Analysis

  • max time kernel
    108s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 07:17

General

  • Target

    b28fbffaca9e1074a6b02f7aa96f4ca4_JaffaCakes118.dll

  • Size

    1.2MB

  • MD5

    b28fbffaca9e1074a6b02f7aa96f4ca4

  • SHA1

    832224f36aa0dc4386000d1783d46dbd1c99fe36

  • SHA256

    fb0cfe24560a2dceaf2d198ffb4ebd793ee92fdedaaf63f54a32addd92728599

  • SHA512

    c14b11357ac2d9657d0186a695a54072e55e598e8dd2f78b789001e8c5d7854a4fbf4cdddf3eb5a86daf8f42da6d7bfe16d4f29997c34c0d6023d0bfcc680bb0

  • SSDEEP

    24576:xuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:j9cKrUqZWLAcU

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b28fbffaca9e1074a6b02f7aa96f4ca4_JaffaCakes118.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1180
  • C:\Windows\system32\DeviceEnroller.exe
    C:\Windows\system32\DeviceEnroller.exe
    1⤵
      PID:3748
    • C:\Users\Admin\AppData\Local\oL9\DeviceEnroller.exe
      C:\Users\Admin\AppData\Local\oL9\DeviceEnroller.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4564
    • C:\Windows\system32\MusNotifyIcon.exe
      C:\Windows\system32\MusNotifyIcon.exe
      1⤵
        PID:1224
      • C:\Users\Admin\AppData\Local\p3FHdNWcW\MusNotifyIcon.exe
        C:\Users\Admin\AppData\Local\p3FHdNWcW\MusNotifyIcon.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4260
      • C:\Windows\system32\Magnify.exe
        C:\Windows\system32\Magnify.exe
        1⤵
          PID:1384
        • C:\Users\Admin\AppData\Local\1hiuFNg\Magnify.exe
          C:\Users\Admin\AppData\Local\1hiuFNg\Magnify.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3192
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4424
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:1288
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:3236
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3992
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:532
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:4136
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4428
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of SendNotifyMessage
          PID:5004
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2876
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:1500
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          PID:2264
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:2728
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4672
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          PID:692
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:4216
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3824
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:4244
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:4048
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:2996
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:3888
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:1528
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:4076
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:2880
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:3252
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:3732
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:2356
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:4100
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:4176
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:1672
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:1768
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                        PID:2880
                                      • C:\Windows\explorer.exe
                                        explorer.exe
                                        1⤵
                                          PID:2288
                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                          1⤵
                                            PID:4380
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:3812
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:3972
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:4992
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:2736
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:1936
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:628
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:4132
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:2436

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                            Filesize

                                                            471B

                                                            MD5

                                                            69110a181e6196eab88822a1d7c54fad

                                                            SHA1

                                                            5200454f3298d903a8dcb531c188a2b12f963239

                                                            SHA256

                                                            a1acefdaa4f3826d48b629b9b15f8e39edca9d23d96271745679a464d38b1646

                                                            SHA512

                                                            11ca8a5dc520628849db5702fa9936cdf001cf62da467b737350ed70ce1f70cdd1b8e81367d2687944711ea0b956fbd5051bca9926112024581ddeaf45250e33

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                            Filesize

                                                            420B

                                                            MD5

                                                            e2e9aab21a424b381ae01eb9dbcf1c6e

                                                            SHA1

                                                            9ad120ec6ae5b3b439d514ca880a9ca4e1355cd7

                                                            SHA256

                                                            28258264dfc040ff13c323071ef2bde0a1a2018fbd8c3a941c54a407e4e7e014

                                                            SHA512

                                                            71a87564c1b67b7cb55e01aae8199bb4524136e2ccdaa191a9b0a659e3b867894b7a1298231c59131c7ee945f2bd2e8fdf46f0c6cee5d904b9915bc76a468502

                                                          • C:\Users\Admin\AppData\Local\1hiuFNg\Magnify.exe

                                                            Filesize

                                                            639KB

                                                            MD5

                                                            4029890c147e3b4c6f41dfb5f9834d42

                                                            SHA1

                                                            10d08b3f6dabe8171ca2dd52e5737e3402951c75

                                                            SHA256

                                                            57137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d

                                                            SHA512

                                                            dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d

                                                          • C:\Users\Admin\AppData\Local\1hiuFNg\OLEACC.dll

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            3b6cd7d28f0e5ee107e8b6dc42f66d8d

                                                            SHA1

                                                            2523d8125be9ef358501c38b12ef3c44be5b92a1

                                                            SHA256

                                                            de172193f4c2ef5bb4bc3aca2fdcfbb5232c78f1319c1edcaa5ced0217fec3d4

                                                            SHA512

                                                            b2c976a9d03fbfe200473508465ffdc8c32ca979cb5de72f32182dfa1f6fa3b7fe10cffc675e9d56801de548e9e112934dc52295be4d6eff2bf80ea8b0d75788

                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            4afbcf6530431f3fc66cf5f87a23d478

                                                            SHA1

                                                            43d04fce1ca320ea13de10325934a47233908c8c

                                                            SHA256

                                                            cc3bd6dd1d70b9542c40249caec3987ce8bf13d7c9e853db0a84d8c6b03e2f57

                                                            SHA512

                                                            c808e9f653d0410cec2fc0ffe401af11c279257961e486a4eadf9545fd7737c735ad732711e36549b650ad880dfbce7d6fe348df368d80a4948be5339de40fc7

                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133686983250560890.txt

                                                            Filesize

                                                            75KB

                                                            MD5

                                                            3346b969de47128757bdd7ba83e0ffb7

                                                            SHA1

                                                            059c0cabcdeedaff62dd8dd4414597e922a09d4a

                                                            SHA256

                                                            3eab2cdd5666622cba859a14392b08a43767bf18cab7251c2287907e571e70ba

                                                            SHA512

                                                            8691fa9903599935ac88a76f7e25cfc1509d663b930ef5f6760bfe681744433b2c4192ed1840f95788dee52c539fd8d300ad6af2a10a03f78566cd27253c1770

                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\Y25IPP08\microsoft.windows[1].xml

                                                            Filesize

                                                            97B

                                                            MD5

                                                            d07a8eeeb6da833c3c127ff207daead9

                                                            SHA1

                                                            cc8a12f7c600ac6ad8211f50045ca376f88f3cb6

                                                            SHA256

                                                            113038e3d15cda4a50c0980cb7075456d00b0770a1c436b68cea36b435363392

                                                            SHA512

                                                            84bac1ea9a2bac093a6356933b08c841d1ef922937d05db05b388b6b107d77a7edcf6431db083a89e611c86c2ed9e8e83207e798edb08e3e056045780a432800

                                                          • C:\Users\Admin\AppData\Local\oL9\DeviceEnroller.exe

                                                            Filesize

                                                            448KB

                                                            MD5

                                                            946d9474533f58d2613078fd14ca7473

                                                            SHA1

                                                            c2620ac9522fa3702a6a03299b930d6044aa5e49

                                                            SHA256

                                                            cf5f5fe084f172e9c435615c1dc6ae7d3bd8c5ec8ea290caa0627c2f392760cb

                                                            SHA512

                                                            3653d41a0553ee63a43490f682c9b528651a6336f28adafc333d4d148577351122db8279ff83ee59bb0a9c17bb384e9f6c9c78677c8c5ed671a42036dec1f8c1

                                                          • C:\Users\Admin\AppData\Local\oL9\XmlLite.dll

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            347dea4d2956ecea71449899b826bae5

                                                            SHA1

                                                            29b63ccfcb530e6128ea071859893e7949288029

                                                            SHA256

                                                            5ef11f2ef662d62b2df98fbae284ce6e1d84ee04af3c295c32f5d365fb4e741d

                                                            SHA512

                                                            72fe9332ca1ac03cee37f74a1c285bd027cbfb04486f02e349812c3a031c7ed6702a7df26d140dda7670c9ef0d91e7062ff1186580cbc18ce456567be127d3ed

                                                          • C:\Users\Admin\AppData\Local\p3FHdNWcW\MusNotifyIcon.exe

                                                            Filesize

                                                            629KB

                                                            MD5

                                                            c54b1a69a21e03b83ebb0aeb3758b6f7

                                                            SHA1

                                                            b32ee7e5b813554c4b8e8f96f176570e0f6e8b6c

                                                            SHA256

                                                            ac3e12011b70144cc84539bbccacdfae35bd4ea3ee61b4a9fca5f082d044d8bf

                                                            SHA512

                                                            2680ab501ffe7d40fed28eb207d812880c8a71d71a29d59ba3da27c0bae98c74893e04807d93fba7b5e673c3e13a1ad21bfaab10bdb871d83349ff4e7c614b19

