Malware Analysis Report

2024-08-06 15:22

Sample ID 240517-h99s7afd8x
Target 4ef8c811942ba75289752b682e58521f_JaffaCakes118
SHA256 6e148ffeeef18400d407754261753dcce032a386a0f9a23ca9f7479571c0db01
Tags
nanocore evasion keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6e148ffeeef18400d407754261753dcce032a386a0f9a23ca9f7479571c0db01

Threat Level: Known bad

The file 4ef8c811942ba75289752b682e58521f_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

nanocore evasion keylogger persistence spyware stealer trojan

NanoCore

Adds Run key to start application

Checks whether UAC is enabled

Suspicious use of SetThreadContext

Drops file in Program Files directory

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-17 07:27

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-17 07:27

Reported

2024-05-17 07:29

Platform

win7-20240508-en

Max time kernel

148s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LAN Service = "C:\\Program Files (x86)\\LAN Service\\lansv.exe" C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\LAN Service\lansv.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\LAN Service\lansv.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 1960 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 2592 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2592 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "LAN Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3006.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "LAN Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3093.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
NL 212.7.208.94:3413 tcp
NL 212.7.208.94:3413 tcp
NL 212.7.208.94:3413 tcp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
NL 212.7.208.94:3413 tcp
NL 212.7.208.94:3413 tcp
NL 212.7.208.94:3413 tcp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp

Files

memory/1960-0-0x00000000748A1000-0x00000000748A2000-memory.dmp

memory/1960-1-0x00000000748A0000-0x0000000074E4B000-memory.dmp

memory/1960-2-0x00000000748A0000-0x0000000074E4B000-memory.dmp

memory/1960-3-0x00000000748A0000-0x0000000074E4B000-memory.dmp

memory/2592-5-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2592-6-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2592-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2592-12-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2592-10-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2592-8-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2592-19-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2592-17-0x0000000000400000-0x0000000000438000-memory.dmp

memory/1960-20-0x00000000748A0000-0x0000000074E4B000-memory.dmp

memory/2592-21-0x00000000748A0000-0x0000000074E4B000-memory.dmp

memory/2592-23-0x00000000748A0000-0x0000000074E4B000-memory.dmp

memory/2592-22-0x00000000748A0000-0x0000000074E4B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp3006.tmp

MD5 a5d3dc95b301d039fe4b1bc6aba96a9c
SHA1 2fba506bb6cac68361f9e3fb2acffd23dc83a971
SHA256 5399e7f1f6618e6773652e13e5e4c0958842ad53dfcf3cf1c5a07b8ad525925f
SHA512 e1b3d66950c41407e4c48388c4c5168593df6b9cec561d8a5806cc9df19befc2ac329200a7e6a3eaf3a472d7d912c99b461e450c0b2a39e5695c5c04122597aa

C:\Users\Admin\AppData\Local\Temp\tmp3093.tmp

MD5 6b30dba7972c92c9a1b881e88c108b15
SHA1 f76207985cc5a1f70edb2fb5bd45678f195a4564
SHA256 578f5b0ff051f02f8e0a67fc3424dad554fa9489875475ea624fbb63eabfcbf7
SHA512 e3dd368937f863cb07453de12173580fb63b8d3983db7119c24860f227c89ded76401c47607f5b1134d215d46fe2b40d4bc3d7299374f1e8abecdeaefc7b9099

memory/2592-31-0x00000000748A0000-0x0000000074E4B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-17 07:27

Reported

2024-05-17 07:29

Platform

win10v2004-20240426-en

Max time kernel

140s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe"

Signatures

NanoCore

keylogger trojan stealer spyware nanocore

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Service = "C:\\Program Files (x86)\\DPI Service\\dpisvc.exe" C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\DPI Service\dpisvc.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A
File opened for modification C:\Program Files (x86)\DPI Service\dpisvc.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5016 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 5016 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 5016 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 5016 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 5016 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 5016 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 5016 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 5016 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe
PID 2968 wrote to memory of 4084 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2968 wrote to memory of 4084 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2968 wrote to memory of 4084 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2968 wrote to memory of 1668 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2968 wrote to memory of 1668 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe
PID 2968 wrote to memory of 1668 N/A C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe C:\Windows\SysWOW64\schtasks.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe"

C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\4ef8c811942ba75289752b682e58521f_JaffaCakes118.exe"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DPI Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3817.tmp"

C:\Windows\SysWOW64\schtasks.exe

"schtasks.exe" /create /f /tn "DPI Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp3980.tmp"

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.179:443 www.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 179.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
NL 23.62.61.179:443 www.bing.com tcp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
NL 212.7.208.94:3413 tcp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
NL 212.7.208.94:3413 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
NL 212.7.208.94:3413 tcp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
NL 212.7.208.94:3413 tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
NL 212.7.208.94:3413 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
NL 212.7.208.94:3413 tcp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
US 8.8.4.4:53 smito.ddns.net udp
US 8.8.8.8:53 smito.ddns.net udp
NL 212.7.208.94:3413 tcp

Files

memory/5016-0-0x0000000074682000-0x0000000074683000-memory.dmp

memory/5016-1-0x0000000074680000-0x0000000074C31000-memory.dmp

memory/5016-2-0x0000000074680000-0x0000000074C31000-memory.dmp

memory/5016-3-0x0000000074680000-0x0000000074C31000-memory.dmp

memory/2968-4-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2968-6-0x0000000000400000-0x0000000000438000-memory.dmp

memory/2968-5-0x0000000000400000-0x0000000000438000-memory.dmp

memory/5016-9-0x0000000074680000-0x0000000074C31000-memory.dmp

memory/2968-11-0x0000000074680000-0x0000000074C31000-memory.dmp

memory/2968-10-0x0000000074680000-0x0000000074C31000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp3817.tmp

MD5 a5d3dc95b301d039fe4b1bc6aba96a9c
SHA1 2fba506bb6cac68361f9e3fb2acffd23dc83a971
SHA256 5399e7f1f6618e6773652e13e5e4c0958842ad53dfcf3cf1c5a07b8ad525925f
SHA512 e1b3d66950c41407e4c48388c4c5168593df6b9cec561d8a5806cc9df19befc2ac329200a7e6a3eaf3a472d7d912c99b461e450c0b2a39e5695c5c04122597aa

C:\Users\Admin\AppData\Local\Temp\tmp3980.tmp

MD5 0d6d94a917c4ce63da6bc50cbbe0dc5d
SHA1 599564f60649f3f4c14478e9cb184000d4280a61
SHA256 e82a4b8311319f1b68cb06ae5b670e97a11c467b1bdb0ebf130f523bf98ca522
SHA512 23ac6a088e2a1df3d75d2aca17cdcc5a4147b966758e4acc4d904293f4693f362db637d8135edd670e158bec77e788e915f2a55042a2f1aec09a4679bc749412

memory/2968-19-0x0000000074680000-0x0000000074C31000-memory.dmp

memory/2968-20-0x0000000074680000-0x0000000074C31000-memory.dmp

memory/2968-21-0x0000000074680000-0x0000000074C31000-memory.dmp