Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-04-2024 09:07
Static task
static1
Behavioral task
behavioral1
Sample
007041eaa8e2275ffc6a60d623bd361d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
007041eaa8e2275ffc6a60d623bd361d_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
007041eaa8e2275ffc6a60d623bd361d_JaffaCakes118.html
-
Size
159KB
-
MD5
007041eaa8e2275ffc6a60d623bd361d
-
SHA1
8eec98b0a72091753c9dbd6f72405908f026da75
-
SHA256
22b0143fce9e963aeb80631fd75bff8c4fce44af98e680dd671a7042ea02804a
-
SHA512
476f9efb69f29251428bd414aa96a061bbeed28a505f2a7e404879db36280d34f4c6c82b4bb11d929eba8d3b4eaa94200064e2619f66af630eddec929a05ecf1
-
SSDEEP
3072:iBSrifK8OG7FyfkMY+BES09JXAnyrZalI+YQ:i0qKWwsMYod+X3oI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 2224 svchost.exe 2036 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2700 IEXPLORE.EXE 2224 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2224-480-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2224-483-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2036-492-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2036-493-0x0000000000230000-0x000000000023F000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px7704.tmp svchost.exe -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420284324" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B4C8D61-03AC-11EF-989B-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 2036 DesktopLayer.exe 2036 DesktopLayer.exe 2036 DesktopLayer.exe 2036 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 1708 iexplore.exe 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1708 iexplore.exe 1708 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 1708 iexplore.exe 1708 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 1708 wrote to memory of 2700 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2700 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2700 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2700 1708 iexplore.exe IEXPLORE.EXE PID 2700 wrote to memory of 2224 2700 IEXPLORE.EXE svchost.exe PID 2700 wrote to memory of 2224 2700 IEXPLORE.EXE svchost.exe PID 2700 wrote to memory of 2224 2700 IEXPLORE.EXE svchost.exe PID 2700 wrote to memory of 2224 2700 IEXPLORE.EXE svchost.exe PID 2224 wrote to memory of 2036 2224 svchost.exe DesktopLayer.exe PID 2224 wrote to memory of 2036 2224 svchost.exe DesktopLayer.exe PID 2224 wrote to memory of 2036 2224 svchost.exe DesktopLayer.exe PID 2224 wrote to memory of 2036 2224 svchost.exe DesktopLayer.exe PID 2036 wrote to memory of 1596 2036 DesktopLayer.exe iexplore.exe PID 2036 wrote to memory of 1596 2036 DesktopLayer.exe iexplore.exe PID 2036 wrote to memory of 1596 2036 DesktopLayer.exe iexplore.exe PID 2036 wrote to memory of 1596 2036 DesktopLayer.exe iexplore.exe PID 1708 wrote to memory of 2600 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2600 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2600 1708 iexplore.exe IEXPLORE.EXE PID 1708 wrote to memory of 2600 1708 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\007041eaa8e2275ffc6a60d623bd361d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:668677 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD500c9c695818d737d74f976cd2a0270ee
SHA1ce44915122b76ad92d34c9bc5004a82b21b4606a
SHA2567fc95bd0c7b141e7b04a4daf8d5cc930964f92036e342441da3738bb05096163
SHA5121744d3ec1d10228acbb996a668e9973a7ae730fb4e71c3fe376fd145d77aa659850ae1b88f9e3e910667ca55e3fc4265adf449594d27fcee18587aee1bf122f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5aff087b588998c4caa2e62e5e83343d9
SHA1b6d981836edaa3399b1c7a9d8c6ae145d64b2ddc
SHA256a7523ea98ededf84db1421632a4f1a15801d20c6508668f35b57a455bcadb241
SHA51237a741879e631802106a958e1de6d8ec3eecdee5ea13be6504c5bdfe543fd8e04d8db2151b269584509d4b315e147bf0a686d8b563ee2f0a53a20a44c2326239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59e3f4802ecf5e05c3b654edb0539250f
SHA1d4d10214da93063668309b8e63fb78cc8c52e7da
SHA2564bb2292df434f30bcb8f84584f76160f4b133313a2ba8619f625703a818a45dd
SHA5123ce9d8b61254f4c9af2de6738b9ffaedcff3f5fbe4fc9a666fdacbdf58291b843503f63cf8f07e4bd1281f7cab2b068eb342116f3252ab1d3ee5b75713769464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55765bcf8ff2c19b245260905a448e352
SHA1c93ea5a3fbe5a9bf5bbb2f77785ea828a29bb3b3
SHA2569cadd6bd60219ecf0859e478dc1dba96863b1ad7142b1d3ada21efd69f97bf84
SHA512bdc2cea81ac490a1cf2b7ef402941053ad4c3771f06639bbb69993cd7056b1d2e3e83394e84148de7cfbc112d3f06e7f7fcf288fc7f0884e92268bb3835dae59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59f237d1480bd9ca14f9ab8fa7cc71f72
SHA1c07e9413d037be0fdabf23435e080b6e03f65bae
SHA25655257792ca0e781bb5f88dadedcccb42076d7a99e8875a774a60481786aa1aa2
SHA5126cc064ba01fa539b998c010faffd2354381fc3660da9e1a6440630a4b1cae55e84f1e766135dfec4f1d514e837f4e2c10082feac375395449b6cdf9cd66f1d79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5ee74b5c86556492d4f9b2dcffa2d60b8
SHA12b2992c41c1caba9d08d5a236c72a35c260b1e13
SHA256d61d9c7ec1b4c48aa84925376b1e397cc05743252ad970ae10017252716e8406
SHA512d95139aa7f41d2126b47ac94e850419fa4d5cd8a90be2fc8b7346531e95d1b5e43490997b6f0e5869bf2c17bf800c69b309429fc1ba3426347a8519d7b9646de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a3f5a692b3fb489409ce3ef17d05b5e0
SHA14ce8eae6edb59e3622ebb7a49978c1b5df33c91b
SHA2565d7f2178891b0e0e58949a8f19f03fa704cde536c4fd332eb57141cc91e8793a
SHA51242b60bc5b6510019ef60ed6e69b182c9f41f0c9e92c00ba52bd7c86c3c9c712f6c6c087de09df81d1df3afaa2d035a65776fbdbf1c157aa0c1458ad2373a5ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59b05fe2c8f31e001491efc1bda78d4f0
SHA148aed6d355d999ad72723a0a0a13493d47ca9586
SHA256166e92fceff226509cf2d756e45f10bc74a93d8172f857bb22f45f49ad3e5c57
SHA512471b3c4b15b08380c7e34fea6e3c5d9e54914e86af7ed8577098945747883ab1dacf5c4489531fcece7c75c2104abe50be2d5a3d0450c8e8e812cfc73d427f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD569c1a0a7e2bfd106fb22f13c443de399
SHA1082d29d24c0127cc4430b333341808ded32b390a
SHA2565b873e9c8216b9290798b70c57054b583d10df49b301234d8fb67d5c15a23a13
SHA5128588bfa6a0ab352945d0f0b228d48d39f8b5024a6276d863e1df8b3c2d86c414465c1d4b0b615e9a8ce10083d637dd97fc40ea51bbf630c0856151e815e817e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD591ec2b9a2d33b8640eab3d5e48ef9633
SHA1d26310551a1a4f99d3d6928fe75614f038097fae
SHA256178f70858b604298c9775e0d20e92f11614d4dc2b062a58d8f01861c7cdc5d09
SHA512b5c744c3016a2164bb89006af95aaf2df350363667810e5fb9ea21c0a7592ab00ecc2cb68b95d54325005c5524ad0ad28f945773fda315783ef9fc5a0061b53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54e66ee527568b88c9969d436e70dbdf7
SHA12bb89bbaadd63a653b7cbb62024108ac8bf96353
SHA256fbd6b5c5b1b69219516fa2694dbba24ee7f2bba0aa7133f84cdf454d2baab2b2
SHA51276737974e47b097d266168b752680f25cc4c46d6d583b0f0e1fe465ee66640c0b7194574df83d29ad703cd87f02c67463d2d27a67de1f55ece6ee84e5cd6b7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD560b7c8c18c254570447426f3d1f1c4d0
SHA172dfb86296e680e0051477eb526914170e9eda04
SHA2565862de8a27531149388421dc393c3e070bb0498fdb21c97f701a2a9f6bf35423
SHA512f3bd23467f6896365919d61be54d6e67fbc7d555e8ad4c30d61f9d16f3ef288217a3a12939c160d883b8cf3469ffdc1551f012046f89961ced46d419f7e3b593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54f17401571ddf060dbbf25e2f7e57926
SHA119158a753a2c059d43047d10b184564f4b1f6b7e
SHA25638fcfc14571e4b1678d8ce80740b25166d1f5b54046859f1209f63403684d8e9
SHA51200be6fc7a1ad7815f324b75433d133c0baf5322cefead82913c752925e33e2baa218dbfbcef2028f2f3d2df46e0da7f516459fd51d96bbc92ca1fe3679a4049c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53f66f34e30198dc60c238b4ab0493785
SHA1f889e28a1be4cabf9d3b683974635193920cd52d
SHA2565c767b91b5998a5cdb29694274b1b36ecd568f82872fabc3beb38cd031e20b8f
SHA512ef66138c387b038ff24e8533a44a1d09921e2c671a80d1d8afbf5d18600ede063cf4c9af1d82799c786acf07dec5f08bf2cd5611f877de17da7cd8eba1936041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54b3ceb35dae17b4b1bfd23b5832d9b01
SHA1e7a1db788214722e3bc53edc6c939c7434ccd030
SHA2560f941830c32444f8704e16a2f9772ac981488a1febdd151e93e5bfbbf3f4e37c
SHA512ae1864eea05b9f9591eb8f212cf733d1c7737c77ce9ec8d9c72bf371e17d8980e2323970252197fc131cb7a7ee2bd2d057bd605330396a59a5ad935ef4ff4bbe
-
C:\Users\Admin\AppData\Local\Temp\Cab9187.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar9288.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/2036-491-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2036-493-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/2036-492-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2036-975-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/2224-484-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/2224-483-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2224-480-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB