Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
b4c988a94242af0afe8b6b367f032a8d_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
b4c988a94242af0afe8b6b367f032a8d_JaffaCakes118.exe
-
Size
203KB
-
MD5
b4c988a94242af0afe8b6b367f032a8d
-
SHA1
c576a66700914ea941f1cd8406a3f97d4ead0bd7
-
SHA256
e7ea99b780111336c9a8c301c18e9d93ef7d13eace98fe3bb9d844b305736316
-
SHA512
3fb5309d9f7e1547b7349cf241a9c3cb7cd0f934f751929d125d687467d5ea5fe180fbae1cd03e64502dca999e6b39e3f3a0b9be0782f4128fa96904e323d8e3
-
SSDEEP
3072:90ji2dQ6v4uPXDNUj4jKBonzmLXlYVRLh0epEEZqkFBc4+uTqN76o:9+dp4uPZzGonqXGXh0bluBc4GZ5
Malware Config
Extracted
gozi
-
build
215165
Extracted
gozi
3162
menehleibe.com
liemuteste.com
thulligend.com
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Signatures
-
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{050161B1-2C16-11EF-B238-4AE872E97954} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b9999222c0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3dcff762c9a9643ae4c460d8b98c09700000000020000000000106600000001000020000000bdd3a296782205df85f6a7383581b284511eb7662d4c61d875e34b803f06359d000000000e80000000020000200000001e5d9363f08c2d8a976bd3a3503725f922e90d2c2daa0e595e2afc2d57b7fc5e200000003aa24dbfb0e27e1a7cb0fc1bd17f2126fa4c0baaa4c5c161cdc953e43f8710914000000095b05fb1b04625b2461adcf44e117ad35552b255e3b92e8babfbf98896b1af6047c315f6e5e4f37fbb08c881eea222ca1610a2c8c54dc950d1b10a4f31b7d92b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E61B6891-2C15-11EF-B238-4AE872E97954} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 2500 iexplore.exe 2992 iexplore.exe 2080 iexplore.exe 1560 iexplore.exe 640 iexplore.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 2500 iexplore.exe 2500 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2992 iexplore.exe 2992 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 2080 iexplore.exe 2080 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 1560 iexplore.exe 1560 iexplore.exe 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 640 iexplore.exe 640 iexplore.exe 592 IEXPLORE.EXE 592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exedescription pid process target process PID 2500 wrote to memory of 2408 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2408 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2408 2500 iexplore.exe IEXPLORE.EXE PID 2500 wrote to memory of 2408 2500 iexplore.exe IEXPLORE.EXE PID 2992 wrote to memory of 1964 2992 iexplore.exe IEXPLORE.EXE PID 2992 wrote to memory of 1964 2992 iexplore.exe IEXPLORE.EXE PID 2992 wrote to memory of 1964 2992 iexplore.exe IEXPLORE.EXE PID 2992 wrote to memory of 1964 2992 iexplore.exe IEXPLORE.EXE PID 2080 wrote to memory of 2580 2080 iexplore.exe IEXPLORE.EXE PID 2080 wrote to memory of 2580 2080 iexplore.exe IEXPLORE.EXE PID 2080 wrote to memory of 2580 2080 iexplore.exe IEXPLORE.EXE PID 2080 wrote to memory of 2580 2080 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1572 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1572 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1572 1560 iexplore.exe IEXPLORE.EXE PID 1560 wrote to memory of 1572 1560 iexplore.exe IEXPLORE.EXE PID 640 wrote to memory of 592 640 iexplore.exe IEXPLORE.EXE PID 640 wrote to memory of 592 640 iexplore.exe IEXPLORE.EXE PID 640 wrote to memory of 592 640 iexplore.exe IEXPLORE.EXE PID 640 wrote to memory of 592 640 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4c988a94242af0afe8b6b367f032a8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4c988a94242af0afe8b6b367f032a8d_JaffaCakes118.exe"1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2992 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:640 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD586733734ab38cd74b4d86b5df40e953a
SHA199fa32c229826493a20540ef1cac64753c4754c4
SHA256ef2eec43033f08869939281bdbf05413122efed5c70544e7140900afd9ef1ad9
SHA5128e7a915107d425c5a0622353d67ae18bd9c66ab1c282899a9ed31d928a148fa145ddce6f96105dd65613de08dc273fd022feda8c31f42a6400b604b41b282aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD56b4cbfa9d0344f851451a1da53d20710
SHA159a6243ec1273272c071adc4d3bdfffcf34e289f
SHA2565f2b654587554bc090cd049a8e1a69ef9f1a9f8cf3fe443f9255c8e98263b04f
SHA5121e3a6bba08b74c82918409191395545ef0147d3b6565887bb7da8dcd4cde8372ecee12accbad327dd37616c1e79103dd3a366cd76341fe6f8a4836ee73cdc896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f0b184d414ba8361aa358b754507d57c
SHA17222cf313a37bfd26e356e7601dad57f736ddeab
SHA256a34db8bd569ca982f3117ddd17c3e8221cd95d0877514260a61de9e64d7fb470
SHA512d65bf32fa407bcc0bff62a19466297c17ae95180490f1fc51f97952cafe2f2abe8bf7f2f161ea3d4cb11c48fdc4dd726791f21fc32fe53fdc155483ece835aeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b7b89dffa090f52cdac4a2780adb1a62
SHA15412523f25a4bd7d9fabb3e7bb7289821cd1cb70
SHA2565ed95ffd5e158e976a0d4e6999a6701288308e4f8748508df8c61377b520a3f7
SHA512906ec2b66ba0dff06fa190919df28b89badf263ddd0e9941409184f5997852e6a4227ef907dbcb6ea04c2d0797cc9a3fd780d8d9ffc8e6fc9f288a864885675b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a5f61b00035465dd485092abcb3ea794
SHA1286f118438f97e14164155eff94e836e6cce355b
SHA2567f35840cf94556009b241ff8895ab7966d6a2f4411922e9297924412005c0e4b
SHA5129638b9511d3cab10bc321487b6bd4e402fd40ebf77c5ba49ac34dd413a04ecd790ebacd96cada229ed1aa60dcfa93fe2c3d034b14b8e422b513b6e7810b7e896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD563e1f010df471db95952513c7f5ffdea
SHA1e3dd71cf73baf159f82d0d58b0f45ac833acbc93
SHA2566f4ab4b51636a652a585bd8fd867ac3ddbed095c2d4f5405b12630fb422694bc
SHA51269ef292b87f1e7a10505d89414f62e21555b07a14887259c1c4e457f72f5e0fdee9c0d93d41833d3e72de272c45bfc0329f9df0489d85e21a46e724904534dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD525d64124c73f834076dd980954bfbe03
SHA1f8f93b920691d7916619ff392a28dfde7168ce7d
SHA256f01d6766bb289214606ac71897761f4758d28d4aad656099ad1ecbd2204d2a8b
SHA5124cd50dd8734f4e3328576ef2e502f64f6a352101dfd91095c5b9d9f2a8d46484506ba18e3ba888f8d91d7626e7ab4bee74ecd39d9d008d0e88a1d80c7a267932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d809e99c790a4d200cd37ddd0cbb80dc
SHA1057c7c8330b5b6e401829e471ebea490e41482a5
SHA2569e4f8a7c89ae9c71c8f50ee16f5973e7908950f0cdb598e1a2abb39c46fc935f
SHA512387422494b75e2adf03c57991c69ba8a4c7fb48a8237fe4943322378e6c49554afc3874e0ce51ee536c26122e16e5028882b0fb341bec7d60d54cd4badc4c213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52145c825a038d64c9b1bad74d774ba56
SHA17b6a51da71ded773c48e6941d9b460ad064f4dbb
SHA256e01f0da9de2389c805f6cb9da76085519a2b3590afe57ae2775eab9f096d6019
SHA512197cc26521f094571fdca3084952cd7b91fc58e9dd8f23f9f223255294fe8e374b7d3857c054b09ac409b7507bc473baacf4d76764f1751f33f1fd6d3373b7cb
-
C:\Users\Admin\AppData\Local\Temp\CabA798.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\CabA8A3.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\TarA8B8.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Local\Temp\~DFA099F69A905E15E3.TMPFilesize
16KB
MD5540c9b56ad748ff7510bf639feaf1280
SHA1c5883730152dfc10c94342f6023ea073be17475a
SHA256e5190fc6743d812b17bb3c51881bb28f8f67e1890bd708b2c666bacc37f21f03
SHA512199d2208ef7b7b22c7c94928e9c64a726cfadc2ca878648b75b7801b0a575fe14b5028747b950d674387619f36a32000a655441ad094738dea2e9429df47120c
-
memory/1896-0-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1896-8-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/1896-4-0x0000000000270000-0x000000000028B000-memory.dmpFilesize
108KB
-
memory/1896-3-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1896-2-0x0000000000435000-0x000000000043A000-memory.dmpFilesize
20KB
-
memory/1896-1-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1896-490-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB