eead30f18fd
SHA512aea76b40b1a74a01584ad75bd81231bda9f87093265bf13f957dcd2f4dcff7bb729dbc070ae652e2e16b6124ad09ad8ee43cd7505aa94378d9e9cd87950270dd
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD55d22089236a71e1a1e2a916dae86f06c
SHA166bd219aabbf7079492af7b806a1adb12d3d1c19
SHA25611357b2f3c1046cb113ca967b51d80363ffb4e5e1270e3670a4f39563860bc61
SHA512b2a8086e1f5b7d937385a1c081b9301eaa1130e9a0d20b2160667a3576224916a3809d07ac7feb0fa74075af7b618e869222d70f3a41db381abd10c6383454c7
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5bd3a8ff09e874b0128e6fabc127349ae
SHA1ee3ee7304026f6301641d50ecf7f385f96a0da4f
SHA256de958eddd91915941d9d6fda914f948b597bae28f1f77840bd94c4a3d6ca1d25
SHA5123ed895fdd201a78ced47898a3096c864321725f155b030556a1857a2a436dfc5a5c63b25d7d188739914c262f6e1f39bbfdc0a4483c1faec61b44c65788f56ef
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5a84c165ce0b250148dad739f7fd0ae46
SHA1d99c9c85d77c369526512591e06788c7fcd20514
SHA256306cf7ebea1eb3457ebad8c6b90e852354abaa98c556508a4c524ba1c155a765
SHA512399d51ff0a453849283fb81400e954cda9e9a169f02978cf89c20e20920d541c33d7eb593e4389db237d4098d14e2d631c1b797768109402ad992e22d279b19a
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5d5349614684e929ec948c8aee969799c
SHA1a54e4ad8e6ec242f0c1d56e38bf8f4bdaaf4c9a4
SHA256be80bce8de7edb553baa24bb0a305ff9693b19b5d7b0e60c37d1822abc20ad50
SHA51254b1bf0482c31c2923773d86c22462e5d44ac8ff5e44ae5aad600b3dbb6821e304bc7cff5782b9301bd8c0f5f8f133a5a85e9f362d1c1ca1442ade09514bbdf0
-
C:\Users\Admin\AppData\Local\Temp\vbc.exeFilesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
C:\Users\Admin\AppData\Roaming\Adminlog.datFilesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
memory/2952-0-0x0000000075260000-0x0000000075811000-memory.dmpFilesize
5.7MB
-
memory/2952-12-0x0000000075260000-0x0000000075811000-memory.dmpFilesize
5.7MB
-
memory/2952-1-0x0000000075260000-0x0000000075811000-memory.dmpFilesize
5.7MB
-
memory/2952-2-0x0000000001950000-0x0000000001960000-memory.dmpFilesize
64KB
-
memory/3680-1443-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/3680-153-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/4788-20-0x0000000000D40000-0x0000000000D41000-memory.dmpFilesize
4KB
-
memory/4788-539-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/4788-21-0x0000000001000000-0x0000000001001000-memory.dmpFilesize
4KB
-
memory/4788-81-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/5092-11-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/5092-16-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/5092-154-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/5092-5-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/5092-8-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/5092-76-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/5092-10-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB