Malware Analysis Report

2025-08-06 00:23

Sample ID 240611-a8zb3ayanj
Target 9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118
SHA256 0b3e6bb316ca5400f626bb4d849d048ee1644b71ad84a0f2318a39616d62b580
Tags
upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

0b3e6bb316ca5400f626bb4d849d048ee1644b71ad84a0f2318a39616d62b580

Threat Level: Shows suspicious behavior

The file 9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118 was found to be: Shows suspicious behavior.

Malicious Activity Summary

upx

UPX packed file

Enumerates physical storage devices

Unsigned PE

Suspicious use of SetWindowsHookEx

Modifies Internet Explorer settings

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-11 00:53

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-11 00:53

Reported

2024-06-11 00:56

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118.exe"

Network

Files

memory/2980-0-0x0000000000401000-0x000000000040B000-memory.dmp

memory/2980-1-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2980-2-0x00000000021A0000-0x00000000022EE000-memory.dmp

memory/2980-5-0x00000000021A0000-0x00000000022EE000-memory.dmp

memory/2980-6-0x00000000021A0000-0x00000000022EE000-memory.dmp

memory/2980-103-0x00000000021A0000-0x00000000022EE000-memory.dmp

memory/2980-105-0x00000000021A0000-0x00000000022EE000-memory.dmp

memory/2980-106-0x00000000021A0000-0x00000000022EE000-memory.dmp

memory/2980-104-0x00000000021A0000-0x00000000022EE000-memory.dmp

memory/2980-107-0x00000000021A0000-0x00000000022EE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ish240600656\bootstrap_11663.html

MD5 1ea9e5b417811379e874ad4870d5c51a
SHA1 a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256 f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512 965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa

C:\Users\Admin\AppData\Local\Temp\ish240600656\css\sdk-ui\progress-bar.css

MD5 5335f1c12201b5f7cf5f8b4f5692e3d1
SHA1 13807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256 974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA512 0d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df

C:\Users\Admin\AppData\Local\Temp\ish240600656\css\main.css

MD5 62006bf5a34b37b218c4ea14bc1bdce1
SHA1 ca1c6d534b9a9b350ea0ae22553beb87517fd3db
SHA256 69b83d2e8d943649c028ffc370f85bf0b3083f79196391d28395b663c7be6443
SHA512 743b8e9cab8e3dcceb1d27507f1f1cb57a79a867d3a80d090a7f65393a34cbedbded5bde7f6b2f998ed50e7f3b6792392aac7021f377da3d5df52648c76a0a6d

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\default_tb.png

MD5 70e70599d4b853df0f12f6cb0e04695f
SHA1 6e3a721aef65625bf99b639800476150d262dd4b
SHA256 87af4027e8f89459463bdd73df7b928b883eefb20514159d3a1a4be0d39e00c0
SHA512 1efcf8af09cf857b3850cec43a88fc8c0992e3b04f78ad2c71b84c2ac7775e745df211582694588b29217aefb1ae02b29b94c2cfe52b5d32bdafb9dce73b9920

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\default_wi.png

MD5 1cc2677e3e29e45e538985839cff2b42
SHA1 2dab653eb20be72b034a38dc1fcebbd18f079c86
SHA256 9216d98a6574dfadacdc8321dc435454cb72c589b3ee8326a9b946966f756d7f
SHA512 25575fea9abb1491b5a5853244a9b655ce05f64d98f4b79134674f2d9a560a5af405c1783c9da4a07cfb38b51d060c7a70890c70df6c1c8f4b01e041aa4f649f

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\Progress.png

MD5 35a600a752d3074501de31a516860499
SHA1 51eac62cf77a0b88a3e9cb9ee6f85def21fd4bcf
SHA256 14e064857751b23da7bbe40861ef4caf99b2496227507b8e3108fbac6d901f75
SHA512 046ec179571d239bfb2d51be9837f96d9afebf2e5db77bba0f4a25ce8716d37581a3f9753bd2dbb04c47711699a9d93987bceb71df0b8becf8c577d660320069

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\Resume_Button.png

MD5 9d31583bcfad58a6b9ddeaf44549a5e6
SHA1 98f4c693af708e02201de2aee31fe094dc3b0a9c
SHA256 e466a2db2f755d9eb68619439af37ff4e45559b7a3f476e226ab2a11aeadae1a
SHA512 9ddaaad53375f4d2874fe5c98b6782202d2bd975cdd9363796986dc7567368b94d9ec1aa3e839194097838b787bbd71d574540cf5b04fd04f10fa80d6a89e695

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\Pause_Button.png

MD5 84b37cb510f50c8fea812eb308d3f03f
SHA1 d141a79feb407506709f051e55c55438a12fd3b4
SHA256 7bf800336671204de36b7d1f6ceffdff830040f51d21bc44f220f68d72cf492b
SHA512 3222cb5772a4e9b20de253914c0856c7e6383567df68fcf287801f6f79248f65957515e7ec4a44db1fbe910afeae8ca3349295c4bdf03df6aabde36f2aaa6b5e

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\ProgressBar.png

MD5 99831aa45687058e1092c0267938f057
SHA1 8640fea8c577fed87628c1a164f3d74b3661c948
SHA256 a5255dd027119fb3096eef8a7f9ce900414203327ff0e38ed670a41d1c5e78d0
SHA512 9262855232cab942ca94c540bdc3bc30eefd94c4c01defe4192786f04bdc2a8a2a2bbb7149f09a63c8c3a67145940ecff3122e7226a64f1f763c9a94f3e2c5cc

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\Loader.gif

MD5 57ca1a2085d82f0574e3ef740b9a5ead
SHA1 2974f4bf37231205a256f2648189a461e74869c0
SHA256 476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA512 2d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\Close.png

MD5 4d9e933d65430337e6f65b40a0769313
SHA1 7386eceb41e54e714f5c28f8b65840acf49f4bd8
SHA256 fb1a4307a533b33fab2aa739cb31913d3398fe60d4b0cb25247cc5fd11feaa76
SHA512 2c4977e16404e459048ffb7848882e1f754f5505dcbf226bf2007e404e8a3e8aa27168be44cbc8c705d85488849ea31ab3ec615562b1ce1a351553219a228a01

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\Color_Button.png

MD5 10bd02c03eea4d81d964e48ab7ca57c0
SHA1 adac6b648f7fe8db31936d87e5749e2825668926
SHA256 b4b5f7345d25fa3179e0e02858999f30aad5e43e8641c81a900497d3d7a1aedf
SHA512 3ef2c5e16b85c9240cf258cd0be812a73386e90ac94d95a21b73e6140e11b88c8c9c370f5270afae719b10ef65c64751f0fb2935150e825cd8600b36cd7f601b

C:\Users\Admin\AppData\Local\Temp\ish240600656\images\sponsored.png

MD5 e3758d529f93fee4807f5ea95fbc1a6c
SHA1 3a9a1ba234e613e5f808c3ffeda05a10a5dafe00
SHA256 8d46eb0c60043dcb7d79ab3d0525148fc901764620c02e4b9c5dd8b0e9026303
SHA512 e891552bee3aa10247cad1fcc510331077016a6e71d46827be2dd46017f943c5acc2c1506b41217880d35d52a94989923ad0a345f8791da4bb379eceefe3c407

memory/2980-142-0x00000000021A0000-0x00000000022EE000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 00:53

Reported

2024-06-11 00:56

Platform

win7-20240419-en

Max time kernel

146s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main C:\Users\Admin\AppData\Local\Temp\9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\9c7ede8c3e2e617bd11fa4bbf0fb84bd_JaffaCakes118.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 os.bigoribebob.com udp
US 8.8.8.8:53 s1.ttriber.com udp
US 8.8.8.8:53 tribogamer.com udp
US 8.8.8.8:53 os2.bigoribebob.com udp
US 8.8.8.8:53 s1.ttriber.com udp
US 8.8.8.8:53 os.bigoribebob.com udp
US 8.8.8.8:53 s1.ttriber.com udp
US 8.8.8.8:53 os2.bigoribebob.com udp
US 8.8.8.8:53 s1.ttriber.com udp
US 8.8.8.8:53 s1.ttriber.com udp
US 8.8.8.8:53 s1.ttriber.com udp
US 8.8.8.8:53 s1.ttriber.com udp
US 8.8.8.8:53 s1.ttriber.com udp
US 8.8.8.8:53 s1.ttriber.com udp

Files

memory/1704-0-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-4-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1704-3-0x0000000000401000-0x000000000040B000-memory.dmp

memory/1704-6-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-5-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-103-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-105-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-106-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-104-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-107-0x00000000005C0000-0x000000000070E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ish259398150\bootstrap_43670.html

MD5 1ea9e5b417811379e874ad4870d5c51a
SHA1 a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256 f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512 965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa

C:\Users\Admin\AppData\Local\Temp\ish259398150\css\sdk-ui\progress-bar.css

MD5 5335f1c12201b5f7cf5f8b4f5692e3d1
SHA1 13807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256 974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA512 0d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df

C:\Users\Admin\AppData\Local\Temp\ish259398150\css\main.css

MD5 62006bf5a34b37b218c4ea14bc1bdce1
SHA1 ca1c6d534b9a9b350ea0ae22553beb87517fd3db
SHA256 69b83d2e8d943649c028ffc370f85bf0b3083f79196391d28395b663c7be6443
SHA512 743b8e9cab8e3dcceb1d27507f1f1cb57a79a867d3a80d090a7f65393a34cbedbded5bde7f6b2f998ed50e7f3b6792392aac7021f377da3d5df52648c76a0a6d

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\default_tb.png

MD5 70e70599d4b853df0f12f6cb0e04695f
SHA1 6e3a721aef65625bf99b639800476150d262dd4b
SHA256 87af4027e8f89459463bdd73df7b928b883eefb20514159d3a1a4be0d39e00c0
SHA512 1efcf8af09cf857b3850cec43a88fc8c0992e3b04f78ad2c71b84c2ac7775e745df211582694588b29217aefb1ae02b29b94c2cfe52b5d32bdafb9dce73b9920

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\default_wi.png

MD5 1cc2677e3e29e45e538985839cff2b42
SHA1 2dab653eb20be72b034a38dc1fcebbd18f079c86
SHA256 9216d98a6574dfadacdc8321dc435454cb72c589b3ee8326a9b946966f756d7f
SHA512 25575fea9abb1491b5a5853244a9b655ce05f64d98f4b79134674f2d9a560a5af405c1783c9da4a07cfb38b51d060c7a70890c70df6c1c8f4b01e041aa4f649f

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\sponsored.png

MD5 e3758d529f93fee4807f5ea95fbc1a6c
SHA1 3a9a1ba234e613e5f808c3ffeda05a10a5dafe00
SHA256 8d46eb0c60043dcb7d79ab3d0525148fc901764620c02e4b9c5dd8b0e9026303
SHA512 e891552bee3aa10247cad1fcc510331077016a6e71d46827be2dd46017f943c5acc2c1506b41217880d35d52a94989923ad0a345f8791da4bb379eceefe3c407

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Color_Button.png

MD5 10bd02c03eea4d81d964e48ab7ca57c0
SHA1 adac6b648f7fe8db31936d87e5749e2825668926
SHA256 b4b5f7345d25fa3179e0e02858999f30aad5e43e8641c81a900497d3d7a1aedf
SHA512 3ef2c5e16b85c9240cf258cd0be812a73386e90ac94d95a21b73e6140e11b88c8c9c370f5270afae719b10ef65c64751f0fb2935150e825cd8600b36cd7f601b

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Close.png

MD5 4d9e933d65430337e6f65b40a0769313
SHA1 7386eceb41e54e714f5c28f8b65840acf49f4bd8
SHA256 fb1a4307a533b33fab2aa739cb31913d3398fe60d4b0cb25247cc5fd11feaa76
SHA512 2c4977e16404e459048ffb7848882e1f754f5505dcbf226bf2007e404e8a3e8aa27168be44cbc8c705d85488849ea31ab3ec615562b1ce1a351553219a228a01

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Loader.gif

MD5 57ca1a2085d82f0574e3ef740b9a5ead
SHA1 2974f4bf37231205a256f2648189a461e74869c0
SHA256 476a7b1085cc64de1c0eb74a6776fa8385d57eb18774f199df83fc4d7bbcc24e
SHA512 2d50b9095d06ffd15eeeccf0eb438026ca8d09ba57141fed87a60edd2384e2139320fb5539144a2f16de885c49b0919a93690974f32b73654debca01d9d7d55c

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Progress.png

MD5 35a600a752d3074501de31a516860499
SHA1 51eac62cf77a0b88a3e9cb9ee6f85def21fd4bcf
SHA256 14e064857751b23da7bbe40861ef4caf99b2496227507b8e3108fbac6d901f75
SHA512 046ec179571d239bfb2d51be9837f96d9afebf2e5db77bba0f4a25ce8716d37581a3f9753bd2dbb04c47711699a9d93987bceb71df0b8becf8c577d660320069

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\ProgressBar.png

MD5 99831aa45687058e1092c0267938f057
SHA1 8640fea8c577fed87628c1a164f3d74b3661c948
SHA256 a5255dd027119fb3096eef8a7f9ce900414203327ff0e38ed670a41d1c5e78d0
SHA512 9262855232cab942ca94c540bdc3bc30eefd94c4c01defe4192786f04bdc2a8a2a2bbb7149f09a63c8c3a67145940ecff3122e7226a64f1f763c9a94f3e2c5cc

