Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
085a4a5430ccb482aaf5e1f428b2e035
-
SHA1
a1a22b49b830728849e84e4c2bb686f73eb252e4
-
SHA256
e4c9e8116827030fee7a80a2d2fbbadb2f0b0fc353dbe8833e57f7852ea86810
-
SHA512
71cd748b221f990e28c7978dd9213ebb711c346fb7bceaf8d01acf115c55afeec3450fd0dbf0b64dd8ab7232a7d92792acab158e681d51049f589b8ab820c1bf
-
SSDEEP
24576:/CSakkVYTNLqPY3Oz8zmpbZipBw8QVJBTyjCtAscY7EAqGvgbidbGFn15jnpCXmO:1k03o3lV3/tAs97EAqGTdban15jnAXd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
service.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\MSDCSC\\msdcsc.exe" service.exe -
Modifies firewall policy service 3 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2124 attrib.exe 1548 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exeservice.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation service.exe -
Executes dropped EXE 8 IoCs
Processes:
service.exeservice.exeservice.exeSERVICES.EXEWINDOWSLOGIN.EXEmsdcsc.exemsdcsc.exemsdcsc.exepid process 384 service.exe 4864 service.exe 1768 service.exe 2352 SERVICES.EXE 224 WINDOWSLOGIN.EXE 2932 msdcsc.exe 4132 msdcsc.exe 4508 msdcsc.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
reg.exeservice.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\service.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\MSDCSC\\msdcsc.exe" service.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
service.exeservice.exemsdcsc.exemsdcsc.exedescription pid process target process PID 384 set thread context of 4864 384 service.exe service.exe PID 4864 set thread context of 1768 4864 service.exe service.exe PID 2932 set thread context of 4132 2932 msdcsc.exe msdcsc.exe PID 4132 set thread context of 4508 4132 msdcsc.exe msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
dw20.exedw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 4508 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
Processes:
service.exedw20.exedw20.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1768 service.exe Token: SeSecurityPrivilege 1768 service.exe Token: SeTakeOwnershipPrivilege 1768 service.exe Token: SeLoadDriverPrivilege 1768 service.exe Token: SeSystemProfilePrivilege 1768 service.exe Token: SeSystemtimePrivilege 1768 service.exe Token: SeProfSingleProcessPrivilege 1768 service.exe Token: SeIncBasePriorityPrivilege 1768 service.exe Token: SeCreatePagefilePrivilege 1768 service.exe Token: SeBackupPrivilege 1768 service.exe Token: SeRestorePrivilege 1768 service.exe Token: SeShutdownPrivilege 1768 service.exe Token: SeDebugPrivilege 1768 service.exe Token: SeSystemEnvironmentPrivilege 1768 service.exe Token: SeChangeNotifyPrivilege 1768 service.exe Token: SeRemoteShutdownPrivilege 1768 service.exe Token: SeUndockPrivilege 1768 service.exe Token: SeManageVolumePrivilege 1768 service.exe Token: SeImpersonatePrivilege 1768 service.exe Token: SeCreateGlobalPrivilege 1768 service.exe Token: 33 1768 service.exe Token: 34 1768 service.exe Token: 35 1768 service.exe Token: 36 1768 service.exe Token: SeBackupPrivilege 2440 dw20.exe Token: SeBackupPrivilege 2440 dw20.exe Token: SeBackupPrivilege 2428 dw20.exe Token: SeBackupPrivilege 2428 dw20.exe Token: SeIncreaseQuotaPrivilege 4508 msdcsc.exe Token: SeSecurityPrivilege 4508 msdcsc.exe Token: SeTakeOwnershipPrivilege 4508 msdcsc.exe Token: SeLoadDriverPrivilege 4508 msdcsc.exe Token: SeSystemProfilePrivilege 4508 msdcsc.exe Token: SeSystemtimePrivilege 4508 msdcsc.exe Token: SeProfSingleProcessPrivilege 4508 msdcsc.exe Token: SeIncBasePriorityPrivilege 4508 msdcsc.exe Token: SeCreatePagefilePrivilege 4508 msdcsc.exe Token: SeBackupPrivilege 4508 msdcsc.exe Token: SeRestorePrivilege 4508 msdcsc.exe Token: SeShutdownPrivilege 4508 msdcsc.exe Token: SeDebugPrivilege 4508 msdcsc.exe Token: SeSystemEnvironmentPrivilege 4508 msdcsc.exe Token: SeChangeNotifyPrivilege 4508 msdcsc.exe Token: SeRemoteShutdownPrivilege 4508 msdcsc.exe Token: SeUndockPrivilege 4508 msdcsc.exe Token: SeManageVolumePrivilege 4508 msdcsc.exe Token: SeImpersonatePrivilege 4508 msdcsc.exe Token: SeCreateGlobalPrivilege 4508 msdcsc.exe Token: 33 4508 msdcsc.exe Token: 34 4508 msdcsc.exe Token: 35 4508 msdcsc.exe Token: 36 4508 msdcsc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exeservice.exeservice.exemsdcsc.exemsdcsc.exemsdcsc.exepid process 4868 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe 384 service.exe 4864 service.exe 2932 msdcsc.exe 4132 msdcsc.exe 4508 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.execmd.exeservice.exeservice.exeservice.execmd.execmd.exemsdcsc.exeSERVICES.EXEWINDOWSLOGIN.EXEmsdcsc.exedescription pid process target process PID 4868 wrote to memory of 3456 4868 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe cmd.exe PID 4868 wrote to memory of 3456 4868 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe cmd.exe PID 4868 wrote to memory of 3456 4868 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe cmd.exe PID 3456 wrote to memory of 1052 3456 cmd.exe reg.exe PID 3456 wrote to memory of 1052 3456 cmd.exe reg.exe PID 3456 wrote to memory of 1052 3456 cmd.exe reg.exe PID 4868 wrote to memory of 384 4868 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe service.exe PID 4868 wrote to memory of 384 4868 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe service.exe PID 4868 wrote to memory of 384 4868 085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe service.exe PID 384 wrote to memory of 4864 384 service.exe service.exe PID 384 wrote to memory of 4864 384 service.exe service.exe PID 384 wrote to memory of 4864 384 service.exe service.exe PID 384 wrote to memory of 4864 384 service.exe service.exe PID 384 wrote to memory of 4864 384 service.exe service.exe PID 384 wrote to memory of 4864 384 service.exe service.exe PID 384 wrote to memory of 4864 384 service.exe service.exe PID 384 wrote to memory of 4864 384 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 4864 wrote to memory of 1768 4864 service.exe service.exe PID 1768 wrote to memory of 4232 1768 service.exe cmd.exe PID 1768 wrote to memory of 4232 1768 service.exe cmd.exe PID 1768 wrote to memory of 4232 1768 service.exe cmd.exe PID 1768 wrote to memory of 3056 1768 service.exe cmd.exe PID 1768 wrote to memory of 3056 1768 service.exe cmd.exe PID 1768 wrote to memory of 3056 1768 service.exe cmd.exe PID 1768 wrote to memory of 2352 1768 service.exe SERVICES.EXE PID 1768 wrote to memory of 2352 1768 service.exe SERVICES.EXE PID 4232 wrote to memory of 2124 4232 cmd.exe attrib.exe PID 4232 wrote to memory of 2124 4232 cmd.exe attrib.exe PID 4232 wrote to memory of 2124 4232 cmd.exe attrib.exe PID 1768 wrote to memory of 224 1768 service.exe WINDOWSLOGIN.EXE PID 1768 wrote to memory of 224 1768 service.exe WINDOWSLOGIN.EXE PID 3056 wrote to memory of 1548 3056 cmd.exe attrib.exe PID 3056 wrote to memory of 1548 3056 cmd.exe attrib.exe PID 3056 wrote to memory of 1548 3056 cmd.exe attrib.exe PID 1768 wrote to memory of 2932 1768 service.exe msdcsc.exe PID 1768 wrote to memory of 2932 1768 service.exe msdcsc.exe PID 1768 wrote to memory of 2932 1768 service.exe msdcsc.exe PID 2932 wrote to memory of 4132 2932 msdcsc.exe msdcsc.exe PID 2932 wrote to memory of 4132 2932 msdcsc.exe msdcsc.exe PID 2932 wrote to memory of 4132 2932 msdcsc.exe msdcsc.exe PID 2932 wrote to memory of 4132 2932 msdcsc.exe msdcsc.exe PID 2932 wrote to memory of 4132 2932 msdcsc.exe msdcsc.exe PID 2932 wrote to memory of 4132 2932 msdcsc.exe msdcsc.exe PID 2932 wrote to memory of 4132 2932 msdcsc.exe msdcsc.exe PID 2932 wrote to memory of 4132 2932 msdcsc.exe msdcsc.exe PID 2352 wrote to memory of 2428 2352 SERVICES.EXE dw20.exe PID 2352 wrote to memory of 2428 2352 SERVICES.EXE dw20.exe PID 224 wrote to memory of 2440 224 WINDOWSLOGIN.EXE dw20.exe PID 224 wrote to memory of 2440 224 WINDOWSLOGIN.EXE dw20.exe PID 4132 wrote to memory of 4508 4132 msdcsc.exe msdcsc.exe PID 4132 wrote to memory of 4508 4132 msdcsc.exe msdcsc.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2124 attrib.exe 1548 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\085a4a5430ccb482aaf5e1f428b2e035_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240646406.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\service.exe" /f3⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\service.exeC:\Users\Admin\AppData\Roaming\Microsoft\service.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Microsoft" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Roaming\Microsoft" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\SERVICES.EXE"C:\Users\Admin\AppData\Local\Temp\SERVICES.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 14486⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\WINDOWSLOGIN.EXE"C:\Users\Admin\AppData\Local\Temp\WINDOWSLOGIN.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 14326⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\MSDCSC\msdcsc.exe"C:\MSDCSC\msdcsc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\MSDCSC\msdcsc.exeC:\MSDCSC\msdcsc.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\MSDCSC\msdcsc.exe7⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4000 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WER755B.tmp.xmlFilesize
