Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
4f9fc7ffc48e4051b8eb52a5f113ba1c_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
4f9fc7ffc48e4051b8eb52a5f113ba1c_JaffaCakes118.exe
-
Size
571KB
-
MD5
4f9fc7ffc48e4051b8eb52a5f113ba1c
-
SHA1
082179f858d5de656280d0347684af0f97bd4062
-
SHA256
6bb7ad593e18dc28620551328658c9d986ac7afe44aaf5cacb140fa6fe686bca
-
SHA512
9d09c11642ac53ef4bbf66691b37f94a557e2e0018b4c2a8f0e1a98aae377fa6b0b2e1133d1033d8a63d655e5a0d3af19ced4416b31ea8ca14cabaa65c990f97
-
SSDEEP
12288:CT7JDjN1yH6HE3P1xU5eJX/5rlprfxRVj7ELrUMI6L:CTu6qxUU9FhWUMd
Malware Config
Extracted
gozi
-
build
214082
Extracted
gozi
3381
microsoft.com
update.microsoft.com
avast.com
f4859della.info
z89p68modesta.top
g54fz534ci.xyz
-
build
214082
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31107144" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{974636A2-143B-11EF-B541-7AB71B943571} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d5b14faf460f94697b58b95a53f8d1400000000020000000000106600000001000020000000e6a7bbaa9048e6d8c24b2bb5a677e87dea415bb5d0545eb163300604d8d1cc67000000000e80000000020000200000001178e65855ccdf6b746450c31e25cae0ed795fab635712d043c78c3f8eb99f1f200000006235350ad16efdc677433055caae3e1abd8197a6f4aada81b91f03a33149658640000000c7742adfa581338204c04a1151d2e966a369324560add2afef161d8a9b5ceb6ca312bf8ae3b2f73aca3c42f9bf971d6f86a58f63c4fc3152aae6802dfea1f0c3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d5b14faf460f94697b58b95a53f8d14000000000200000000001066000000010000200000006d2142059fcf1796ab4c3a60ef28e9cd34c695a04079467f69abf677b1c4c389000000000e800000000200002000000000a03c313e6e7e5019a61b930ff16c99b53122b16c0fa61b9e23a922c823d28620000000a1073f36f99d93c67dd03883d82c7d455df7d386ee80a0ed6d6911250d5e35b7400000002d297973efbe016ff78524684d5c358c5cc464dd5ff9f76227f9eb1804fd6e655fd47c1aeda7161c652fd938876257fa57abcb6735a234b2b07fe2831934251f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d3853748a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7B808E7A-143B-11EF-B541-7AB71B943571} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50da4a4048a8da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A45BFE02-143B-11EF-B541-7AB71B943571} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\avast.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "820741855" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5C84F6EF-143B-11EF-B541-7AB71B943571} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d5b14faf460f94697b58b95a53f8d14000000000200000000001066000000010000200000005ffb2fba63a27dae9f2d37c36bb47d187523c9d9d1349fcb0cb74eb319d65710000000000e8000000002000020000000758094be9d2968293233aca7ae88f2e3e6bc3a27c5e65e28353bc3df97bd3ece200000003d9110fc5b4dd64a180ad8609382e5a00ca63be5291f19a21964ada36dd1daa140000000547066e23db77b8eb361bab95c351c9948263ad09263ca4ffee4e429d420e1b8870a2166ae65e197f0e5107fabcd73b4a570014e007335cb20a2831b4a557e4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\www.avast.com\ = "17" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\avast.com\Total = "17" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{8A3EBE07-143B-11EF-B541-7AB71B943571} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "820741855" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01e705a48a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001d5b14faf460f94697b58b95a53f8d140000000002000000000010660000000100002000000093986649d03809f943f91e098912637f23873c44623e81a53742f8fedf84dc4a000000000e8000000002000020000000ab66dadcfd725f7e849a4d24823969a279cf9fecd187852297308e09f0daff3e20000000f0dbab5447d6ee7483d1dada0d855d53bf96379cc5e562e5c62af21a421e74d040000000e6d7cbbe5aa8a9fae93c8db6674f9daff6e2967ae657478017c653afc91c63b6b6357109b26f72116636107713bef44922f39d091052674cd0ed351a9445c455 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 1044 iexplore.exe 2800 iexplore.exe 1536 iexplore.exe 4980 iexplore.exe 5028 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 1044 iexplore.exe 1044 iexplore.exe 544 IEXPLORE.EXE 544 IEXPLORE.EXE 2800 iexplore.exe 2800 iexplore.exe 1004 IEXPLORE.EXE 1004 IEXPLORE.EXE 1536 iexplore.exe 1536 iexplore.exe 212 IEXPLORE.EXE 212 IEXPLORE.EXE 4980 iexplore.exe 4980 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 5028 iexplore.exe 5028 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 1044 wrote to memory of 544 1044 iexplore.exe IEXPLORE.EXE PID 1044 wrote to memory of 544 1044 iexplore.exe IEXPLORE.EXE PID 1044 wrote to memory of 544 1044 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 1004 2800 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 1004 2800 iexplore.exe IEXPLORE.EXE PID 2800 wrote to memory of 1004 2800 iexplore.exe IEXPLORE.EXE PID 1536 wrote to memory of 212 1536 iexplore.exe IEXPLORE.EXE PID 1536 wrote to memory of 212 1536 iexplore.exe IEXPLORE.EXE PID 1536 wrote to memory of 212 1536 iexplore.exe IEXPLORE.EXE PID 4980 wrote to memory of 2052 4980 iexplore.exe IEXPLORE.EXE PID 4980 wrote to memory of 2052 4980 iexplore.exe IEXPLORE.EXE PID 4980 wrote to memory of 2052 4980 iexplore.exe IEXPLORE.EXE PID 5028 wrote to memory of 2844 5028 iexplore.exe IEXPLORE.EXE PID 5028 wrote to memory of 2844 5028 iexplore.exe IEXPLORE.EXE PID 5028 wrote to memory of 2844 5028 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f9fc7ffc48e4051b8eb52a5f113ba1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4f9fc7ffc48e4051b8eb52a5f113ba1c_JaffaCakes118.exe"1⤵PID:5052
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2616
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:544
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1004
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1536 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:212
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4980 CREDAT:17410 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:2052
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5028 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5f646488e081a5c175ce1fb03ba482264
SHA127f7ff92f2b9808c9b998f87ad5b03057ebab12c
SHA256e6312e65983df0745340cf492de216be2cf14f34ceba56a53b26a5f196c31f8f
SHA5122cf3f2f8b2858a66c1eba71235fa0349c3335af4c18967951e086e9e9c87ba4028b1c1bde4c5657deda07d2f4e0cc2cf7ac5c965d8b3a35aed8f18e2beb5676a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04Filesize
471B
MD5102c59efafbf6d59da6d256bfdd7a829
SHA148f9f758805fa34a8356a1386672007d4e1d637f
SHA256d0d9a1571cbc6bc45de58b4cb30ced39684ee19848ff5ebbc814ac4e9db9d609
SHA512f59d0d8ab47a665bd3ec662319ea1ec49e08941823138513e3be24b7c95df780801adffb8749c3bc00657e0f60928db81c8b4307ad7c673c8b514fdf1c8086ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD5f93911cedd62ef2e6a51e613c19adef3
SHA1eff6d34e9cc51260de019f3f8e4b6c8a0943192c
SHA2568a64314bbce79095944fb211a5389bc26a989a58e8850bbd233454e3c94317ce
SHA5120f31cbcee7a22452ef62cfd311bb7ab9ba928776d1c6cfa06c515387003f4927e400a775a023bb4fc816f35619543be59129570b67bae03b71a06c1473b550bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04Filesize
400B
MD54773acc1a6adcc68caaa350ce0bc6ee5
SHA11cb787f9186ee989eb49706b3bb461d72ff0f86e
SHA256a067cf75414000380c330226be5dbf0989dd7c0f04dffe970cd0c5a2f2afac06
SHA512446c114d55da1ddcd6beb4f645ddfe9b1c935eae4003fd1e5e6cfd8d8ecc1a57a3b2dde14c73c54d6ae16928b8bf78a062cc71a9f53c518e171efd9ed8f93a97
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3qb0obk\imagestore.datFilesize
8KB
MD5b04e763b21c19dd2336ec99460895e86
SHA17a8a3ec2d7f79bcf4e3cd18abbe988f71103be86
SHA256990874c05689a00034e4202118197b452259f752d398008498ddcead60b6333e
SHA512d9119ec11ff79809ff11f132085d93022c5b1a29cb184780632e10b93a35d87dac478a3ea7b2537965d14de41923784d2a80e86e45daa1a3958430e49d9c9456
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GO42234Z\favicon[1].icoFilesize
7KB
MD5be87fd81ff4e82e7ed57b0c8951c66d0
SHA14a918234d3225b585dffb7b6d587acb3fbb39618
SHA256637b67152dba0b0b33c8aadb38ea7c86b7a12b37366c7183f898c36c222b04fd
SHA51287ec908135335b4074d412b04188bf05d00f468400d2837ba2ca1c77440b6f2f15ba648f2a8f42b1301d77df54bf2a00e59416942807ccd90e36f59431638de7
-
C:\Users\Admin\AppData\Local\Temp\~DF3BC57508BC4BAEDC.TMPFilesize
16KB
MD56e46041fb31418622ccabe10b2ba5bee
SHA1f547c8a0457371729def7998d6facb7eb527b047
SHA2560277e65eb5a47deb0d3201289d796523a41e2264256cec00f200e32b9d31d653
SHA51283bc3e81359d8540a0c3a0c48e35e85cb72e8c32ee7a18474662efe5bc659b23ce98a3a38a4e9c1bfd0627847828323676051fd11a960afefaa03501e3f6202c
-
memory/5052-4-0x0000000000E40000-0x0000000000E4F000-memory.dmpFilesize
60KB
-
memory/5052-50-0x0000000000E60000-0x0000000000F04000-memory.dmpFilesize
656KB
-
memory/5052-2-0x0000000000EC5000-0x0000000000ECA000-memory.dmpFilesize
20KB
-
memory/5052-3-0x0000000000E60000-0x0000000000F04000-memory.dmpFilesize
656KB
-
memory/5052-0-0x0000000000E60000-0x0000000000F04000-memory.dmpFilesize
656KB
-
memory/5052-1-0x0000000000E60000-0x0000000000F04000-memory.dmpFilesize
656KB