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Pause_Button.png

MD5 84b37cb510f50c8fea812eb308d3f03f
SHA1 d141a79feb407506709f051e55c55438a12fd3b4
SHA256 7bf800336671204de36b7d1f6ceffdff830040f51d21bc44f220f68d72cf492b
SHA512 3222cb5772a4e9b20de253914c0856c7e6383567df68fcf287801f6f79248f65957515e7ec4a44db1fbe910afeae8ca3349295c4bdf03df6aabde36f2aaa6b5e

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Resume_Button.png

MD5 9d31583bcfad58a6b9ddeaf44549a5e6
SHA1 98f4c693af708e02201de2aee31fe094dc3b0a9c
SHA256 e466a2db2f755d9eb68619439af37ff4e45559b7a3f476e226ab2a11aeadae1a
SHA512 9ddaaad53375f4d2874fe5c98b6782202d2bd975cdd9363796986dc7567368b94d9ec1aa3e839194097838b787bbd71d574540cf5b04fd04f10fa80d6a89e695

memory/1704-146-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-147-0x00000000005C0000-0x000000000070E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ish259398150\locale\PT.locale

MD5 83c38f4e0abd0b40ea8aa017e45bfe1c
SHA1 834ac428f542ce1ce9c2f61104e2c57290f1af43
SHA256 400bbfbe8438ce6602d9f874919c0db169e11de0209c60b8f3244b170e0e5929
SHA512 1298eda8c51fd651e588168738d1e4e29a2cfb4dc701f1be47fc9b96da8cda23440cf4785afeec48724f9bcd4b6d98c6cf99edcfa141457f46a52b43843d3c16

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Grey_Button_Hover.png

MD5 9ff6c8092a3d13d8d04f7c9c68ddd1dd
SHA1 8689e9ecf2d80e43916c0b6d5df6dbe61c480701
SHA256 6210c04f880b33e17686e38ccd570e97333fa26236ef507d963dcffd409ae313
SHA512 1d352651e93b671e69bc10c382813c42b4631185470385e095b8923c93dd34434b134df44685627098f98eeb357d5ce7f6cff79ba8e7e1a6d4863b8848956a53

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Close_Hover.png

MD5 db2626f82130a76ce73af77f987532ac
SHA1 e3fc5812199105d33619d3af587c315cbc45dae7
SHA256 393389a223a19a3d5a3b2fa84f2ee0aa27dc945802641a2764bb8ad1f1ee2b98
SHA512 bb5490b2b0460cfafa721a9f00b95115ea9fd3ae133637fe7567e932abccf5d625717817931e353760e4a89edc633a38e0c663a9e213f231b1b809af27146fae

memory/1704-149-0x00000000005C0000-0x000000000070E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\Color_Button_Hover.png

MD5 9f711b1f8375d8d1f2cb1587ac0eeec6
SHA1 7b8c097880890ac5f7c08fcba0c5b4415c70f4bd
SHA256 bb19dc0524f32f70d4a7164e602c7a0f9b0e82966ed87838d5ec664502d8fb26
SHA512 74c85e6dbaaa12bf6b63975809f70f66fa875cd7f91f1c00e1f452dcdc8c13d25a3f522415cbd569d5b8445348d1e5d9ba36a0def8eda0de38c27ec2763f579a

memory/1704-167-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-168-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-169-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-170-0x00000000005C0000-0x000000000070E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ish259398150\images\BG1.jpg

MD5 6e085401c326730390a14f0eb72d00be
SHA1 34cbfc25bc54ca71141f140304e6ee3a83a2b6df
SHA256 5dc267aed7194615d4554dfc0b58c98054f8b3bf726d44f44cd27db6dde2fa72
SHA512 9e9774151f34679fc5ae30068f8049be2c4472c602fd3bdb97ae4e00d644deb60313b756f6b5aa5af37abadccf45180edb866c1369f1960675588d632611c057

memory/1704-175-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-176-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-177-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-178-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-180-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-181-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-182-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-183-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-185-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-186-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-188-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-190-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-191-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-192-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-196-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-197-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-199-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-200-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-203-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-205-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-208-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-209-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-211-0x00000000005C0000-0x000000000070E000-memory.dmp

memory/1704-212-0x00000000005C0000-0x000000000070E000-memory.dmp