4KB
MD5e2bb81451f849a0848a9d18574c9018c
SHA14b189fd237b4b42d7c93132b8fe63463958243be
SHA256bd0ea254b6e047137623cd19a511b686d2aeb0d2812494bf5b04ee42aab0fa89
SHA512a598426adcf44ce1d29f22e5792c68c422ca6345f9b26ff375c1e08cbc6787ea6074e283f7ed1f600945cfb22c58910e9c333ecd96901d3f65498941ede29dee
-
C:\Users\Admin\AppData\Local\Temp\240646406.batFilesize
146B
MD57eee65b102f30fd1ead48a8cd3b99827
SHA12f74a754019f280c6186c11531d460006814952e
SHA2565748c60056db288b67e61148b339778816279e36907977f4fe03b5df04f6b57f
SHA512a06de9e35ada579a95b2ba399e4c65b074d642788d456e10e0ae967896ac729c552f715261d9dc8c17fffca8d6b9144a6155ff11ab8569a82bdbd9d26109bd85
-
C:\Users\Admin\AppData\Local\Temp\SERVICES.EXEFilesize
6KB
MD50b3db22d987384297d6d3e37bbb42525
SHA1505682a108f0cf55caaeca6c781f4d49cc2d8edf
SHA256883b8f25dec2a5f565c45363f81402969ce5b5e4d03fc565ccc2fd162916aa00
SHA512b03cae2a2fcd46b0fde982214a11db50f6443d85efcf67b51ef60bb5a9fa3b0ad4b6b274c6175c634c7d343ee9253877d52712d1fee0e5b8843e1d3301273ae8
-
C:\Users\Admin\AppData\Local\Temp\WINDOWSLOGIN.EXEFilesize
6KB
MD5d52e36ac4ab591f5cac32b433d2134fc
SHA1868df7e02042482a37cae9c1b1b7cc25e63b7ab2
SHA256968266055dfa20300ee91a14f3344864b07cd1505054186f91946cccfcb96207
SHA512c77c10dbcf58a86a384b413bb064df1af535af48744fe744d03cdfee16df1efa8275216b9cbe083294dac4cfd9e3445e7bb5e1f9051f462be484ae95ab622541
-
C:\Users\Admin\AppData\Local\Temp\tmpcmd.batFilesize
57B
MD5960ff9f0fdcc7fe6180f159185b228dd
SHA1562e42c0f4c5c1b30b086cd1c110645391bb9cb2
SHA256527513b95baf56c82cc823317b90be26f3d3f3ece8046152cdbb0e8092e7d44d
SHA512a3a4d87968efc28b2d736ebd2d9b818c2e7d58d2588124e05f71d82a1a9b0dd5ae8c145b5b8098089d480da93ad535a427d648f6230f6e2bacfda9056110dc62
-
C:\Users\Admin\AppData\Roaming\Microsoft\service.exeFilesize
1.7MB
MD5d0a34581ffb8d6d99ef29b6e46e06ab8
SHA15a169f12cf42262ffd62cc1bab213654d7a4dac6
SHA256e59240de73344a6cb74551be43702ca23b8c0156ba8cbcb842118509360657f1
SHA512515068e21b1fbb018651e0e53394a5171d92d65eb3de4105efe067cb05f173d6e68d5b908c6684bcf5c53b1891a5752b4b4176044f63e805d7d0896e6c3fd941
-
memory/224-82-0x000000001BEB0000-0x000000001BF56000-memory.dmpFilesize
664KB
-
memory/1768-32-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/1768-35-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/1768-28-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/1768-30-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/1768-77-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4132-85-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4132-106-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4132-100-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4508-113-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-115-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-121-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-103-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-105-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-120-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-108-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-109-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-110-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-112-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-111-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-119-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-114-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-118-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-116-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4508-117-0x0000000000400000-0x00000000004C6000-memory.dmpFilesize
792KB
-
memory/4864-20-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4864-31-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4864-27-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4864-24-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB