Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
f994ac4a64d27f90e51ab11ada35df60_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f994ac4a64d27f90e51ab11ada35df60_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
f994ac4a64d27f90e51ab11ada35df60_JaffaCakes118.dll
-
Size
276KB
-
MD5
f994ac4a64d27f90e51ab11ada35df60
-
SHA1
68148aa1bd2a7a07808c9f2eea069a4a988c725f
-
SHA256
3978ec2c91b2bf70471612e2ae1b31b677e66c349aa43453b087578681536bbc
-
SHA512
95457625295caf889cff17dba1539d027eeaccffaec59eaa15c2d3f1b286e12ef317749189ab1127286bbd82310173e305ad4d2994b70149bf8ed99596c98573
-
SSDEEP
6144:nSfwJACHgGJT1wySZdMwgkFHQF9oJqblxATGyupqSUK:mAomwyuQbl2T5SUK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rundll32mgr.exepid process 2116 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 2760 rundll32.exe 2760 rundll32.exe -
Processes:
resource yara_rule \Windows\SysWOW64\rundll32mgr.exe upx behavioral1/memory/2760-4-0x0000000000720000-0x00000000007A9000-memory.dmp upx behavioral1/memory/2116-12-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2116-15-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2116-371-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2116-986-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2116-987-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419665414" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{698325D1-FE0B-11EE-8C27-FA5112F1BCBF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32mgr.exedescription pid process Token: SeDebugPrivilege 2116 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exepid process 2576 iexplore.exe 2576 iexplore.exe 2576 iexplore.exe 2576 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 2576 iexplore.exe 2576 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2576 iexplore.exe 2576 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 2576 iexplore.exe 2576 iexplore.exe 2576 iexplore.exe 2576 iexplore.exe 1192 IEXPLORE.EXE 1192 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
rundll32.exerundll32.exerundll32mgr.exeiexplore.exedescription pid process target process PID 1760 wrote to memory of 2760 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2760 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2760 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2760 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2760 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2760 1760 rundll32.exe rundll32.exe PID 1760 wrote to memory of 2760 1760 rundll32.exe rundll32.exe PID 2760 wrote to memory of 2116 2760 rundll32.exe rundll32mgr.exe PID 2760 wrote to memory of 2116 2760 rundll32.exe rundll32mgr.exe PID 2760 wrote to memory of 2116 2760 rundll32.exe rundll32mgr.exe PID 2760 wrote to memory of 2116 2760 rundll32.exe rundll32mgr.exe PID 2116 wrote to memory of 2576 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 2576 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 2576 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 2576 2116 rundll32mgr.exe iexplore.exe PID 2576 wrote to memory of 2536 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 2536 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 2536 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 2536 2576 iexplore.exe IEXPLORE.EXE PID 2116 wrote to memory of 1780 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 1780 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 1780 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 1780 2116 rundll32mgr.exe iexplore.exe PID 2576 wrote to memory of 1272 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 1272 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 1272 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 1272 2576 iexplore.exe IEXPLORE.EXE PID 2116 wrote to memory of 1796 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 1796 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 1796 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 1796 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 2400 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 2400 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 2400 2116 rundll32mgr.exe iexplore.exe PID 2116 wrote to memory of 2400 2116 rundll32mgr.exe iexplore.exe PID 2576 wrote to memory of 1192 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 