Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:31
Static task
static1
Behavioral task
behavioral1
Sample
6901e71354280138737dcd6edfd41fea_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6901e71354280138737dcd6edfd41fea_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6901e71354280138737dcd6edfd41fea_JaffaCakes118.html
-
Size
158KB
-
MD5
6901e71354280138737dcd6edfd41fea
-
SHA1
f613a81e48d441cd5579a709b2459b561cd92655
-
SHA256
4b21b2fb4f0e73e4f8af9b65a21a56d8ef27221885942bbafaec0cc472ede0c6
-
SHA512
7e1719d2d8167a6b4525be63e01a29e111796e78c9b4ac5e51d713a31efa16c187c79de97b5c46d860e9f3aa11f6d5a2f5cfe986fb33938fc1591ebccad4c709
-
SSDEEP
3072:iWAtaSox/SyfkMY+BES09JXAnyrZalI+YQ:iptaSsXsMYod+X3oI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exeDesktopLayer.exepid process 2188 svchost.exe 1256 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2440 IEXPLORE.EXE 2188 svchost.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2188-480-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2188-484-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1256-492-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1256-494-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\px1249.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Processes:
IEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422582545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DC37361-1893-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
DesktopLayer.exepid process 1256 DesktopLayer.exe 1256 DesktopLayer.exe 1256 DesktopLayer.exe 1256 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2008 iexplore.exe 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2008 iexplore.exe 2008 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2008 iexplore.exe 2008 iexplore.exe 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exedescription pid process target process PID 2008 wrote to memory of 2440 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2440 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2440 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 2440 2008 iexplore.exe IEXPLORE.EXE PID 2440 wrote to memory of 2188 2440 IEXPLORE.EXE svchost.exe PID 2440 wrote to memory of 2188 2440 IEXPLORE.EXE svchost.exe PID 2440 wrote to memory of 2188 2440 IEXPLORE.EXE svchost.exe PID 2440 wrote to memory of 2188 2440 IEXPLORE.EXE svchost.exe PID 2188 wrote to memory of 1256 2188 svchost.exe DesktopLayer.exe PID 2188 wrote to memory of 1256 2188 svchost.exe DesktopLayer.exe PID 2188 wrote to memory of 1256 2188 svchost.exe DesktopLayer.exe PID 2188 wrote to memory of 1256 2188 svchost.exe DesktopLayer.exe PID 1256 wrote to memory of 1620 1256 DesktopLayer.exe iexplore.exe PID 1256 wrote to memory of 1620 1256 DesktopLayer.exe iexplore.exe PID 1256 wrote to memory of 1620 1256 DesktopLayer.exe iexplore.exe PID 1256 wrote to memory of 1620 1256 DesktopLayer.exe iexplore.exe PID 2008 wrote to memory of 1508 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 1508 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 1508 2008 iexplore.exe IEXPLORE.EXE PID 2008 wrote to memory of 1508 2008 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6901e71354280138737dcd6edfd41fea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:472080 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5af5db67003631ae6b6b9d2b554003453
SHA15a9c29c4b81f1d9ea67e2df89e3d94dcc5785d43
SHA256745e2aeb6a76cd6797f99af8213b33c7552f9e07de433c1d49098de998824ecb
SHA5120dc6aa532a0dd4d177ae4127dcf3d283eeda1f315da388a8277413d4bac792cc5476a4fee8b2a63d509f060ef19a4274e94d72f79be113d9d9f31735160f62ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5830669285eabd9d77ca8a42ae359636b
SHA1a52c28f5320ca5e06572b902d043510c9722a131
SHA256145029b2dc04573e1333a56b7f2a330bb9de1ad8a9d8bc8bf7ad72adf2a81bac
SHA512d967c3a69daa4472431a93bd994cce0f5f9f8dc215096c08515b9fb4be168edfeacf3089bb01f4ac421bc276ce5327086e58e4477df8c930ef8df7ad2c64003c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dda6d4a05cff401729aa572453f09d80
SHA1f94e6cec79fc9a116ea50bcb36ed9267291959a7
SHA256cef3d4bda65ad4629efc95af4ebb977f3526c21e4faaf69911b67c069d68d8d3
SHA5122fbacfdec1fa082bf3f926b23211b1b03ba894a70ae2300e4a6f64adf6307d07bde6ad231aa9e758410c51e514069b766b45e80c681b68f89a487627efb0250a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5282e9c460bf097099c1fd251a5b7eee9
SHA131b295bec057cddc0ea6cf7d0b23078b87a4bbb7
