Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 05:40

General

  • Target

    772952cfacf381892590ce0ccc4bb384_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    772952cfacf381892590ce0ccc4bb384

  • SHA1

    734e0306c531e9ffbf22b60e7c744e04f65fa79f

  • SHA256

    0b36f9990b83338a823f030e12fcd9a866a2cfcb434150d3e59c708a80a88102

  • SHA512

    1bc8e5145a9c5fde67c5df7289b32fee5720b5af7007c3fd5c3287c74c4754812552c2b6cef2ce77582233b8a8a2312975acc5c7687b0694cdec528456912d21

  • SSDEEP

    768:gqipbWxcGn+dNHyIztJT2W/V4EaRS8ZGMhpyNKnoBXzHpBRjG8CkFMRKVytHmDbX:6ScCqrztJi2icNKnoBX7RylHmH

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 31 IoCs
  • Loads dropped DLL 64 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 62 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 63 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\772952cfacf381892590ce0ccc4bb384_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\772952cfacf381892590ce0ccc4bb384_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\SysWOW64\nlsdata0009.exe
      "C:\Windows\system32\nlsdata0009.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Windows\SysWOW64\connect.exe
        "C:\Windows\system32\connect.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Windows\SysWOW64\kbdbu.exe
          "C:\Windows\system32\kbdbu.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Windows\SysWOW64\remotepg.exe
            "C:\Windows\system32\remotepg.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3004
            • C:\Windows\SysWOW64\dmband.exe
              "C:\Windows\system32\dmband.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2148
              • C:\Windows\SysWOW64\msmpeg2enc.exe
                "C:\Windows\system32\msmpeg2enc.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:780
                • C:\Windows\SysWOW64\kbd103.exe
                  "C:\Windows\system32\kbd103.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1088
                  • C:\Windows\SysWOW64\msident.exe
                    "C:\Windows\system32\msident.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    PID:328
                    • C:\Windows\SysWOW64\gcdef.exe
                      "C:\Windows\system32\gcdef.exe"
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      PID:1300
                      • C:\Windows\SysWOW64\wmdrmdev.exe
                        "C:\Windows\system32\wmdrmdev.exe"
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        PID:2980
                        • C:\Windows\SysWOW64\comres.exe
                          "C:\Windows\system32\comres.exe"
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          PID:2116
                          • C:\Windows\SysWOW64\kbdurdu.exe
                            "C:\Windows\system32\kbdurdu.exe"
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            PID:1076
                            • C:\Windows\SysWOW64\prnfldr.exe
                              "C:\Windows\system32\prnfldr.exe"
                              14⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              PID:2136
                              • C:\Windows\SysWOW64\nlsdata0010.exe
                                "C:\Windows\system32\nlsdata0010.exe"
                                15⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                PID:1356
                                • C:\Windows\SysWOW64\onexui.exe
                                  "C:\Windows\system32\onexui.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  PID:2624
                                  • C:\Windows\SysWOW64\racengn.exe
                                    "C:\Windows\system32\racengn.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    PID:2824
                                    • C:\Windows\SysWOW64\netprofm.exe
                                      "C:\Windows\system32\netprofm.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      PID:2648
                                      • C:\Windows\SysWOW64\smartcardcredentialprovider.exe
                                        "C:\Windows\system32\smartcardcredentialprovider.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        PID:2604
                                        • C:\Windows\SysWOW64\kbdda.exe
                                          "C:\Windows\system32\kbdda.exe"
                                          20⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • System Location Discovery: System Language Discovery
                                          PID:1200
                                          • C:\Windows\SysWOW64\api-ms-win-crt-process-l1-1-0.exe
                                            "C:\Windows\system32\api-ms-win-crt-process-l1-1-0.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • System Location Discovery: System Language Discovery
                                            PID:1444
                                            • C:\Windows\SysWOW64\srhelper.exe
                                              "C:\Windows\system32\srhelper.exe"
                                              22⤵
                                              • Executes dropped EXE
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              PID:1076
                                              • C:\Windows\SysWOW64\mssvp.exe
                                                "C:\Windows\system32\mssvp.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                • Drops file in System32 directory
                                                • System Location Discovery: System Language Discovery
                                                PID:1772
                                                • C:\Windows\SysWOW64\tlscsp.exe
                                                  "C:\Windows\system32\tlscsp.exe"
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Drops file in System32 directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2440
                                                  • C:\Windows\SysWOW64\rpcndfp.exe
                                                    "C:\Windows\system32\rpcndfp.exe"
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1684
                                                    • C:\Windows\SysWOW64\shdocvw.exe
                                                      "C:\Windows\system32\shdocvw.exe"
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • Drops file in System32 directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1700
                                                      • C:\Windows\SysWOW64\kbdycc.exe
                                                        "C:\Windows\system32\kbdycc.exe"
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1188
                                                        • C:\Windows\SysWOW64\mswstr10.exe
                                                          "C:\Windows\system32\mswstr10.exe"
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1748
                                                          • C:\Windows\SysWOW64\gpedit.exe
                                                            "C:\Windows\system32\gpedit.exe"
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:552
                                                            • C:\Windows\SysWOW64\odbcbcp.exe
                                                              "C:\Windows\system32\odbcbcp.exe"
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2268
                                                              • C:\Windows\SysWOW64\httpapi.exe
                                                                "C:\Windows\system32\httpapi.exe"
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Drops file in System32 directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2680
                                                                • C:\Windows\SysWOW64\nlsdata0003.exe
                                                                  "C:\Windows\system32\nlsdata0003.exe"
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2652
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\httpapi.exe"
                                                                  32⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2944
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\odbcbcp.exe"
                                                                31⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:2884
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\gpedit.exe"
                                                              30⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1264
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\mswstr10.exe"
                                                            29⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:592
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\kbdycc.exe"
                                                          28⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:928
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\shdocvw.exe"
                                                        27⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1152
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\rpcndfp.exe"
                                                      26⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2732
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\tlscsp.exe"
                                                    25⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3000
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\mssvp.exe"
                                                  24⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2800
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 180
                                                  24⤵
                                                  • Program crash
                                                  PID:1728
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\srhelper.exe"
                                                23⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2136
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\api-ms-win-crt-process-l1-1-0.exe"
                                              22⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1716
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 184
                                              22⤵
                                              • Program crash
                                              PID:976
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\kbdda.exe"
                                            21⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2248
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\smartcardcredentialprovider.exe"
                                          20⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:1748
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\netprofm.exe"
                                        19⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2080
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\racengn.exe"
                                      18⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2592
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\onexui.exe"
                                    17⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1092
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\nlsdata0010.exe"
                                  16⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1880
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\prnfldr.exe"
                                15⤵
                                • System Location Discovery: System Language Discovery
                                PID:1732
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\kbdurdu.exe"
                              14⤵
                              • System Location Discovery: System Language Discovery
                              PID:2572
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\comres.exe"
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:1760
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wmdrmdev.exe"
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:2076
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 180
                          12⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:2460
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\gcdef.exe"
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:2144
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\msident.exe"
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:3016
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\kbd103.exe"
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:2432
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\msmpeg2enc.exe"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2260
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\dmband.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1064
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\remotepg.exe"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2836
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\kbdbu.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2304
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\connect.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2592
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\nlsdata0009.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1488
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\772952cfacf381892590ce0ccc4bb384_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X485E6GN.txt

    Filesize

    98B

    MD5

    019a39d5a31feb4da317e5d996198615

    SHA1

    b3bea73a09ec63a17595f676fe1dbb379cb4f786

    SHA256

    be7e5e128794a8cfed4b61c57c902c498ce79c72025c806a1e29581c87ee11d3

    SHA512

    ff96b3348e13aa8457c6029f52d7b60796693f57f6908e3f9cb1e7a95a21ea96b41781d20a5061c6e66c67c1f7eea859b96d0c0ad83d47f3ea7d9cb83f190474

  • C:\Windows\SysWOW64\nlsdata0009.exe

    Filesize

    65KB

    MD5

    5128b97605fb852e9bb9f04f846792c3

    SHA1

    15edd8d260fdf6dcc90a32f51e1e60e80d6f306e

    SHA256

    64f96d9048b5b695e7ce2ab3c8588c21ee0964a867a4a5f2ce5d6fa5f1078607

    SHA512

    76d757fe9bda1b2ca39401e12b8ad29f8d8f863e0e6df59049000bf1b5aba4f689c52c6e18ac9a8c87078159f2f4844b28e5f9517cee4a73af20924ea5db93a6

  • \Windows\SysWOW64\connect.exe

    Filesize

    65KB

    MD5

    c524ff130210a5d455c18c8ae85ec04c

    SHA1

    33f80ec5e5d77a837a37f44e008a9a337469c297

    SHA256

    585238e845d0313d195571cc258aff14cda329f52e96769df37ae8e9c318688c

    SHA512

    effd9e328cb016288e359b581e0912e47161e77bb2c6b55407fa08287cfef4b5bf326cbf0e409f2ef1ba24fe74d2ab88e4fcc3e6824c23daff7e3d90be589a1c

  • \Windows\SysWOW64\dmband.exe

    Filesize

    65KB

    MD5

    40aab215492df2e22bfc5547b76ff6b3

    SHA1

    7c00534cf1ca6379c8603f742bfe73f4b13f4e19

    SHA256

    041ddcc951128e33846d166837837a3a7f41c41cafde259260e7abeb4492230b

    SHA512

    9b4e954500b64cbea2967970ef63afe7d3d4b8d4effe4b48120b293fd2fe61f9f8fae54e24f4708d09d68a017882149df171116cc269405c078907f9aa65baeb

  • \Windows\SysWOW64\gcdef.exe

    Filesize

    65KB

    MD5

    38d77d2e4fbfdaee96dedcac1a785bc4

    SHA1

    dd6b6cb706b6eea62dfaf74ea5b60602eb002003

    SHA256

    a7125d09794a2b1b86fcd2c1221454c810db4e172e4561b6c15c7c227c905009

    SHA512

    36c0ffaebc9e9a4d509979d2da79b97ee9bad2251139fdd16d5b0588aa8bba69746e0afc0ab52fc0892d3316c82242186ebea4d6d730021e682a85534d967211

  • \Windows\SysWOW64\kbd103.exe

    Filesize

    65KB

    MD5

    6c89620981138a0f051611037584cef7

    SHA1

    80ccf1c5792d030f3039e6d1138925077a2fdde9

    SHA256

    1a27f5cd20d01e78e0c9ea1a861f0e1e23f1e70308114591881aaa5739bbeaae

    SHA512

    64e1a45cbd799bc35fda2b9fb63333d060f3fa1cc373512a62d3a2af5fac13792b46f4c4940db1004480a8d09d0d32ca8de2606908506a26de2659785fa7b26b

  • \Windows\SysWOW64\kbdbu.exe

    Filesize

    65KB

    MD5

    67260a94f30ef7975679a214948cfbef

    SHA1

    f0609f560e09d7c710582e0decef882e59892dca

    SHA256

    01e9a6d3ca7c2734a6e632ee97a8addbd125195017f6fadea66caf78bc1fe190

    SHA512

    801d003e4b1db14886f62fb962c528f7263033d90711090f509cdd6f93bd22f525cffee6a2eb710f94bafbfe1b2fdc7c9e44e770c144d0c29923c158f58ce063

  • \Windows\SysWOW64\msident.exe

    Filesize

    65KB

    MD5

    6dab6f0a0e0c2c35926f7ee9afb399ff

    SHA1

    f893b535c4168cfd2b8f48a70bb54f87b49bc0e6

    SHA256

    2180019d9132f69350df141e7118d067b2f43290764445f4c9957b3ece9ba273

    SHA512

    cc5eecc465eccdd11cb5f395562ee9daac3cc0c645c3043c5b483a4a4de56aa314d86f38048c211c39ae5baf09f2bfa2a0556a2e95620e8ddbe9816bb38814e7

  • \Windows\SysWOW64\msmpeg2enc.exe

    Filesize

    65KB

    MD5

    7839daa557e7e0ffa9741d789ae6da27

    SHA1

    0328485ec39d982e77f01412407ad7241c020e9a

    SHA256

    403e99915914213f1bdcdf720b63ee77a32fe04691a06ec806349d3909eb45ae

    SHA512

    757d2f652d558e1d311e3c0667ab7bc073a1bfa1cc4ce60705f6dd1a8735f216fbb80e374f25955bf885c5d42eba71e818f8a5146e05c32e9cd5f3d326c3a994

  • \Windows\SysWOW64\remotepg.exe

    Filesize

    65KB

    MD5

    bae8406f058ef547294664d3909df74f

    SHA1

    fcc8437b40632703a86a1bc7c7a72371773598cd

    SHA256

    887553ebb80e7bdbd3cd9fd31946ce4fe92c903189694a943ef2ae32fde4a331

    SHA512

    aabaa4d5ef2b87686235a1df726032a17d6e6e5a8f17618be97710693a6025de76a67885f0b5d786235f051749c1ec10ffcb59593d35a5efd7805aa6824300c6

  • \Windows\SysWOW64\wmdrmdev.exe

    Filesize

    65KB

    MD5

    a4db403e66256274b412715c215877a9

    SHA1

    413e9b1bc3d6b862a5e58d4cddfbe0616e869482

    SHA256

    8ebb32c25a94f8d9a8431fd552ca6ae8e95bbbe7c288ce65e4d7e0bb4dbb7c74

    SHA512

    64af1f0c48178c0f124e4ab9110a9a58460d0c91ca63376f4be020f206466573baf3b518c913030d64781c6ad7e2b155417085bb3ed70d0eedb688c3d95c97d9

  • memory/328-198-0x0000000004010000-0x0000000004023000-memory.dmp

    Filesize

    76KB

  • memory/328-195-0x0000000004010000-0x0000000004023000-memory.dmp

    Filesize

    76KB

  • memory/328-179-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/328-196-0x0000000004010000-0x0000000004023000-memory.dmp

    Filesize

    76KB

  • memory/328-201-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/328-197-0x0000000004010000-0x0000000004023000-memory.dmp

    Filesize

    76KB

  • memory/780-132-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/780-153-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1076-270-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1076-268-0x0000000003D30000-0x0000000003D43000-memory.dmp

    Filesize

    76KB

  • memory/1076-267-0x0000000003D20000-0x0000000003D33000-memory.dmp

    Filesize

    76KB

  • memory/1076-266-0x0000000003D20000-0x0000000003D33000-memory.dmp

    Filesize

    76KB

  • memory/1076-251-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1088-171-0x00000000034E0000-0x00000000034F3000-memory.dmp

    Filesize

    76KB

  • memory/1088-174-0x00000000034F0000-0x0000000003503000-memory.dmp

    Filesize

    76KB

  • memory/1088-172-0x00000000034E0000-0x00000000034F3000-memory.dmp

    Filesize

    76KB

  • memory/1088-177-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1088-173-0x00000000034F0000-0x0000000003503000-memory.dmp

    Filesize

    76KB

  • memory/1088-154-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1200-370-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1300-217-0x0000000003EF0000-0x0000000003F03000-memory.dmp

    Filesize

    76KB

  • memory/1300-218-0x0000000003EF0000-0x0000000003F03000-memory.dmp

    Filesize

    76KB

  • memory/1300-219-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1300-216-0x0000000003EF0000-0x0000000003F03000-memory.dmp

    Filesize

    76KB

  • memory/1300-203-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1356-303-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1356-291-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2072-66-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2072-59-0x0000000003AC0000-0x0000000003AD3000-memory.dmp

    Filesize

    76KB

  • memory/2072-60-0x0000000003FF0000-0x0000000004003000-memory.dmp

    Filesize

    76KB

  • memory/2072-61-0x0000000003FF0000-0x0000000004003000-memory.dmp

    Filesize

    76KB

  • memory/2116-249-0x0000000002300000-0x0000000002313000-memory.dmp

    Filesize

    76KB

  • memory/2116-250-0x0000000002300000-0x0000000002313000-memory.dmp

    Filesize

    76KB

  • memory/2116-252-0x0000000002300000-0x0000000002310000-memory.dmp

    Filesize

    64KB

  • memory/2116-236-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2116-253-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2136-287-0x0000000002280000-0x0000000002293000-memory.dmp

    Filesize

    76KB

  • memory/2136-288-0x0000000002280000-0x0000000002293000-memory.dmp

    Filesize

    76KB

  • memory/2136-290-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2136-289-0x0000000002280000-0x0000000002293000-memory.dmp

    Filesize

    76KB

  • memory/2136-269-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2148-133-0x0000000003F00000-0x0000000003F10000-memory.dmp

    Filesize

    64KB

  • memory/2148-130-0x0000000003EF0000-0x0000000003F03000-memory.dmp

    Filesize

    76KB

  • memory/2148-134-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2148-131-0x0000000004230000-0x0000000004243000-memory.dmp

    Filesize

    76KB

  • memory/2536-12-0x0000000003F00000-0x0000000003F13000-memory.dmp

    Filesize

    76KB

  • memory/2536-21-0x0000000003680000-0x0000000003690000-memory.dmp

    Filesize

    64KB

  • memory/2536-22-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2536-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2536-11-0x0000000003F00000-0x0000000003F13000-memory.dmp

    Filesize

    76KB

  • memory/2604-369-0x0000000003E10000-0x0000000003E23000-memory.dmp

    Filesize

    76KB

  • memory/2604-368-0x0000000003E10000-0x0000000003E23000-memory.dmp

    Filesize

    76KB

  • memory/2604-367-0x0000000003E10000-0x0000000003E23000-memory.dmp

    Filesize

    76KB

  • memory/2604-366-0x0000000003E10000-0x0000000003E23000-memory.dmp

    Filesize

    76KB

  • memory/2624-304-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2624-316-0x00000000034D0000-0x00000000034E3000-memory.dmp

    Filesize

    76KB

  • memory/2624-315-0x00000000034D0000-0x00000000034E3000-memory.dmp

    Filesize

    76KB

  • memory/2624-320-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2624-319-0x00000000034E0000-0x00000000034F0000-memory.dmp

    Filesize

    64KB

  • memory/2648-351-0x0000000003E50000-0x0000000003E63000-memory.dmp

    Filesize

    76KB

  • memory/2648-354-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2648-353-0x00000000034F0000-0x0000000003500000-memory.dmp

    Filesize

    64KB

  • memory/2648-349-0x0000000003E50000-0x0000000003E63000-memory.dmp

    Filesize

    76KB

  • memory/2648-337-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2648-352-0x0000000003E50000-0x0000000003E63000-memory.dmp

    Filesize

    76KB

  • memory/2648-350-0x0000000003E50000-0x0000000003E63000-memory.dmp

    Filesize

    76KB

  • memory/2800-20-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2800-42-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2824-332-0x0000000003E60000-0x0000000003E73000-memory.dmp

    Filesize

    76KB

  • memory/2824-333-0x0000000003E60000-0x0000000003E73000-memory.dmp

    Filesize

    76KB

  • memory/2824-335-0x0000000003E70000-0x0000000003E83000-memory.dmp

    Filesize

    76KB

  • memory/2824-334-0x0000000003E70000-0x0000000003E83000-memory.dmp

    Filesize

    76KB

  • memory/2824-336-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2824-318-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2920-85-0x0000000003B90000-0x0000000003BA3000-memory.dmp

    Filesize

    76KB

  • memory/2920-84-0x0000000003B90000-0x0000000003BA3000-memory.dmp

    Filesize

    76KB

  • memory/2920-83-0x0000000003B90000-0x0000000003BA3000-memory.dmp

    Filesize

    76KB

  • memory/2920-88-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2920-63-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-274-0x0000000003570000-0x0000000003583000-memory.dmp

    Filesize

    76KB

  • memory/2980-232-0x0000000003570000-0x0000000003583000-memory.dmp

    Filesize

    76KB

  • memory/2980-273-0x0000000003570000-0x0000000003583000-memory.dmp

    Filesize

    76KB

  • memory/2980-272-0x0000000003570000-0x0000000003583000-memory.dmp

    Filesize

    76KB

  • memory/2980-271-0x0000000003570000-0x0000000003583000-memory.dmp

    Filesize

    76KB

  • memory/2980-254-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-220-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2980-235-0x0000000003570000-0x0000000003583000-memory.dmp

    Filesize

    76KB

  • memory/2980-237-0x0000000003570000-0x0000000003580000-memory.dmp

    Filesize

    64KB

  • memory/2980-279-0x0000000003570000-0x0000000003580000-memory.dmp

    Filesize

    64KB

  • memory/2980-233-0x0000000003570000-0x0000000003583000-memory.dmp

    Filesize

    76KB

  • memory/2980-234-0x0000000003570000-0x0000000003583000-memory.dmp

    Filesize

    76KB

  • memory/3004-107-0x00000000032B0000-0x00000000032C3000-memory.dmp

    Filesize

    76KB

  • memory/3004-89-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3004-106-0x00000000032B0000-0x00000000032C3000-memory.dmp

    Filesize

    76KB

  • memory/3004-110-0x00000000032B0000-0x00000000032C0000-memory.dmp

    Filesize

    64KB

  • memory/3004-111-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB