Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 05:57
Static task
static1
Behavioral task
behavioral1
Sample
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe
-
Size
608KB
-
MD5
1e3b51ee48e2e008bc76134ca96afdb7
-
SHA1
62fecd92a8b328f23c5f6dbb74925208870d8092
-
SHA256
96ef9ae86c094b1176697a5d5945b4471a9f76b6b586a70a9cab88f9a3593a20
-
SHA512
f32a3097cc9d55b290b51898d3a75f503998af35ce32c532571f57c4355b00b97821a698ab32d6e6657dc0630e74faecb1fcb70c854607544002dd2fd45e7621
-
SSDEEP
12288:Y7yse1uS1O7vy9sU9lNz79wAx80rXtjQEeNIA:Y7yruS476zld9w/XNI
Malware Config
Extracted
darkcomet
Guest16
192.168.254.104:1604
DC_MUTEX-HEGGY71
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
7PdTJfZEBdbx
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" iexplore.exe -
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 2644 attrib.exe 2640 attrib.exe -
Executes dropped EXE 4 IoCs
Processes:
FUCK.EXEmsdcsc.exeFUCK.EXEFUCK.EXEpid process 3012 FUCK.EXE 2920 msdcsc.exe 2792 FUCK.EXE 2580 FUCK.EXE -
Loads dropped DLL 5 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exemsdcsc.exeiexplore.exepid process 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe 2920 msdcsc.exe 2648 iexplore.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\FUCK.EXE upx behavioral1/memory/2316-7-0x0000000003810000-0x00000000038D2000-memory.dmp upx behavioral1/memory/3012-11-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2792-27-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2580-34-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/3012-35-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2792-36-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2792-37-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/3012-38-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exemsdcsc.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MSDCSC\\msdcsc.exe" iexplore.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2792-27-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/2580-34-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/3012-35-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/2792-36-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/2792-37-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/3012-38-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 2920 set thread context of 2648 2920 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeSecurityPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeSystemtimePrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeBackupPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeRestorePrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeShutdownPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeDebugPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeUndockPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeManageVolumePrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeImpersonatePrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: 33 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: 34 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: 35 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2920 msdcsc.exe Token: SeSecurityPrivilege 2920 msdcsc.exe Token: SeTakeOwnershipPrivilege 2920 msdcsc.exe Token: SeLoadDriverPrivilege 2920 msdcsc.exe Token: SeSystemProfilePrivilege 2920 msdcsc.exe Token: SeSystemtimePrivilege 2920 msdcsc.exe Token: SeProfSingleProcessPrivilege 2920 msdcsc.exe Token: SeIncBasePriorityPrivilege 2920 msdcsc.exe Token: SeCreatePagefilePrivilege 2920 msdcsc.exe Token: SeBackupPrivilege 2920 msdcsc.exe Token: SeRestorePrivilege 2920 msdcsc.exe Token: SeShutdownPrivilege 2920 msdcsc.exe Token: SeDebugPrivilege 2920 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2920 msdcsc.exe Token: SeChangeNotifyPrivilege 2920 msdcsc.exe Token: SeRemoteShutdownPrivilege 2920 msdcsc.exe Token: SeUndockPrivilege 2920 msdcsc.exe Token: SeManageVolumePrivilege 2920 msdcsc.exe Token: SeImpersonatePrivilege 2920 msdcsc.exe Token: SeCreateGlobalPrivilege 2920 msdcsc.exe Token: 33 2920 msdcsc.exe Token: 34 2920 msdcsc.exe Token: 35 2920 msdcsc.exe Token: SeIncreaseQuotaPrivilege 2648 iexplore.exe Token: SeSecurityPrivilege 2648 iexplore.exe Token: SeTakeOwnershipPrivilege 2648 iexplore.exe Token: SeLoadDriverPrivilege 2648 iexplore.exe Token: SeSystemProfilePrivilege 2648 iexplore.exe Token: SeSystemtimePrivilege 2648 iexplore.exe Token: SeProfSingleProcessPrivilege 2648 iexplore.exe Token: SeIncBasePriorityPrivilege 2648 iexplore.exe Token: SeCreatePagefilePrivilege 2648 iexplore.exe Token: SeBackupPrivilege 2648 iexplore.exe Token: SeRestorePrivilege 2648 iexplore.exe Token: SeShutdownPrivilege 2648 iexplore.exe Token: SeDebugPrivilege 2648 iexplore.exe Token: SeSystemEnvironmentPrivilege 2648 iexplore.exe Token: SeChangeNotifyPrivilege 2648 iexplore.exe Token: SeRemoteShutdownPrivilege 2648 iexplore.exe Token: SeUndockPrivilege 2648 iexplore.exe Token: SeManageVolumePrivilege 2648 iexplore.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
Processes:
FUCK.EXEFUCK.EXEFUCK.EXEpid process 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 2580 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE -
Suspicious use of SendNotifyMessage 54 IoCs
Processes:
FUCK.EXEFUCK.EXEFUCK.EXEpid process 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2580 FUCK.EXE 2792 FUCK.EXE 2580 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 2792 FUCK.EXE 2792 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE 3012 FUCK.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 2648 iexplore.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.execmd.execmd.exemsdcsc.exeiexplore.exedescription pid process target process PID 2316 wrote to memory of 1896 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 1896 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 1896 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 1896 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 2108 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 2108 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 2108 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 2316 wrote to memory of 2108 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe cmd.exe PID 1896 wrote to memory of 2644 1896 cmd.exe attrib.exe PID 1896 wrote to memory of 2644 1896 cmd.exe attrib.exe PID 1896 wrote to memory of 2644 1896 cmd.exe attrib.exe PID 1896 wrote to memory of 2644 1896 cmd.exe attrib.exe PID 2316 wrote to memory of 3012 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe FUCK.EXE PID 2316 wrote to memory of 3012 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe FUCK.EXE PID 2316 wrote to memory of 3012 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe FUCK.EXE PID 2316 wrote to memory of 3012 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe FUCK.EXE PID 2108 wrote to memory of 2640 2108 cmd.exe attrib.exe PID 2108 wrote to memory of 2640 2108 cmd.exe attrib.exe PID 2108 wrote to memory of 2640 2108 cmd.exe attrib.exe PID 2108 wrote to memory of 2640 2108 cmd.exe attrib.exe PID 2316 wrote to memory of 2920 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe msdcsc.exe PID 2316 wrote to memory of 2920 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe msdcsc.exe PID 2316 wrote to memory of 2920 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe msdcsc.exe PID 2316 wrote to memory of 2920 2316 1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe msdcsc.exe PID 2920 wrote to memory of 2792 2920 msdcsc.exe FUCK.EXE PID 2920 wrote to memory of 2792 2920 msdcsc.exe FUCK.EXE PID 2920 wrote to memory of 2792 2920 msdcsc.exe FUCK.EXE PID 2920 wrote to memory of 2792 2920 msdcsc.exe FUCK.EXE PID 2920 wrote to memory of 2648 2920 msdcsc.exe iexplore.exe PID 2920 wrote to memory of 2648 2920 msdcsc.exe iexplore.exe PID 2920 wrote to memory of 2648 2920 msdcsc.exe iexplore.exe PID 2920 wrote to memory of 2648 2920 msdcsc.exe iexplore.exe PID 2920 wrote to memory of 2648 2920 msdcsc.exe iexplore.exe PID 2920 wrote to memory of 2648 2920 msdcsc.exe iexplore.exe PID 2648 wrote to memory of 2580 2648 iexplore.exe FUCK.EXE PID 2648 wrote to memory of 2580 2648 iexplore.exe FUCK.EXE PID 2648 wrote to memory of 2580 2648 iexplore.exe FUCK.EXE PID 2648 wrote to memory of 2580 2648 iexplore.exe FUCK.EXE -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2644 attrib.exe 2640 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\1e3b51ee48e2e008bc76134ca96afdb7_JaffaCakes118.exe" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"C:\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exe"2⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies security service
- Windows security bypass
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"C:\Users\Admin\AppData\Local\Temp\FUCK.EXE"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\FUCK.EXEFilesize
294KB
MD56eb20cdb2c86eca34875b5595583a84b
SHA1c126d17216de9e4cda99588f0c36cb0dc57ec2c9
SHA25626fe95fb0564d2b0184c7f95bd8b0d6c7a31022d2a50a3798f62e3b7da1ab949
SHA512a1870f335970b00e251e00f5afd183653ac6d77a44369c679bdf939157a175ec87c3143b5b30e060032e36db7169d3c4e9b817a2d4fc22f4ee040b860bfec364
-
\Users\Admin\AppData\Local\Temp\MSDCSC\msdcsc.exeFilesize
608KB
MD51e3b51ee48e2e008bc76134ca96afdb7
SHA162fecd92a8b328f23c5f6dbb74925208870d8092
SHA25696ef9ae86c094b1176697a5d5945b4471a9f76b6b586a70a9cab88f9a3593a20
SHA512f32a3097cc9d55b290b51898d3a75f503998af35ce32c532571f57c4355b00b97821a698ab32d6e6657dc0630e74faecb1fcb70c854607544002dd2fd45e7621
-
memory/2316-16-0x0000000003C50000-0x0000000003D7E000-memory.dmpFilesize
1.2MB
-
memory/2316-7-0x0000000003810000-0x00000000038D2000-memory.dmpFilesize
776KB
-
memory/2316-0-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/2316-1-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/2316-23-0x0000000003C50000-0x0000000003D7E000-memory.dmpFilesize
1.2MB
-
memory/2316-24-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/2580-34-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2792-36-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2792-27-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2792-37-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/2920-31-0x0000000000400000-0x000000000052E000-memory.dmpFilesize
1.2MB
-
memory/3012-11-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/3012-35-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB
-
memory/3012-38-0x0000000000400000-0x00000000004C2000-memory.dmpFilesize
776KB