SHA25626004ca5c1370504475a4c223450d4edadd79fd8dceb358beb8b4d99b54540b7
SHA512d831d84c8b765c1009ec37f650f20d5a118a1b067550704330bba643e656e84c6dd8feb57fd3ad20747a52cd11cf7c4fa213cf7069882765d74176e9beea310a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD587f609bcb4897e912d5db97d2c61172f
SHA14d2dfe37a4bdca3938eb46e37b2c91d51c767fc4
SHA256f7758438ead481cc24f6be49fd2a21da5266007c2b5d5e4ff42105f46df8577d
SHA5122c4946ade97d970ebb2aeaff6a5e9f28b7bebd9525d95ff3ec314ebde8b9fefcb22caeae1240ee2e5fffdc4f09739324e9b6a63636d80cff1ee2cabbcab5856b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5757adb93b627ab7ea7168318fac37ae8
SHA19f72abdb2044f203e583bb5a668f1c2dad4a6b30
SHA256005d7aec735f02e96f4c8b5fa9345b8ce8ad44bfc07b3601398b173a96f5d4ac
SHA51292e9a033cd7a63fbddc8e54c1d599357c87c88446f138676126d2655e5492f5a5490a76a0563ebad349a046f867f9c2a96a53729f77972c5c9e071b59b14ebbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c3f53bffe752b68c5e7ca985d062b60c
SHA142341d0f1fbaffc6cc7fedf3ac74ccc7682af984
SHA25676eee1b894609a30f3da7fed0bbe978500b59ae022ab83437464a11dd2fba6e1
SHA51265b0f8a031453a88d7e887ca5a8c7321b95ceba3572f0fb98d9533e0d4d53d6a59cc5072cdf26b6a4d2fe453d0023d832e82bb5dab8bc731dec3d9e658b06394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dba4c113c9a862e5c0f48be1c6f39c55
SHA187633aa3dfed9bef248a72a0b98f0ac467849b94
SHA256b49ce9d260fffca17ad8d617273aab0e60abc49f83693ec0a55dec95592409f6
SHA51200158603cb974f570529a70ef7af8a43bdc2230d7ab38ea98c5f8580606876eaeeaf3b5505da47d0a83771ee9e82fb54caa8f7df93c564d32bc10663ebdf21f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a62c22c3d58ba44313fe29dbf8512616
SHA174eba3188bb17102504a5e28365af6a806993cfa
SHA2564aef74a8ec2063ceecd537fc7639e5e76588d2628d1160fda3be03027894faa7
SHA512049c33d4f6d51a19612d3019defffee986c38b69435b51ab2ffab9c3c1ad64573ef1520fa188c9a344d392becf73b90db565e461f0a771d9e778518f447fe155
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57339feb74e8d72c6d4ea8afc3d3c402c
SHA18412f89539de84327796ea4d0b2488805810aee7
SHA25694788ab23c28c059ff83fbef085f1b158d90cc03559d91047159dcd860e4c62b
SHA5122b86deaaa6bc67f1ecfa8881ab620612120761e9d8bbe8fcc27648757bf8577e6c6b7fd725ff7b19acbe49fc398ff503541f92047b44eaa3b7dde953695451c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56df9b375798a3c2019a82c6b624a5463
SHA1ccc42859b445808b31a2181e7571171876775f6e
SHA2561bbe8adc7cc0ff6b584dd1f50bf58ad5b436cab4296f8201e44c791eac879f71
SHA51264206f20c684980368c1966bc883900d8588a0bc91b9420232bf52526715178502607f09124c801270d0823df59c6fe6b43f7253c5ad7f9a1e85cd6826ffe370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bca63737db25880a3bb259742066d614
SHA11bbf54f053abf6f85970f05da6f580cccbeabd5d
SHA25649ab09e85e7ff817c42dd2b90683e5a1bc1d788edd407e152a835d8c6c64db74
SHA512b04413a2a3295b99fd6559a07f32198d6bb17fbec554bc5ff5b2f4d395215bed414ef889783372bbb0d6552241d8f82cabfedf95535c84d62d1e8989f5c80605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53941d1573b944bd92c68952792227528
SHA1f5dedc83f7427c01e64dfa8772185fd2aeb0e139
SHA25613e39ca7c59c1bc75953b7be0a80f8ced2382243decefb68a0827e4e062968e4
SHA512f829d245cf12853614e1d3f189ac8a418d15f6865e7777483ced405f2fe0f2a01228e3ea57e7c3a36602c49a1cf72f0c81709150efede7b2a8852868775734e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5686cbcb5ca3cd06687faa3f0d8d36d5f
SHA101307b9836451491b8fc32869775695adf222ac7
SHA256b714610a36b33fa24c61f9720b8a83a2544af130abad4831720e7b9c8b6f2a87
SHA512bc9787c9e99b5d3b002a520b83f893a727ed5c8747d5c7f414c634e2ebd1c7275d06627cfa54d876e7536a7188ad7b62d1ebd43558bc4e958492a258d0362716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD54ff5a140abb0f7c00a902eaa4885c810
SHA15ddbce1db48279868e0adea6c27b8d25b9af695c
SHA25611e55efe3b92fafa91b983dcc7a0e5c95e7261a1ccfab6319a3e158b3d9c1ebd
SHA512cb16a05622f283969259e37f990e1567984e56ea011a1dd9bd8475bec4f232684e5a17f3526421794170edbb6c8aea6df6e6626ba301020f5b135b5085816008
-
C:\Users\Admin\AppData\Local\Temp\Cab319C.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar379D.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/1256-494-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1256-491-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/1256-492-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2188-483-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/2188-484-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2188-480-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB