Overview
overview
7Static
static
7530937cb71...18.exe
windows7-x64
7530937cb71...18.exe
windows10-2004-x64
7$PLUGINSDI...MI.dll
windows7-x64
3$PLUGINSDI...MI.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ex.dll
windows7-x64
3$PLUGINSDI...ex.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
5$PLUGINSDI...on.dll
windows10-2004-x64
5$TEMP/Helper.dll
windows7-x64
3$TEMP/Helper.dll
windows10-2004-x64
3$_42_/chro...ain.js
windows7-x64
3$_42_/chro...ain.js
windows10-2004-x64
3announce.js
windows7-x64
3announce.js
windows10-2004-x64
3background.html
windows7-x64
3background.html
windows10-2004-x64
3common.js
windows7-x64
3common.js
windows10-2004-x64
3contentscript.js
windows7-x64
3contentscript.js
windows10-2004-x64
3iframecont...ipt.js
windows7-x64
3iframecont...ipt.js
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 18:19
Behavioral task
behavioral1
Sample
530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/KillProcWMI.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/KillProcWMI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/util_ex.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/util_ex.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/version.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/version.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$TEMP/Helper.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$TEMP/Helper.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$_42_/chrome/content/main.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$_42_/chrome/content/main.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
announce.js
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
announce.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
background.html
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
background.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
common.js
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
common.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
contentscript.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
contentscript.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
iframecontentscript.js
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
iframecontentscript.js
Resource
win10v2004-20241007-en
General
-
Target
530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe
-
Size
2.7MB
-
MD5
530937cb71478ab5a790d31a8952cd07
-
SHA1
c69dd743af8e135f96ba7c2db6d115af6a62b233
-
SHA256
8204c13c8893456a05472e907ac01d81786d0a3d8d89caa3c06e9b264713fc0d
-
SHA512
bd72116565455abaf117502dd1f96c9f1c7e173bf07fba87c0b79fecb788d7256e8b30ac7a19bc14fb5b392e0193a07c0c777ad06b0dbbd062f8c5963e61d95e
-
SSDEEP
49152:V6UrTrarOtpA+R8BOOwVw3h6SlCZ0OxJJlVt4OwpnlrEiorarOGWAfUOKLxCCr09:UCTrtA82XIamTlVqdllrEior1AQLJ4aY
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a000000023b65-8.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe -
Loads dropped DLL 44 IoCs
pid Process 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 3108 regsvr32.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\ = "TVGenie" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\NoExplorer = "1" regsvr32.exe -
resource yara_rule behavioral2/files/0x000a000000023b65-8.dat upx behavioral2/memory/2248-11-0x0000000002180000-0x000000000218C000-memory.dmp upx behavioral2/memory/2248-148-0x0000000002180000-0x000000000218C000-memory.dmp upx -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\TVGenie\IE\common.dll 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe File created C:\Program Files (x86)\TVGenie\Uninstall.exe 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe File created C:\Program Files (x86)\TVGenie\TVGenie.ico 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe File created C:\Program Files (x86)\TVGenie\Chrome\common.crx 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe File created C:\Program Files (x86)\TVGenie\Firefox\chrome.manifest 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe File created C:\Program Files (x86)\TVGenie\Firefox\install.rdf 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe File created C:\Program Files (x86)\TVGenie\Firefox\chrome\content\main.js 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe File created C:\Program Files (x86)\TVGenie\Firefox\chrome\content\overlay.xul 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\AddonLoadTimeThreshold = "1000" 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\MAO Settings 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\MAO Settings\AddonLoadTimeThreshold = "10000" 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133736627952235961" chrome.exe -
Modifies registry class 50 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\ = "IDynConIEObject" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{384997EE-E3BE-49C4-9ECA-C62B7C08128A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DynConIE.DLL\AppID = "{384997EE-E3BE-49C4-9ECA-C62B7C08128A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject\CurVer\ = "DynConIE.DynConIEObject.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\ = "TVGenie" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\VersionIndependentProgID\ = "DynConIE.DynConIEObject" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\ = "IDynConIEObject" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\TypeLib\ = "{781CA792-9B6E-400B-B36F-15C097D2CA54}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\DynConIE.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject.1\CLSID\ = "{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject\ = "TVGenie" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\TVGenie\\IE" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject.1\ = "TVGenie" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\InprocServer32\ = "C:\\Program Files (x86)\\TVGenie\\IE\\common.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0\0\win32\ = "C:\\Program Files (x86)\\TVGenie\\IE\\common.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\TypeLib\ = "{781ca792-9b6e-400b-b36f-15c097d2ca54}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{384997EE-E3BE-49C4-9ECA-C62B7C08128A}\ = "DynConIE" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DynConIE.DynConIEObject\CLSID\ = "{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{44ed99e2-16a6-4b89-80d6-5b21cf42e78b}\ProgID\ = "DynConIE.DynConIEObject.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{781CA792-9B6E-400B-B36F-15C097D2CA54}\1.0\ = "Common 430 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2830488C-079B-45C2-88B6-AFE4EAA2DF85}\TypeLib\ = "{781CA792-9B6E-400B-B36F-15C097D2CA54}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 4820 chrome.exe 4820 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3108 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 95 PID 2248 wrote to memory of 3108 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 95 PID 2248 wrote to memory of 3108 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 95 PID 2248 wrote to memory of 4820 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 98 PID 2248 wrote to memory of 4820 2248 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe 98 PID 4820 wrote to memory of 4628 4820 chrome.exe 99 PID 4820 wrote to memory of 4628 4820 chrome.exe 99 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1844 4820 chrome.exe 100 PID 4820 wrote to memory of 1708 4820 chrome.exe 101 PID 4820 wrote to memory of 1708 4820 chrome.exe 101 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 PID 4820 wrote to memory of 1484 4820 chrome.exe 102 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\ListBox_Support_CLSID = "1" 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{FED6A736-129B-49C7-857E-25FC91E87DB3} = "1" 530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\530937cb71478ab5a790d31a8952cd07_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2248 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\TVGenie\IE\common.dll"2⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://m.tvgenieapp.com/r/?ts=TS_IN_TVGN&v=TVGN_P0_2.6.30&pid=612&gi=647334651f5b4ba1819ba0518f638769&i=p2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe5918cc40,0x7ffe5918cc4c,0x7ffe5918cc583⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2088,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1980 /prefetch:23⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1956,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:33⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2464 /prefetch:83⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3060 /prefetch:13⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3100 /prefetch:13⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4416,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4496 /prefetch:13⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3064,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3372,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4904 /prefetch:83⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3336,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3312 /prefetch:83⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4512,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4664 /prefetch:13⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=208,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4632,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:13⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4440,i,3516109611773174469,12311610022739896868,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:32
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5a8e16a5ab2902c61295406c7f9f7138f
SHA151fa2eb4b4d694fc6e5403963fa3454d4163e0da
SHA256f8c76195612dbfa2a3846680c53c7fb041d1b347923518c6aeeb4810890adfbc
SHA5127546384bac6d4968905e4df227105649d43e00c3e276df0bd12c71a2efcc9fc73332f27c3f5ff1cc54490e878c8b4faa95bf25a42f602e277ea8c7032cfac75b
-
Filesize
383KB
MD5ce4349d963306dadc8406af61bf4da2c
SHA14c697d1cf0bd5b2ee1f23d71d7697ac8dc48d7c9
SHA256478397551c500819949a1abb0337159df4103337d6a0bfdefdebb61196de3823
SHA5127ee642d6ae5953a4a60d726344e6530f01596fefbd4e36d25b9bd04f4fada0ceb67114946ac6bc52bf4dd0f2c13b01938ff7f7640d51ae4e86ffeac8cbce821c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1523ab90-dc1e-4278-a383-d20423a79813.tmp
Filesize9KB
MD5d1e5df123877bd843cfcb89ac1fd177a
SHA14c92980127e59babe5a5947324d4347c85a9959a
SHA256ce3914c668619e7c1548890f41bf583042c334652893014a0b40f6a6bd66c19e
SHA5125acf0c6003f8a40824deaac932060a320c57ba904f32cf4eff072fffc7c827e47323cb50356e5632950260952e3de0d3df37b0428169e722393b7cf389305c57
-
Filesize
649B
MD51b8f4decea1d9826447f21dd3532c75b
SHA1f45d99467ff3a3186ce6b5d8752a59483154d14f
SHA2567fab07d7761f2afbb8054d7bfdf37ac2090e169c5b23889808d924b9ab2fd0e5
SHA51202e4dbbbb4b085c8c5fd047bab9ee50e8b0f52a013c3b48bb711745fac7694b237f995cd4a6d65fcbe5d2cf43999697b66085661ecb32e11c8e8bba4fb98c31b
-
Filesize
2KB
MD57968b4a8d3b9419c586d7cefd5094c9e
SHA1787216d9f6139c882429dcac2e2b9945e10cb556
SHA2568e25af7775eb57ff8463235d26b3a88a884c750a10dae07d4d27f1c75617f035
SHA5120226ff857bf36e9c6d27a6f508f08575c72d7e566ffcb375df6041e962e9bc56bebd57c418e8830e954616051b513f0d6ba0fd3bb710709c8a52056450a5118f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD51217ac81c5a8d6f5cde3f7c31fbd47ec
SHA1caab02b9dbf51e7b544d8d63f48d1684b8390d16
SHA256d08d9e46503462f44ae66da393f8be8a13867bcbf330ddedd5088e705274b2fa
SHA51228bcf7cfb52776c4e3c75a1f7ad347c5b0e0f06148ae5774f68a4e1bdd8131fc200e3abf90d13959383813004efad935253fdd63bfca2ee23790a833b967e449
-
Filesize
9KB
MD5420314b41b6de79a9bba19a341e7f7cb
SHA111d4ab863930a9699e2a0d4081cab829a5747793
SHA256d116491613f3e4b2bc356270f501dbd246fced1424eb3943098aa2120aa0d500
SHA512dc42bf3be09d03c9b3f4d2ffecf1f9c72f0b0b8f6cb80be9f6c9a2307af76ca8715fa2a3bec50731d6e07e065e58ba322a4bbb30d5f0f2c71631db5bf4287152
-
Filesize
9KB
MD57f7043d72e01d1dd3d8d35672038e95a
SHA1535e22bc190210447b30f8cae621b9fe291041e1
SHA2568d68877cc1d024665c607a3861f9150a9f6ffa4205205fc91fa0d138db0db730
SHA5122554294ffc7110f8c78387850a99c4a15536ddb2025e7f1228950c46718a99b5e9ce04b60f5a3eaf7d669038855ae3893cc35e83ffa1d7f722fc603a4e0afa40
-
Filesize
9KB
MD56358d390f9e82f8c15204ca1986242b7
SHA12d755bd218d2abc79dc6f57f9b8188e8aad626ad
SHA2566426e679fad06274f3e36c9b20c684a944aaa8bf6d5ceedb0d846a13af125a45
SHA5126f759fe3ce03481d40187b02665ad27d6774c0d5cad6c01cca5fc616491c3c54404be0c41b55a40a2b7ae3d75ddf0f4656966a288287664835eb75bef25a1d03
-
Filesize
15KB
MD5ad19d007f5f47d95100b2dc7960269b1
SHA13a5ac5cffe9cc074e4acff177a4770056941cdc3
SHA256d28e79421712ee34f5b25ab2bc8fb132a09986f87e3823849f3038acf8aeaf9a
SHA5125a4b76af1b067ebd8d3e84306e5c035da0b6d8069c0fca780cf7fcebe108bdbe06f61aca61632b531d6732c9c0b0c30a92b15705eb4d20dd233a16f96eeead1a
-
Filesize
229KB
MD54f60d5bf0e3c7afec9bbfb7e6a095671
SHA1921c911b96a0d4e883d6545c1bd5f92e49b75660
SHA256c6a1315e59faf592bd7120a462efa8871fb263d72e2cd8f48521a99860a44db6
SHA5121aba55b5a812c880fb3712d85d285b6bbc893f42d303dcc10f895fdce4b2a2e22031a5d75a640ffb31b3f38ce61fb64cdc23ebc9b17cdc75e5022b3bd273f687
-
Filesize
229KB
MD51d450e92ebdd0e7ab3de611714d8015c
SHA12ddcd5e498e6b6b2b30947facf2e7a635978526a
SHA2564347cd16c740cb43aff72d9b032928e20859cf89e0cf299fb996b4c8f4c93b2b
SHA51230ab3f55297f245ae1484de990541fa86b06be5a16e26df221a3da8eee7dae6752abfab65465eaaa1759bcad7dc55f2c3d9da3949b7f8471fc3f8912b9c5995d
-
Filesize
884KB
MD50c05804ee2737cdddec09f1ff9cfd418
SHA18b675415e84c63ed246456bf0c010a89b2d1817d
SHA2569847a88d78d42d7ab1a3e39e5ffdf59229b60d99b23944125c8194ccca9c5a68
SHA5128db0889c5b6eaabe381e506bda9fd22f883b1325982c0215f28cde976db3a4c979bde1085b2e983b9334bde886c6a18cf492d51588dda038068a0bc5ca9065e8
-
Filesize
65KB
MD561fd777443084ed61c05c22e8e3c3eff
SHA1607944fdcfad205a164f3ca84793ab13d3d4ba97
SHA256a69a51de19784287ee9031322cda5104a6025d7cdf1ffd0e897fdd8ce4e8df4b
SHA512ce12cc55088a2176bfc5de8b65b92db8def8e930ddffe3961bb855b9536a25632cd921903f616c885699fb2d00f5074d03a213e25a759ac0aa4ecdfc33878323
-
Filesize
35KB
MD52cfba79d485cf441c646dd40d82490fc
SHA183e51ac1115a50986ed456bd18729653018b9619
SHA25686b302fa9c85dfa0c1c03ba000864a928365dab571f3355347dba02da22949b7
SHA512cca186a7f9c5cff3f4eca410fbe8cc13dad2514a7e36aec9b1addfbcb239ace9b9b2d8427771858e3fd11783abce7e24d43c286f98da9f8b17562ca095a4c043
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
20KB
MD53a3a9223dd834d9898fdd8bf260bc373
SHA1ec7ba0f20486cfb16bed7a2f8e62c228cb9f5e93
SHA256e36cdce05b8858cf6841db19f5618f9335aa67a9a59ffe8ec2be0fe83b5bb8cb
SHA512c8a4e07da6fe203f79f5c4314a6f5aa21b1a6648848bfa009a87b9af1d6c09ccf9c01ed3813442e57f7fa221ca088dbca236ea1bf80d033574c9670883d3611c
-
Filesize
9KB
MD5ab73c0c2a23f913eabdc4cb24b75cbad
SHA16569d2863d54c88dcf57c843fc310f6d9571a41e
SHA2563d0060c5c9400a487dbefe4ac132dd96b07d3a4ba3badab46a7410a667c93457
SHA51299d287b5152944f64edc7ce8f3ebcd294699e54a5b42ac7a88e27dff8a68278a5429f4d299802ee7ddbe290f1e3b6a372a5f3bb4ecb1a3c32e384bca3ccdb2b8
-
Filesize
776KB
MD580b2e3d8a6a283c2019bf239a60cbbc5
SHA1a6b63dce1cb4741f443332a7ccb52031088918ee
SHA256cd564402cfe6744b2f9fe8df895fa9f30650c9061a4e4ec1bc71603ce1bc031d
SHA512c7c645939a5e237393958a75f39f7c9990116967aa9cc3388b7b14370ccca0c839f6579a56cf8bce08ba43ce847a0d6046a8a43730680e261a61ca0d401558c2
-
Filesize
6KB
MD5ebc5bb904cdac1c67ada3fa733229966
SHA13c6abfa0ddef7f3289f38326077a5041389b15d2
SHA2563eba921ef649b71f98d9378dee8105b38d2464c9ccde37a694e4a0cd77d22a75
SHA512fa71afcc166093fbd076a84f10d055f5a686618711d053ab60d8bd060e78cb2fdc15fa35f363822c9913413251c718d01ddd6432ab128816d98f9aabf5612c9f