Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
68a696dbadb5f0c0e00568eba7283e46_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
68a696dbadb5f0c0e00568eba7283e46_JaffaCakes118.exe
-
Size
297KB
-
MD5
68a696dbadb5f0c0e00568eba7283e46
-
SHA1
e46e26a21654f80b5a009a02a80d08025641a09c
-
SHA256
27922dcf3ce8d7c92cfcead3b8418da0565a63e563517d8023ea16f3df016fe6
-
SHA512
ecbdcaee34c72422cb6749c3ea687282d325f1cb99acdfbae61a0b8bd1dfa404383df09ff652ba0eee5c85f3ad97b5da2383338a42bbb7cbfe8a19a1e4cdfd93
-
SSDEEP
6144:cyCwZntdUnKTcdycMb9rLtDbF6WT2dc+BCcJrbL:cl1nKodycAhlyB
Malware Config
Extracted
gozi
9898
mcc.avast.com
line.starlightgroupllc.com
-
build
214138
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b04f41c4ff00f51bc968da7a3eafd8378d64f7f56f90c5c945651ab2746fed71000000000e8000000002000020000000f05bdb4391b570821d88b73ca73d0cf79d84e8d45504ba79585eaef012266cf6200000005b40ee63f5e49c3c94040e9dba22f8b9b0227891f7af0af8904bc697266c7ba5400000001613751f0fa651d40192e5f2f14b08c5e95ea86c3fefde1b535c2899c40b97cd9ef302e8b4c52273e81d6e3e4d37409a819b6111483aa312c00ac729e9d1214d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01BD3B91-1880-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2895371-187F-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7083031-187F-11EF-B6D8-6A387CD8C53E} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 2748 iexplore.exe 1484 iexplore.exe 1692 iexplore.exe 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 2748 iexplore.exe 2748 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 1484 iexplore.exe 1484 iexplore.exe 632 IEXPLORE.EXE 632 IEXPLORE.EXE 1692 iexplore.exe 1692 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 2320 iexplore.exe 2320 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 2748 wrote to memory of 2188 2748 iexplore.exe IEXPLORE.EXE PID 2748 wrote to memory of 2188 2748 iexplore.exe IEXPLORE.EXE PID 2748 wrote to memory of 2188 2748 iexplore.exe IEXPLORE.EXE PID 2748 wrote to memory of 2188 2748 iexplore.exe IEXPLORE.EXE PID 1484 wrote to memory of 632 1484 iexplore.exe IEXPLORE.EXE PID 1484 wrote to memory of 632 1484 iexplore.exe IEXPLORE.EXE PID 1484 wrote to memory of 632 1484 iexplore.exe IEXPLORE.EXE PID 1484 wrote to memory of 632 1484 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 1716 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 1716 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 1716 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 1716 1692 iexplore.exe IEXPLORE.EXE PID 2320 wrote to memory of 2584 2320 iexplore.exe IEXPLORE.EXE PID 2320 wrote to memory of 2584 2320 iexplore.exe IEXPLORE.EXE PID 2320 wrote to memory of 2584 2320 iexplore.exe IEXPLORE.EXE PID 2320 wrote to memory of 2584 2320 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\68a696dbadb5f0c0e00568eba7283e46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\68a696dbadb5f0c0e00568eba7283e46_JaffaCakes118.exe"1⤵PID:2236
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:2188
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1484 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:632
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD548f088538d83042b02577451fe064b41
SHA1df23a9e7e5c75f7e1f6acfe238864ef9eeb1af75
SHA256f46834a9d10e1c87bef80ff6998868f84a9199d8a754e123e9fd6dedc68b5e4c
SHA51276711557f3b2bea1ce17d6e119f62a1898b9a824fdf0d75212c253fc6aab5a669a629b063c1d3006c1eddbffb48ad4906f61e197f7b3f5f4e98527d34fd2709b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5fb325e1d6ca1c855fbe476c6126af9c2
SHA15279a03aa280fc86766d3d2971742ccc9153275b