1192 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 1192 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 1192 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 2284 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 2284 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 2284 2576 iexplore.exe IEXPLORE.EXE PID 2576 wrote to memory of 2284 2576 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f994ac4a64d27f90e51ab11ada35df60_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f994ac4a64d27f90e51ab11ada35df60_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:209940 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:275476 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2576 CREDAT:668683 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50f129b36aee8ed9438f5afd536781370
SHA11c7d9c657ec2ec0505b554c38201394dcd5524ae
SHA256da6aad1602517c7b0c699fc5c4dc78fe646919661c6ea88707086f96414e532b
SHA512608370167cbc079f81b5b8ea8fd53fde922193eef096596ca9a7b22960a423e78389c16a5388493b9dbf9e370cc9f81173e6e0594bbff9aaa0df6f757af1c6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5740cd80cf73975998ebf63c0ca49e87d
SHA1634bfd48c44ca47b15bf768804bfc4432f874936
SHA256af2f3cb24e2865cadf7739f4a4a94bb80ded8cad7ccdc0fda4abf918dfad8a00
SHA512a825b87fe794faf917c9153d9c215deb79356f6e4ae104207755c119fa03e70246a75baca9e00ec27f0daba28bc50345d03e937ad5192eadbe2f2e2bcb3136b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c641fa2d6e92689ce302f30ad66f004c
SHA12b7df35e0cd9be6213be4025c4c2bb6b63428c82
SHA256575c1fb7cd5b59494dd4efb5e685da6e3c99696850351c41e0b48a4497a41e81
SHA5122dabc317c6df7ec911aa7838faf2a6238a57658b74fc037fe38548cfdc5365a1d2c9261faf26f5ad89f3348f5371452350528efaeb4399d0d9935bc6c31cad0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD518cf70118be1e62a675de7e0b6455df1
SHA1257e08f615a180cb1badd35f36770450b09285ac
SHA256340d5385781407cfdbae1e6d7fd89c9339a195b060fb165c61c72cf5870167b7
SHA5125c088f3722ddcef30f6f80f1f62817455c5c1e207a080bf45f04275313f0ef4e3a8a47c11d2fabf2ac56dfa942eadb3b12e6b15859c1ce94c00b825bed88ee00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58bbcd0bd27c6daf019e61c411c050c49
SHA11d514be1ecd6e5e8ad13a29d2a633eb76db6e4c4
SHA2561bab7869554d7bbc818129354ab96bd36992c0194fb093f8e08bd2d359d1cc62
SHA5128fffb92d756acd3879bb969e048f2ecec37309a025963bd7c85deb04a4e428ee0871bf8fb3c1be5bfd89718a50bbb0d66ee63a4c6e9bca09a72faaddd599d9b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD519d7d58baf31ad237e58279a2f5bc30a
SHA19a86f52031dadd84e97521a5b445a0615a7050e1
SHA2564b3467c1491e0ed170c291df44bec926170e7ff2991737b406838fbf615da8be
SHA512760bdb86f60da0a718d91280825210f2482950957ae233794318ce68e5ec875a91432abdc2b48408ca6e1866a0ba9db454c16dfa81b2a7f357424dfbc1b5c840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a957beb76c47bf21a47b682955a34962
SHA1c33aff4987a799c6a581414b929f9046f69c5b41
SHA2567351ccee9151b989e478978e3e03ea10f3ae11e992d90b3c4498118fc899ee20
SHA512205394e9b997be937fd3adb4ca3539c7dfd541d26e44b2ed8240427bd0fa2f91ae75909a64b20149d5d665fa9e4f5515be50e0c868c477b75cff90b41e622ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55df6d65194086949bb5e6b09b93f99a3
SHA16213340130c601af504699d3a30ec2aed28f29c2
SHA2564a0ccb117f83c02985a001e5ba04d0ab1429dcb172076e39024aaee20ba1bdd1
SHA5126fae8d00fc0f0e416750973a5e3522b7290fac3c12265f1f441b40e7c98beff00d682ff17765352059a2d3a5f77abb99069e20e4361ada3ab22a92fdb2fb6ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d512de328ea5fc3ce718b6ff782bf2d8
SHA160610d7fd64fc6b644d90752a2eca6cb0d6d0918
SHA256717d3afba8fdda2b5a138ce1721a1762b5943e4e33182aed6cd596b61996cf44
SHA51212ab4d95c2185fdced63f59f2f282850626b830b23c82b67481a9eb5a3f81578a7479d247107e31911b96eee75967e2a1cd58880b24e5a3a1372cc5a67026a39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d5cf9f6c00699058d1dc3c26cca2941d
SHA13b82c2ef5f7170183359c1f3ee85b139c6eb645b
SHA256389b59886de15d80757fed8c9db013a2195896deaff5072bed1712e0ef7c2924
SHA512c436f101eaffa72bae8cb2b2d5bf9b4d7bd8e1084ab39f7f8fb3d779bee14ae860ef2f695da6a6cea26481aaea8680ddf1986f0a31a0e94cf380bfc3a7902436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55ea7432b38ca5e5845a17580fc89e83e
SHA1e2a9b374367c7895f453db78c0d8d3c4212de3ba
SHA256646499e0147217283de90b932c0da689633550a25018afa8f1b5ff111a59f33a
SHA5128763521fe881ee0832b3f10747c3063ced40ea7f46ac576e0c4fc6eaf6a208ca644f8af78df53ea883f036724b1db07a61887a395944da9f2acce69c42ae0b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fc93e8fc74205f81ea33067f4cca759a
SHA10e6202d4e7340c7f40e34c2d094febeecc571e86
SHA256e378ed90eef2a85552fa73d822296222ddc9fb348ed2b3815cde17fecfdda415
SHA51249e6850d59f87ff08ce55c396ba64468ebdaa22808ce1783c38b06a64fc4f6e975b01daf55cbac2a26bdce9b280ce4d9418c6c2abbd0807df279de8eeaedd123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f454626216868e0df2efe7496c491c46
SHA158f5e557c0a58cb7b0815901ba2f65f72c500967
SHA25627c1e5378deb463bfd0d09c8c46e5f7c20b952690f4533376aaaa1383c7265a9
SHA5122fa571959c0a5c1969d1812591e641da3770fc6902edca2d5a6b5722a712b7ea1fbd05d04a2a6045d83f1b8337a47e328dc0b218969c36dce934435e04e92b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD52a8681630d78b2e4bc41d939f2d12624
SHA10e73528c16187534b041e6f424bb5804c8e67d71
SHA256fdcc2aa04c16fddeb8df867dc4d269e1a0e43bac4661c2b579974c3258071b52
SHA512ab178587949b1daca6173e657707d420af0e1edbc363bf07232f73c16fd285bd3b0054703a5e796803e2dde35db4e90e53add2dc4be06a372d9933675f8bc687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD546d114cbf9292c1e5770b36a6ce98867
SHA19dde3468aa71efa074acb18bc8b93306c9b7702b
SHA256b65c4719e77c29a9b107c4539ca8994e2fe8933585fe92ee32cb8905e95ecc24
SHA5126e92601e1795f7515746fcac60b21758a34f4bdc0932edb33a066445645c68b5a13c4ff55df0e1589e5a03a80b5ed5587e27aa02a1905be3cb04e9cbd6abf454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD573d8f3d7c1ea6d8d64e2fe0d88f1a22c
SHA1514ad14bc349e7d6a6d1eb2eb290d65e8d227455
SHA256dcc7a558e65ffb359dafad8fb856f54b50d2703dcd05db465fd3aa10d88b966f
SHA5123c82d3e89dd577ecb7c6e70ed75d24d5b76e8b2095d31e4483099f66a390a38a58c0b9bf3b2e1e71270d09748d9f609e2166c05fb4fc69e8d4c2b1befb69dd81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55d912f7c94f04526cce083e44ca30a85
SHA13d11254e6d49bc80fa997dc65dc1e0423730bf7c
SHA2567ef8aa859de748e5565d241366a9d5ef6baaa74b1dad6b88790881eee931aa64
SHA5128b4322d2bf057680451caf63995a9d8dfe647cf5108cea5d3bfb7e7e05a603697fc14c73fc52421d2ee18c70acd430976008e40afec7e53bba57e96c3340ce85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5641a7c7618c2ab649a3b1ae0276b6ee6
SHA1de57b87bed159cb0a328b56408e5563beec21d9c
SHA256906edf195ef822be8a885ec178f736982fe29a4d108f3f09fe2a185710d48a00
SHA51227d3ad40a817dd3dc7a31038d565ed2b103ce989bfdbf702cbbee1b763bec396109d5578dec8dcd494c94b1629c0e4faeda349db1d496ee65119638194202c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD563fca3451fe4a40b9d6f10af53f6fe67
SHA1cb4fbc9581d04f81ef7b85e6030bba9f1704ab01
SHA25616229ab40aec9a33928c5768115623797022bdb189a1debff0b66da614e57777
SHA512a480053d0538ed4a74f783be7cc24b26fd4678e818d6cc4e83eac34228a16dfd85ec78cef6ce11f64951a43ff32f66157525b57a64b44017c8de561d85853858
-
C:\Users\Admin\AppData\Local\Temp\Cab956F.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Cab963E.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar9660.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Windows\SysWOW64\rundll32mgr.exeFilesize
204KB
MD5053349d7ad422a413294766d79fc0b14
SHA1b3bd239f6d8de5d82945d4063161b06ff932ac67
SHA2562aae02cbc873fd41602e7f69427602d3c7062ad62bf0cdb64df3502cc372905c
SHA5123f6ae5958dff78194f1a730db94603bd0d88aa9a33c8ffb62dbe3a1b583b86b638bc017b9cb2a2f368815e00750e12d80be287ac77f4a15afbb7603fee1c154e
-
memory/2116-16-0x0000000077B8F000-0x0000000077B90000-memory.dmpFilesize
4KB
-
memory/2116-493-0x0000000077B8F000-0x0000000077B90000-memory.dmpFilesize
4KB
-
memory/2116-371-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB
-
memory/2116-12-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB
-
memory/2116-13-0x00000000001B0000-0x00000000001B3000-memory.dmpFilesize
12KB
-
memory/2116-15-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB
-
memory/2116-14-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/2116-986-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB
-
memory/2116-987-0x0000000000400000-0x0000000000489000-memory.dmpFilesize
548KB
-
memory/2760-4-0x0000000000720000-0x00000000007A9000-memory.dmpFilesize
548KB
-
memory/2760-2-0x0000000010000000-0x0000000010046000-memory.dmpFilesize
280KB
-
memory/2760-0-0x0000000010000000-0x0000000010046000-memory.dmpFilesize
280KB
-
memory/2760-11-0x0000000000720000-0x00000000007A9000-memory.dmpFilesize
548KB