                                                          • C:\Users\Admin\AppData\Local\p3FHdNWcW\UxTheme.dll

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            8bb5881d7bbb2216c02d5b76abcc6b37

                                                            SHA1

                                                            8760f56bdbb66947e178dc4a1a27e44912cb7c77

                                                            SHA256

                                                            221a1949f2b32908a83bdb4500448099f5b2143b1ccc5731833f5fe5ff7e36c4

                                                            SHA512

                                                            5d2d9210ad9db90f0031e3ac905f9bb8aa3d738e017d290b38d2da1cdbd7547948a7eb27c0642eb06bddf15de2cc59b4fd1f12d5fbfb277b0597ae54fc72a73b

                                                          • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Pvdelpvduyz.lnk

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            6a0b153d6bc25d011423b564009b7a84

                                                            SHA1

                                                            bb2c26655969d5f0c0918193e28ace85a2222aa9

                                                            SHA256

                                                            d7fbaa324d75984ddda83f3f790c3f6c34ca593af1603e525df9517dbfa346ff

                                                            SHA512

                                                            ee63d9dd2e40d954012fdbcbb978215deb898b4a01e3b3a53b2779cb1292272e163b0c5d34a633acbb83b98bff3052e8045a0ee8758df66f80afc7114ae74efe

                                                          • memory/532-152-0x0000000002B70000-0x0000000002B71000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/692-609-0x0000000004390000-0x0000000004391000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/1180-3-0x000001D98D1F0000-0x000001D98D1F7000-memory.dmp

                                                            Filesize

                                                            28KB

                                                          • memory/1180-1-0x00007FFE830F0000-0x00007FFE83220000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/1180-38-0x00007FFE830F0000-0x00007FFE83220000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/1500-346-0x000001BD4D880000-0x000001BD4D8A0000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/1500-323-0x000001BD4D2B0000-0x000001BD4D2D0000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/1500-335-0x000001BD4D270000-0x000001BD4D290000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/2264-461-0x0000000004410000-0x0000000004411000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/3192-79-0x00007FFE730F0000-0x00007FFE73221000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3192-83-0x00007FFE730F0000-0x00007FFE73221000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-9-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-14-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-4-0x0000000002740000-0x0000000002741000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/3460-6-0x00007FFE906AA000-0x00007FFE906AB000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/3460-13-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-29-0x00007FFE91970000-0x00007FFE91980000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3460-35-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-7-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-8-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-10-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-137-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-140-0x00000000026A0000-0x00000000026A1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/3460-12-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-11-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-16-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-28-0x0000000000BA0000-0x0000000000BA7000-memory.dmp

                                                            Filesize

                                                            28KB

                                                          • memory/3460-24-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/3460-15-0x0000000140000000-0x0000000140130000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/4260-68-0x00007FFE82AD0000-0x00007FFE82C01000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/4260-62-0x00000207388F0000-0x00000207388F7000-memory.dmp

                                                            Filesize

                                                            28KB

                                                          • memory/4428-158-0x000001F6832E0000-0x000001F683300000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/4428-168-0x000001F6832A0000-0x000001F6832C0000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/4428-153-0x000001F682500000-0x000001F682600000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/4428-155-0x000001F682500000-0x000001F682600000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/4428-189-0x000001F6838C0000-0x000001F6838E0000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/4564-48-0x000002BE02D20000-0x000002BE02D27000-memory.dmp

                                                            Filesize

                                                            28KB

                                                          • memory/4564-51-0x00007FFE82AD0000-0x00007FFE82C01000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/4564-45-0x00007FFE82AD0000-0x00007FFE82C01000-memory.dmp

                                                            Filesize

                                                            1.2MB

                                                          • memory/4672-465-0x000002AB13400000-0x000002AB13500000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/4672-463-0x000002AB13400000-0x000002AB13500000-memory.dmp

                                                            Filesize

                                                            1024KB

                                                          • memory/4672-468-0x000002AB14320000-0x000002AB14340000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/4672-473-0x000002AB142E0000-0x000002AB14300000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/4672-500-0x000002AB14900000-0x000002AB14920000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/5004-315-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                                                            Filesize

                                                            4KB