Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
fa25aeece8408ff347245de865937571_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa25aeece8408ff347245de865937571_JaffaCakes118.dll
Resource
win10v2004-20240412-en
General
-
Target
fa25aeece8408ff347245de865937571_JaffaCakes118.dll
-
Size
384KB
-
MD5
fa25aeece8408ff347245de865937571
-
SHA1
39e75d87e3ee217882b612c1117f4a1dc57edda3
-
SHA256
96316cff7766e81088fc562cd629c69a3020f44e878ccf4f3141527e2bc74c1a
-
SHA512
05ac90c256f3f60bf9bb317da14f33e48962db3ba08ac513f15ae0edff2d98a51381b92c97d9af619911168a7ab5e6d430e5389f74f531a6db1f100e7aacd3a4
-
SSDEEP
6144:bzOIjTl9iMXovRwEkZzUWe2c5kEdOWImA9O98wfCqwv/Dj/evTqgnIEBxf:bzViMX0+E5Wer2aIpUeQluav2gnIEBt
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
36bd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts 36bd.exe -
Executes dropped EXE 4 IoCs
Processes:
36bd.exe36bd.exe36bd.exemtv.exepid process 4068 36bd.exe 1456 36bd.exe 3760 36bd.exe 3536 mtv.exe -
Loads dropped DLL 33 IoCs
Processes:
regsvr32.exe36bd.exerundll32.exerundll32.exepid process 1548 regsvr32.exe 3760 36bd.exe 2028 rundll32.exe 3456 rundll32.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe 3760 36bd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B2EEF308-7B8A-4274-804F-D4433968632D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B2EEF308-7B8A-4274-804F-D4433968632D}\ regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
rundll32.exerundll32.exe36bd.exedescription ioc process File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 36bd.exe -
Drops file in System32 directory 19 IoCs
Processes:
rundll32.exerundll32.exemtv.exedescription ioc process File opened for modification C:\Windows\SysWOW64\353r.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\36be.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\b33o.dlltmp rundll32.exe File created C:\Windows\SysWOW64\0288 rundll32.exe File opened for modification C:\Windows\SysWOW64\4bl4.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\c6cb.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\b3rc.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\b33d.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\bba6.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\c6cb.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\c35s.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\353r.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\36bd.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\s.exe mtv.exe File opened for modification C:\Windows\SysWOW64\3ce8.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\4bl4.dlltmp rundll32.exe File created C:\Windows\SysWOW64\27-7980-59 rundll32.exe File opened for modification C:\Windows\SysWOW64\36ud.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\b33o.dll rundll32.exe -
Drops file in Windows directory 13 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\cd4d.flv rundll32.exe File opened for modification C:\Windows\b5b3.bmp rundll32.exe File opened for modification C:\Windows\cd4u.bmp rundll32.exe File opened for modification C:\Windows\b3cd.exe rundll32.exe File opened for modification C:\Windows\436b.flv rundll32.exe File opened for modification C:\Windows\80a.bmp rundll32.exe File opened for modification C:\Windows\d48d.exe rundll32.exe File opened for modification C:\Windows\3cdd.flv rundll32.exe File created C:\Windows\Tasks\ms.job rundll32.exe File opened for modification C:\Windows\480.exe rundll32.exe File opened for modification C:\Windows\d48.flv rundll32.exe File opened for modification C:\Windows\0acu.bmp rundll32.exe File opened for modification C:\Windows\cd4d.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 47 IoCs
Processes:
regsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\ = "CFffPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\TypeLib\ = "{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\VersionIndependentProgID\ = "BHO.FffPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\InprocServer32\ = "C:\\Windows\\SysWow64\\b33o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\CLSID\ = "{B2EEF308-7B8A-4274-804F-D4433968632D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\ = "CFffPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\ProgID\ = "BHO.FffPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CLSID\ = "{B2EEF308-7B8A-4274-804F-D4433968632D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer\CurVer\ = "BHO.FffPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\b33o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\ = "IFffPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\ = "CFffPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.FffPlayer.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\ = "IFffPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{62E1E4EF-5B18-4DDD-84BC-AD908FEC79A1}\TypeLib\ = "{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B2EEF308-7B8A-4274-804F-D4433968632D}\TypeLib\ = "{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C86BE97D-1F23-4C7D-A4FB-C5289FA9663F}\1.0\0\win32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
36bd.exepid process 3760 36bd.exe 3760 36bd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
mtv.exepid process 3536 mtv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
rundll32.exerundll32.exe36bd.exedescription pid process target process PID 4804 wrote to memory of 2436 4804 rundll32.exe rundll32.exe PID 4804 wrote to memory of 2436 4804 rundll32.exe rundll32.exe PID 4804 wrote to memory of 2436 4804 rundll32.exe rundll32.exe PID 2436 wrote to memory of 2268 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 2268 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 2268 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 2044 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 2044 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 2044 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 2792 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 2792 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 2792 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 5032 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 5032 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 5032 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 1548 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 1548 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 1548 2436 rundll32.exe regsvr32.exe PID 2436 wrote to memory of 4068 2436 rundll32.exe 36bd.exe PID 2436 wrote to memory of 4068 2436 rundll32.exe 36bd.exe PID 2436 wrote to memory of 4068 2436 rundll32.exe 36bd.exe PID 2436 wrote to memory of 1456 2436 rundll32.exe 36bd.exe PID 2436 wrote to memory of 1456 2436 rundll32.exe 36bd.exe PID 2436 wrote to memory of 1456 2436 rundll32.exe 36bd.exe PID 3760 wrote to memory of 2028 3760 36bd.exe rundll32.exe PID 3760 wrote to memory of 2028 3760 36bd.exe rundll32.exe PID 3760 wrote to memory of 2028 3760 36bd.exe rundll32.exe PID 2436 wrote to memory of 3536 2436 rundll32.exe mtv.exe PID 2436 wrote to memory of 3536 2436 rundll32.exe mtv.exe PID 2436 wrote to memory of 3536 2436 rundll32.exe mtv.exe PID 2436 wrote to memory of 3456 2436 rundll32.exe rundll32.exe PID 2436 wrote to memory of 3456 2436 rundll32.exe rundll32.exe PID 2436 wrote to memory of 3456 2436 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa25aeece8408ff347245de865937571_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa25aeece8408ff347245de865937571_JaffaCakes118.dll,#12⤵
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/4bl4.dll"3⤵
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/c6cb.dll"3⤵
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/353r.dll"3⤵
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b33o.dll"3⤵
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/b33o.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\system32/36bd.exe -i3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\system32/36bd.exe -s3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exeC:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/36be.dll, Always3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\SysWOW64\36bd.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/36be.dll,Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dllFilesize
103KB
MD5428b16d93073d170c2e64c3bcdceadd2
SHA157ac436468862f595c5b7606e62bef65038bf29e
SHA25615f93e203c0890f77b998fbd05c42991b3b0dc1221e67ff11a545549802a7748
SHA5126348ceb9fcce54510ff7c87f3741d672ca36a259a943f26828f3586c90f09917b70134a0fbf5232933dc8a435f5e6c7295369b407ea34a8ff2159e48f045d768
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exeFilesize
92KB
MD5bb2485769fdeffac518c8ae204416a7a
SHA1a41fdea05b6a9b287c7bf854464e398d848eb7e3
SHA256ea958a23d4a5c5be4321002af31ae95de1c1398da6881e2aa8933ba0b03f0bc1
SHA5121e7d36958ab38c11b830a89ab6969126d183a54bc6d07dcec0e3f776b595db24e91b6e4c8120ac6b4edb3e9fedab447c33653001975c0f5b51655761cc740b8f
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dllFilesize
489KB
MD5e42367274f8ee73479b303b70a8446d0
SHA13c68ce1cc50e4a8d0c227c0bff799b4a84bb1a0b
SHA25682c08f3ee03a1fe9ea4e1aac22d3549be77d263eace18805d77116b4bc06f9ea
SHA51291c6486931a17f436d508e093c754589ef8cfe1411dcad1308814db4c0a599dc4b25618c090361de6f5ceaaee880bf9f05e7f3a012b35efb4b52e7360f0dc4fc
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\s.exeFilesize
176KB
MD55603fb6d4561416b9579fea25f826f8d
SHA10f2da1544930ce34d2e36f8af89320f1a7a20216
SHA256216b0b65e0a367c12b6251027e75df9445eddd8821c376019053c395327e7198
SHA512e017eaef1cda9eff52685320c9d84a8f46a660ae2a1092444e10da2bbc8aab7d3a315605abdceee05519a48bbaa72da209fad79293d8d0c8b5e837da34da3631
-
C:\Windows\Temp\tmp.exeFilesize
140KB
MD54894817ddf40549627acb62660050f0d
SHA11729959706cd575d164c6be3b85579fd6ee4f430
SHA2566c994e71a91dc2b4071ccc513a06517d54226410a6c900b660e697f28db8ef6f
SHA512b9424100bddb938b905c95f4528e8aca727c6376962f4c43811532be93be34dd6be49b97c742d9f6b1a74ee4c883216d37f9487145de0d032013a7b452d3382d
-
memory/1548-58-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/1548-59-0x00000000009B0000-0x00000000009B2000-memory.dmpFilesize
8KB
-
memory/2436-0-0x0000000010000000-0x0000000010079000-memory.dmpFilesize
484KB
-
memory/2436-1-0x00000000025C0000-0x00000000025C2000-memory.dmpFilesize
8KB
-
memory/3760-140-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-150-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-108-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-109-0x0000000000520000-0x0000000000522000-memory.dmpFilesize
8KB
-
memory/3760-111-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-112-0x0000000000C80000-0x0000000000C82000-memory.dmpFilesize
8KB
-
memory/3760-114-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-115-0x0000000000C90000-0x0000000000C92000-memory.dmpFilesize
8KB
-
memory/3760-118-0x0000000000CA0000-0x0000000000CA2000-memory.dmpFilesize
8KB
-
memory/3760-117-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-121-0x0000000000CB0000-0x0000000000CB2000-memory.dmpFilesize
8KB
-
memory/3760-120-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-123-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-124-0x0000000000E50000-0x0000000000E52000-memory.dmpFilesize
8KB
-
memory/3760-126-0x0000000000E60000-0x0000000000E62000-memory.dmpFilesize
8KB
-
memory/3760-128-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-129-0x0000000000E70000-0x0000000000E72000-memory.dmpFilesize
8KB
-
memory/3760-131-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-132-0x0000000000E80000-0x0000000000E82000-memory.dmpFilesize
8KB
-
memory/3760-134-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-135-0x0000000000E90000-0x0000000000E92000-memory.dmpFilesize
8KB
-
memory/3760-138-0x0000000000EA0000-0x0000000000EA2000-memory.dmpFilesize
8KB
-
memory/3760-137-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-74-0x0000000000510000-0x0000000000512000-memory.dmpFilesize
8KB
-
memory/3760-141-0x00000000012C0000-0x00000000012C2000-memory.dmpFilesize
8KB
-
memory/3760-143-0x00000000012D0000-0x00000000012D2000-memory.dmpFilesize
8KB
-
memory/3760-145-0x00000000012E0000-0x00000000012E2000-memory.dmpFilesize
8KB
-
memory/3760-147-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-148-0x00000000012F0000-0x00000000012F2000-memory.dmpFilesize
8KB
-
memory/3760-73-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-151-0x0000000001300000-0x0000000001302000-memory.dmpFilesize
8KB
-
memory/3760-153-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-154-0x0000000001310000-0x0000000001312000-memory.dmpFilesize
8KB
-
memory/3760-157-0x0000000001320000-0x0000000001322000-memory.dmpFilesize
8KB
-
memory/3760-156-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-159-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-160-0x0000000001330000-0x0000000001332000-memory.dmpFilesize
8KB
-
memory/3760-162-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-163-0x0000000001340000-0x0000000001342000-memory.dmpFilesize
8KB
-
memory/3760-166-0x0000000001350000-0x0000000001352000-memory.dmpFilesize
8KB
-
memory/3760-165-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-168-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-169-0x0000000001360000-0x0000000001362000-memory.dmpFilesize
8KB
-
memory/3760-171-0x0000000001370000-0x0000000001372000-memory.dmpFilesize
8KB
-
memory/3760-173-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-174-0x0000000001380000-0x0000000001382000-memory.dmpFilesize
8KB
-
memory/3760-176-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-177-0x0000000001390000-0x0000000001392000-memory.dmpFilesize
8KB
-
memory/3760-178-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-181-0x00000000013A0000-0x00000000013A2000-memory.dmpFilesize
8KB
-
memory/3760-180-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-183-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-184-0x0000000000CC0000-0x0000000000CC2000-memory.dmpFilesize
8KB
-
memory/3760-186-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-187-0x0000000000CD0000-0x0000000000CD2000-memory.dmpFilesize
8KB
-
memory/3760-189-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/3760-190-0x0000000000CE0000-0x0000000000CE2000-memory.dmpFilesize
8KB