SHA25675cc5a06ecd1774f5853f298472cc163e46d4566fce990b53c0c7b9f5ba2b88b
SHA512ecd831f00d0e502c2b56a8601ce994902956126952103ea1a7eb4372744c05ed480ab388e7aa588e9ebd4edb3b415c158eae766ed14aecea46e79ec889cfcd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5200b49303b387665f3769b6dc7fb429a
SHA1ac971fd3517c09ba6a7bd345daefcd595ca2e301
SHA25676f8c72b2ae3b87fa0cca2161241eb6248c95077e01b1b8e324d38b9a81c7bb1
SHA512de581e437b369cfc7270551e29a89b97d4192b4333c7cc22cf332c6425178589cf661781f1d67d83a12522a815e75f3acf095af4432d39fed6d9a3d02d54ab7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f4515d6cfd866fdb7534ef1a291d7d5e
SHA1f5541aa161014d80f1c99d1cef95eb8647a2b02f
SHA256ede373c4802ed559e76b5fddffeac7b9034fd948703a188e5a49106e322fbf3c
SHA51272679e8e8289738ede1c34a4f1c87b2d7a0b563a76ef5c6bbe60d108788c3499d793e01c6922e3fc39c981b226ba250af36fbbc3c15b65684ac3b8ab57277a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50d33ff1dcba380a23c2fe71e8eafbb77
SHA1e8ff6a2bc34e3324962b1b29033e556148025526
SHA256ef1b9bf8dda97954a8a4da4e1269c58554209da576ee4f6ccc8e7ee6d5a3a916
SHA5124e5030e185570f528f82c0952e634b867663b14c04f86828850614fe049632a03a3d56b3fa6f31e082baf229269f5700a02316f318f7e17ae5cfe8f3f37f3dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a9503ef655e04da9c25ab37146b2114f
SHA159fb4c1a566d04411ea916295d4ace7e45f98969
SHA256a1519bf28caf4b7c75824622d0134eb82c4cb468cb0db9750f091907dc3e27f9
SHA5127727be700d97bcd61b0c562a3453d028b299d66eeeb08fd078420ffa077110f84b2dd77a6dcf6884416fb89b2ac0aeda77e74b3a8687834e1ad7f982921261e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD588704452e763b333b647bd1f6895189f
SHA119fa25377e7f2a7a6d57e592cfeb35812379d3ac
SHA2563f2eb34b9f57fe2f8d1cf7fe3f3943404d299560de2ee51a469edef15c06be69
SHA512f959f107d786c3531b5e7c542a53576de75827e90f126eaadc7fcc1ed3580a8db114f6c34433f5d2023b879165d66f7162a783b31cd9f65cd9249e0c56a04274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5231cacaac322184d692a947e6c30a56d
SHA149c101f3fa3277cc1611f11d026e7684ed6f0410
SHA2562d2b0c0c98dd6eaf6da3c1aea516334b3a29a86ebb4d41ea6e7c94ab66f3ce03
SHA512ab823eff4f0597776a13dc7e615c83d7ed30aea8f4fac875732b8ecd8558f8b46d9245e5a7cb00c9d21a3ce2b5b7a6a7ef0958837db3c2bb7fa7a4b2b84fee6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5034b7d3e6df5bea669347f565974f26b
SHA15972a8b479506d8f968890ae0c7a4eca5e3f79b8
SHA256b47d5a1f4eeb03e3d13ceb0d0dfec096cbe50ae756f49d0eb5668ae83410aa83
SHA5121c4fae0699f086236a8da37864d43bf14f8f421d3e59fb31fd4085447ab8202a24acc365473f85fb70b8645047a6394e3593e0792a67a2732c019611d5235d9f
-
C:\Users\Admin\AppData\Local\Temp\Cab732F.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar73A0.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
C:\Users\Admin\AppData\Local\Temp\~DF4E8ED2CB950A758C.TMPFilesize
16KB
MD5f354f0b496e8bb81b51b1be7db72f634
SHA1967f8c2bcd51549d92cfcf1b2e0ce6461031be17
SHA25689abf46399696e85037ab2356ed560dfd6a06978dbcd7079aafc82fe8c6cf81e
SHA512f71439c3e8ba7cb83dea2b52be03405534c245bc6f19b881e0d89b5bd757ad72e625034607fc6fb5dd6f92921f92f3003d0174cd7cd894d3a0b2d25efc7a528f
-
memory/2236-2-0x00000000001B0000-0x00000000001BC000-memory.dmpFilesize
48KB
-
memory/2236-8-0x00000000004A0000-0x00000000004A2000-memory.dmpFilesize
8KB
-
memory/2236-4-0x0000000000250000-0x000000000025F000-memory.dmpFilesize
60KB
-
memory/2236-1-0x0000000000270000-0x0000000000370000-memory.dmpFilesize
1024KB
-
memory/2236-3-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/2236-444-0x0000000000270000-0x0000000000370000-memory.dmpFilesize
1024KB
-
memory/2236-445-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB