Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
a942bab59da20af633ef31181f1461b9_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
a942bab59da20af633ef31181f1461b9_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
a942bab59da20af633ef31181f1461b9
-
SHA1
62d83462a712b57da09d38b6fbec011791699c3e
-
SHA256
7bed588748563cc4a16bf05bb7e04b951a5c3422e9798af129586d484c087c49
-
SHA512
08e8840d07f75a466cc722ead1c649040a8e515cc214d3476b066591435fb97433b77cc39119cf7f6efd15399fb07811b6e68af3ac6d188e7d38d80213cc9a9c
-
SSDEEP
49152:iB9NjHLDKvHd5GY++tqg2FsYmWVvP+FeBG+VBSaL12xN//Gag8:iBzHLDKV5GCtqgGsYmWVvP+FeA+H0xNn
Malware Config
Extracted
gozi
-
build
214107
Extracted
gozi
3531
gmail.com
google.com
k55gaisi.com
leinwqoa.com
bon11ljgarry.com
-
build
214107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "634840679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d9b53a48beda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20edae4748beda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000097a1eb2157cf4047a4f2ea4b9291f323000000000200000000001066000000010000200000009f914595077a63eee8f7a3b34d23e78433327fc7fbf0f530d1fe367c8b8e0e5b000000000e8000000002000020000000dea5f1e8cdcd192a7584cb8192454b21a676bf48d3261a97251152cbbbbea5f82000000001f6d4b48336b08ec73ac1e61f7a42d93118ad7fc9c6297f4bcf1de7f4e710aa400000009b58fabeddbb13ecaaebe8232cce71a55d42cd16efde9beeb827d1fe3f11be973afe71f8f54e15bfa4aab9c0d96791408183c8e03eeaa8f77b3d5581436ed15b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000097a1eb2157cf4047a4f2ea4b9291f3230000000002000000000010660000000100002000000050e000dee082a407f7eafe6230776458ddc76db33530ecda3ae54656a257e2cf000000000e8000000002000020000000d877cb33fb8117922cf34ccd31709a0998ab68474c9b3f03c563716864ed064520000000ed80c9372ce33604bf26a79d70806eb16d5821ee9bb8d7dd80cf4fe8f7983157400000007d83ca8d6de8164b8ce08f614184f52ab2b0081c426d2c6161fa6972905eca09124045b58dd16cd3557a7ff2a5514aad0dd9ddfabf4e96c8aaa1aa6fecb74426 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31112776" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0072c02648beda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09dc72648beda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6AF6CE3A-2A3B-11EF-86EC-4E0B5964A968} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "634840679" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f1e92d48beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{91A6B486-2A3B-11EF-86EC-4E0B5964A968} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000097a1eb2157cf4047a4f2ea4b9291f32300000000020000000000106600000001000020000000923e3ba99893e2136e6df685a6ab9721701cc21e5423bf075fb5e2639b8ba909000000000e80000000020000200000003b2b89f391a3978df73661d6c516068bcff3254c4fa86e0b5e20b3e8e9d8f5b220000000d6c2f97918da01d9c0f3ad80d1fe1dfce016cafdc12e1a71597aee3d37ee304440000000f1539b927e9eb259d372d64e88a161aeb63f5fb97b28311a5953dbde0d66110787c58e28101f13b6bb20c685e2461d1d9c83f5a58a68c81b82f266bf6155ce9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31112776" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000097a1eb2157cf4047a4f2ea4b9291f32300000000020000000000106600000001000020000000948d5e10d74c004c018174891c7d97d0dac41879279cab1c2b1463038556aa12000000000e8000000002000020000000bfaf1559a00056ca5c9b6a08b560c21b7f486d5f68da753a7daffe467d9693e520000000c9940d31b5b009d9bf95078626cbbe380124ab86b22907f96a479149d3359ca140000000c2ac434e13c2e6eac0b70517baae5dc805109cc0c8946e73f750ec841712cc8c57bbb78373cf59f55aaecdf8e2600294ad29971d583826d8dce193888403fb6c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 906ca35448beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 3208 iexplore.exe 624 iexplore.exe 4284 iexplore.exe 2840 iexplore.exe 4572 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 3208 iexplore.exe 3208 iexplore.exe 4856 IEXPLORE.EXE 4856 IEXPLORE.EXE 624 iexplore.exe 624 iexplore.exe 3320 IEXPLORE.EXE 3320 IEXPLORE.EXE 4284 iexplore.exe 4284 iexplore.exe 3096 IEXPLORE.EXE 3096 IEXPLORE.EXE 2840 iexplore.exe 2840 iexplore.exe 3100 IEXPLORE.EXE 3100 IEXPLORE.EXE 4572 iexplore.exe 4572 iexplore.exe 5104 IEXPLORE.EXE 5104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 3208 wrote to memory of 4856 3208 iexplore.exe IEXPLORE.EXE PID 3208 wrote to memory of 4856 3208 iexplore.exe IEXPLORE.EXE PID 3208 wrote to memory of 4856 3208 iexplore.exe IEXPLORE.EXE PID 624 wrote to memory of 3320 624 iexplore.exe IEXPLORE.EXE PID 624 wrote to memory of 3320 624 iexplore.exe IEXPLORE.EXE PID 624 wrote to memory of 3320 624 iexplore.exe IEXPLORE.EXE PID 4284 wrote to memory of 3096 4284 iexplore.exe IEXPLORE.EXE PID 4284 wrote to memory of 3096 4284 iexplore.exe IEXPLORE.EXE PID 4284 wrote to memory of 3096 4284 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 3100 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 3100 2840 iexplore.exe IEXPLORE.EXE PID 2840 wrote to memory of 3100 2840 iexplore.exe IEXPLORE.EXE PID 4572 wrote to memory of 5104 4572 iexplore.exe IEXPLORE.EXE PID 4572 wrote to memory of 5104 4572 iexplore.exe IEXPLORE.EXE PID 4572 wrote to memory of 5104 4572 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a942bab59da20af633ef31181f1461b9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a942bab59da20af633ef31181f1461b9_JaffaCakes118.exe"1⤵PID:644
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:4488
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3208 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4856
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3320
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4284 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3096
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3100
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4572 CREDAT:17410 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD55eaa9902dd28d9f691e7047b2aef4f4c
SHA18041448f3ae60fc2a27d4e679a98e381cc1bc54d
SHA256ae964a6edefed2e02ef6481b9d263bf474ab11b8207c0250a69c0aefea4617d1
SHA51224200cca9f70e0c6535d1bb1a0214174ee3cfd1e841ad4269989fb848380d42a8b0f8d50f423beb975b594e4a246be4e59bc5429abfad3b535c92ce1f37fb223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_DED764EA9DDA5AD0962FA05282F27527Filesize
471B
MD5a1c622aa67c36bcdd539a069c186974c
SHA109107b978bde4946ed6d26b3fa71fd5c64b1a795
SHA2566292ebd4b8899037e02026e8466bf24e435dea80d61e4720e31f9d5d0a944a2c
SHA5120a9bbba2d018aeabe16862ba693de9f148bbdfc1ad2509d99938c329678c83d7ea6274ee14b09fb691c2988f7f34519a6e911e2803b5e00a70f630856ed47033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5755886a72b83429cd6ef0025e215c17b
SHA1d181f171b39aa0869e4ac981a63969e40679bf4a
SHA256bb94a6f71583eeeb58072375de2692da1328c2f5770a439e896dd55d66da71f7
SHA5128b4fb8f3ef234a70dbbb9644c74bcca52e5c36df3e8650edd59f33fa0d9f6f91961410e02bc5810542ab50ddbfc0f71da96fb4ead081ed0a41f80cd8b4f32894
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_DED764EA9DDA5AD0962FA05282F27527Filesize
406B
MD5fd260d1dee977a4dc6472c8f9baf86a3
SHA1e669da5e1fe60baddf2177333ee13f3f3c15310b
SHA2567f3ddf6e4b286ea37d421bbf6fd7388eedeca7400a586345ffdfa14946d4118c
SHA5126ca0d474a387f179d2dccef2f04774f265f15fdb71eb78654c3df2ee366fb650d898b13491735bcd1a5cfd0ce28e881341d7a1602715d9ae91ff6bc8f811b9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD50cb880eadb7a427df87b90c3c0897b02
SHA1e7dfd916b1ae08da8b50acc1b19a8b228782a543
SHA256599a87e088bf54bcdc4bfc053c7d1c4d87dcf014527722a51560c3b232f3b9f4
SHA51213a6155d04d8e1ad57c4c433da8c5c1cfa8eba7c8b2eff1bbca13cdf774d355949a51463970a2323a0a3ca62e45a84d788230402b9209fdbf30e172f9e3accc7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NNUT9QBP\robot[1].pngFilesize
6KB
MD54c9acf280b47cef7def3fc91a34c7ffe
SHA1c32bb847daf52117ab93b723d7c57d8b1e75d36b
SHA2565f9fc5b3fbddf0e72c5c56cdcfc81c6e10c617d70b1b93fbe1e4679a8797bff7
SHA512369d5888e0d19b46cb998ea166d421f98703aec7d82a02dc7ae10409aec253a7ce099d208500b4e39779526219301c66c2fd59fe92170b324e70cf63ce2b429c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TUGBEKKF\googlelogo_color_150x54dp[1].pngFilesize
3KB
MD59d73b3aa30bce9d8f166de5178ae4338
SHA1d0cbc46850d8ed54625a3b2b01a2c31f37977e75
SHA256dbef5e5530003b7233e944856c23d1437902a2d3568cdfd2beaf2166e9ca9139
SHA5128e55d1677cdbfe9db6700840041c815329a57df69e303adc1f994757c64100fe4a3a17e86ef4613f4243e29014517234debfbcee58dab9fc56c81dd147fdc058
-
C:\Users\Admin\AppData\Local\Temp\~DF709D76F65891B051.TMPFilesize
16KB
MD5f95f3f543a841ec54fe5dbf9e01a7a68
SHA133c836b9b8dc128df6a9d0c8e835ddbe9440ebe2
SHA256d15570308e117a9ef4440a540425898884d64f2057f65ba58131ce0b711bac71
SHA512b7d6864c0521b5de665c835898f385bb1b30b9f32a3bbd1f0541660f76ca86dd2a9b15e0eb80813926083313cf0346f73e910e15d47dfacbce2adbb980ddece1
-
memory/644-3-0x00000000022B0000-0x00000000022BF000-memory.dmpFilesize
60KB
-
memory/644-27-0x0000000000720000-0x00000000008C8000-memory.dmpFilesize
1.7MB
-
memory/644-1-0x0000000000892000-0x0000000000895000-memory.dmpFilesize
12KB
-
memory/644-2-0x0000000000720000-0x00000000008C8000-memory.dmpFilesize
1.7MB
-
memory/644-0-0x0000000000720000-0x00000000008C8000-memory.dmpFilesize
1.7MB