Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 07:40

General

  • Target

    56397e94f5dc73511c146410725bd92c_JaffaCakes118.exe

  • Size

    583KB

  • MD5

    56397e94f5dc73511c146410725bd92c

  • SHA1

    940f18d0785581af5aff5a2f3bac6c83aafaf869

  • SHA256

    b3c2cab864044554e869c383967b0dbafc238705120335231b0a3ea6db06b7f3

  • SHA512

    f79cff76f7fb6eb52966b954b5910560c7f40cedd545b210c30da2b2051924c0f45143ab271d62b19498b90b4669186e0de9ae7071026b91f3a272fcfe173350

  • SSDEEP

    12288:jr3ZBIR6GS4LKcstEw1lqQciur+WjtmhVAgJv:3ZB26GpucsC4uyGKSgJv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56397e94f5dc73511c146410725bd92c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\56397e94f5dc73511c146410725bd92c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\SetE051.tmp
      "C:\Users\Admin\AppData\Local\Temp\SetE051.tmp"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\SmartInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\SmartInstaller.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www1.partypoker.com/pam_images/installer/omn.htm?pid=Poker&bid=WPT&lid=en&sid=1
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2944
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2912
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:734223 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2280
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:930828 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1688
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://www1.partypoker.com/pam_images/installer/omn.htm?pid=Poker&bid=WPT&lid=en&sid=2
          4⤵
            PID:2152
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://www1.partypoker.com/pam_images/installer/omn.htm?pid=Poker&bid=WPT&lid=en&sid=3
            4⤵
              PID:2276

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9c073c975bf735b237463aa5241e33d6

        SHA1

        b6502de62e141dedfdf5c0351faff879ad36c8ae

        SHA256

        9429e1485fa73cca7ff6c91a02bd3c45c7de5d250f95645dd28c6769fe6b32bf

        SHA512

        508a51490dd9ec7c951ef02d020fb5ab1ab602e3bd5d821406583597697cf2a4ad8272eef5c81eeff9bdb2b01e0739b99b4e9b40660cceca537283342880f063

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        5be8d9831475967de0901d25971c00db

        SHA1

        95af53469e14f83d2edacfbb1aa6a0d769295cc9

        SHA256

        d656874033b845f835def3da61f56de28ea96fc7d309cd81ac73bb7cac85cc50

        SHA512

        e743e04ee464255fe2526d6d83bf505d814f61c738e6e644603a607efc3512ad75f49633414997a5126f8fc7564f757e9d22675af7fd9b7eea3ca7a7ab00326d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        bf581e4de211d680613187595c1b4ddb

        SHA1

        179f66e104b0ae645fac29e38aa1754f03bb86fd

        SHA256

        3ed58c77e859ef3264d4ae979c4edbaec5f89217b0c5f4783cf2af4e88411ad4

        SHA512

        3fbb63daf2a8e5d7029e9effd8fb52f1894e2ba94a7f1969a084266d0bb4b8cd30ef1bfb8a8aea8ba31565b440fcc4ffb03b83f780509db30be8f78a9dc0bd0f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        3c8f2291fa2904263aa51ec4e22e6b05

        SHA1

        b53e6e2fe09a4bf57e38b893f5cf735730a4b0e1

        SHA256

        f537ad8773694ac86ec8c94bcb0b2466a77556c52a80b393b92db36996ca608b

        SHA512

        0860aff5132ce3ea85ebc1eea239c46ebfb1f75a5d7aa46f8d2430bf4a6c59db079850cfa4d78442077844778473f055f323aaeee75c3b4471db1c6ddd62855a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        48e0052e15c2c1d5936ddee0dbb9c676

        SHA1

        3345c41b4bcc818599671bdea75c1531a9b5b3c9

        SHA256

        12e2a168ad24c7297b751de635e2b9ddf0ec60960da60ee07012cb8a80b6bb79

        SHA512

        75ac0054054ee6f8e8dae9caf9aa92e9dd72a9ead65da0acbfc660ab3501de071aae6195ca6b1fa19a267541943471851c2ca960759bb2439ec66a816da8191a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        32edb6b802e94b4b81c8bde3a88aed93

        SHA1

        a0ebf2b94c68ccb58ce3e836ac422350ca110e37

        SHA256

        3d7bd694c3a0253d4f5e6ead938918b4410a962b1deaf27b73d0f4628d143364

        SHA512

        0f0360aaeddbf19431a5b64c4e39734eeabe8e4257df2d78095df07bf39b5f8f7a30a1db6a8564194c84063a24cfef83eb7b30e768337d354dbd8d1b03b0bc5a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        3035cca9af4039bf91146831aee00c74

        SHA1

        175abe0491e390a966bd5e9f9daca78ae39ba421

        SHA256

        8736803fe61c84e0dbb0b077931360adb147e8af58df8585c34b3b49a7ffeaa0

        SHA512

        fbe9c8b3a7ac0b6c4c3bde257849dc63de2a0e5d07df3901df5fafcde15ef1299618868f10df883376ffc1313410b0c8e12fa1b3ec683cb7783b5df82cb1d0ef

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        392cf5a0cf761fa7d9c092df9b8129e7

        SHA1

        abf04203c295d0ec886e38e30e04351e9a4ceb12

        SHA256

        2af1198ef9c6759f7a1850add22192b12942b8ef32c2b092da493b9c4df58fe6

        SHA512

        519b749a103cb8d8972102dbea8c7ac3f03e6b3a28a31f2398c7dc7de99db6c0c096e1a59b065837266cffa1eff3e9d4a26480e6852454926f8d8f0b57754306

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        2cf374be4659105ca3aecf3642e34484

        SHA1

        bb98eb0c0b892a6c4e3bd32ab0c1ba1b32b5028f

        SHA256

        faaff20ab3fa2f1e6f3a382dc5db4cbc0c0d60709449c14041e1fc08cf7c0752

        SHA512

        b8d115f1943fcbf4c60a298d9d19b386472c4b39c2ab78a26836d86ea3709097e7e0e588d65149778bb2321cfdf74a961c40ebdc52ca2a6010537d3427ec610d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        bd8c6fd09da18c0cda813a5d094c00fe

        SHA1

        cf49b860f80d6dddf7691a5d9b048a4d3f6f7157

        SHA256

        65e12b15ce3fcad319837c267a501083b5c612414adc6e16ffe1558ec240e728

        SHA512

        b573548e73672262dd4c87845196475cca7d9fd5bfb3b640a37a743fdef7bbb3da3cb33d9b6554a9f2a5f1ddc8fca1f4e9c5c9ce297ec317cea0dbe11cbb8c79

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        5af95c6bc1e3bb2685d37a26da068904

        SHA1

        e876c489bfb39dbe9571eae434971fc6c0be5fb7

        SHA256

        f8befeee3aebb0e8ee5d9b971b2bcf0733bd27b75f0a90e687af4087d8fbfeea

        SHA512

        abdcb77b034945bc6f01dac35c6458f85d058f3647a160e995fc70669e78e431a8ddfa49c651f98b2c6b5db5c16c051e10225e13667d4cff8983de2e8eac0fe4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        fbc6ea9bca4e210dd41e1fc350b8b8c8

        SHA1

        00420986c6686deaea7586fe0f65bad79ee2ed84

        SHA256

        e258022fed769e04d5a715dd21fddcb3215061f0309b1fcd72283266e203dfdc

        SHA512

        cc13944b870bb1b2afcba38a41d12bb9ffe50c302c4fe3239f36b5a3847d7a3c734366154b358834c61cc08bfc6f17ad1278e4be9b4150d52be2de873b5b8aea

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        dba1da4cd5f31c106d0927ba611abbb7

        SHA1

        f4a2d641e7e887508e75387448ab3f0662f577db

        SHA256

        37905ceb6e65962d0fe6863e1130efc173b88c349385a8a5cfadfbf263664433

        SHA512

        74a09cd7f39a82ddefea9d696ca1059ac4a6882f46e585ded802022d2ea53e4c35381408cc04c0003a723ef24ee91d0dd95fbe7d9cb342b69e7343b45ee9621b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        4705f49c149eeb03194311d84252e1dd

        SHA1

        3bd4a2a5132bfbd323ea05a938a25b33c79629ac

        SHA256

        00d3e51362309b6ae2b898d928516d10c2c86fb258d19cfd7780c75355e26fe8

        SHA512

        c669ef3911014c8f9db3c639a92f127da990748413614aa5c8189e0008e9ac91885565402fbcd104cb370d37f2acea00e21518fb371d06d2aa4751ef5eba0dbf

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        19fc12f3af5afadf3cd9861a903a7dff

        SHA1

        f8815bfe44a99e73d5bdc3f03600fb52da4f89cf

        SHA256

        ae75871554d673bc555afaf9d698aafd6a89ca74c11145b9686d728640028cba

        SHA512

        b1c680e23f9bc386b8cad9ce99cb7827a7658f08d8707df37748d05e3e39c49c2687963e8f7fcbbee29d03fb11ff0e57b9353e838f0fd48619e7016e25772cac

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        94209e085b86825d1e339da04fdd5362

        SHA1

        78980c6ccef51bc870c8c9ee519bc296dd3e340c

        SHA256

        ecac8abe3982fb374c2991f37e454bad899602a052d60b403c33db28390a2cb3

        SHA512

        c0a1b48510e2f1bfea4cd6c65e020ca88c965f1545c0894a410ff0d3bf97c37a37e55dbaa52bf2e4967e3e8ecef3b6cca339acf1db1cfc59a16387d968c913f6

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9dcc2c495dc996a32ab53a9f6832aaec

        SHA1

        0cf9c45c6cd6f7fffea5902270d7d30437c01eb6

        SHA256

        1ef771691236737a2ba7dcdc88a5d0a7b98305d919f911bc1985abe63365fb9e

        SHA512

        079788bb1519b6cf482cc408e3f5930e41d99b30703d39794435272bb4a248f573b081350fb35b3b5318a1a163daf2c99b9eae4ccfa358394fa93ac43d98229b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        f3b2240a72c0bd276426e498f15c04ba

        SHA1

        de941c5b68ea79ce2a9edeaa88587b5eab71b7b8

        SHA256

        12525863bc00616a8e974afcfbcc6c42789f55d86eba323f89675b7d07a27fb9

        SHA512

        d4c2c77ffd3ac4f610f7fd95bf50001f6014c34f7ab9da67f0896f9b9d56a66ab6e78844b828b7df60a8a90eec46de7b529c03b15b7299e61c5d13949aa1ce8a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        5685b5343f3202b1ad573c6e26335cf9

        SHA1

        ffaec85785406dd9e228c7077112870da6fd92da

        SHA256

        59dd15caa565d5eba397230ddb0ff0e0cf3d9235ab18ae3c00a95963b9936b58

        SHA512

        dceb8a51d226ccd290c93562d09e0547c1bcf0226976495d8cf1989a5ec4056a565a82b74e83c74767c101ae0cae99dc8f1f1a67ee1f6331f31f57c618608a14

      • C:\Users\Admin\AppData\Local\Temp\CabF96E.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\SetE051.tmp

        Filesize

        549KB

        MD5

        48a4aa57631b2efa3a8645ddee567e75

        SHA1

        ceb30e4ef076f1c2e1d5bef4e9cdffa66fbd8b38

        SHA256

        0c9e1ca23a6f8b22fc9afe2336caca4ef62d645a5788c8da0552283ae97d8da7

        SHA512

        afde4f90b20b7458463c7fa5ffe0a8013c6b30620fd7557043a13a7868d3202ae34ebfe67dd16c39857afae5d5ed7dd4073c6a65dd18968f446402967d48ebc6

      • C:\Users\Admin\AppData\Local\Temp\SmartInstaller_Log.txt

        Filesize

        690B

        MD5

        ae5e790bc704935075d74c34cf2b61f6

        SHA1

        dc3e6821bb3c1011840b264a5670839139ea0f87

        SHA256

        9f24327ba2ebe93d0dd7982dabdcc3714d795d277760b2ed6e678b5e3e3baee1

        SHA512

        adfb50c571b4b7d998362d53ace120256ff592c5126ea910b13dde64fd16bf7c218a1567012d64a6160b59a7488b8235e50f5ef17fa99702498e85239e31acaf

      • C:\Users\Admin\AppData\Local\Temp\TarF9DF.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\BackGround.bmp

        Filesize

        25KB

        MD5

        c24d9f52dbb034a480342551ab8a5c08

        SHA1

        51a7a0ac3e9bbfe573c186225610b113942bd8bf

        SHA256

        9b369792fc959786f5b6b8aa55c0ae3e72daa597f38b29b18c54f378d22ee410

        SHA512

        c80e24b8b6fbd62fda6a79f0dc24e9c0fb53077444f08add51fb5d80b6b70c97d19bbb52358896cad5074c9e067db3fd3a14506c6c56a470c5366396d87ff288

      • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\ConfigParams.ini

        Filesize

        1KB

        MD5

        0182453f719075db12110aa7e4d062bb

        SHA1

        c4fd383529afd98575901f2906697d27503621e2

        SHA256

        32bee5fd279b31c740d1a3197dddb6be2ea07d65bd4a2fc77d9ebfc1c7089df8

        SHA512

        291ef11a2e25b206f579c965fbe3da239092cc97091a800c7139e83c14f032324429db9a4f6065143612556524e9f0eb9d8d6a56c3a250f68d3ad1df20247ea4

      • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\Language.ini

        Filesize

        2KB

        MD5

        afc17f76724780b5dd539f260b6300fe

        SHA1

        ba448d377b88e3402ef9ca0cd2717ec8656874c2

        SHA256

        e37cb32e89cedcbf673d44b2c05a1945011453c46c06fb2b8cedbd221d4afbdd

        SHA512

        254ed1d86db32f7358262e4dc7f84654cc17083808f7924826622181c68ce23788f21a98339a0d327537e8a6172199dd576b670430c28f3454bb4d8373b155c2

      • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\Preloader.jpg

        Filesize

        23KB

        MD5

        9e24d0b9982b61afc80a2e864e12c86f

        SHA1

        50776d36efdb0a660f5781f63a2884e53becd884

        SHA256

        f15140546b8464c59a3fa0fe8991d7132bab87465015a276c34966d995ab3020

        SHA512

        42bcb36bcffc8ce08d78fcb930da5324ac8afa10c085a7f2ff6360db87483c1ea072fd54fb94f3a44a5669245b6ba59e966a62a716f3c33b021b3e05398947f9

      • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\SmartInstaller.exe

        Filesize

        604KB

        MD5

        f13a917e6b91100bf41459462c957ee9

        SHA1

        793a99248607410cfd53fdd413c1481b4eb899f5

        SHA256

        60dbe785b8b7220cf68ef00acdd3b33e6739389e1eaf11ac15fe46de3cccc383

        SHA512

        2566d6d61c0eb84d5374e13d3e8e53ea770150b91879282d287497932335818d194a2505076fbae524d755d9e1099fc7ff6454fe980dfc2a85b5204de028be31

      • C:\Users\Admin\AppData\Local\Temp\WPTPoker_Installer\zlib.dll

        Filesize

        52KB

        MD5

        4965107d112666d3835308a831a29274

        SHA1

        50439b99ce525ecb74c554e1dc43ddb39481dfa4

        SHA256

        105280995cd5746078d67b8651dfe4ad2abcd532d7ad528d3100c535b0b538af

        SHA512

        38fa8f0eeadd75bf212eaab458833cfd3445d00f3d77f1f8a86b7c3ba99376231c8b3fc3cfdff6f02f2ca9c90956c76f9055717712d35a7ca7b30172a0010b59

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\6O0O4JWJ.txt

        Filesize

        220B

        MD5

        760de0a1cb2d3c4cacb613fc921084dd

        SHA1

        6bf23b1b264ed0e1cc1fd04e5c41afb4a09fd495

        SHA256

        620b334a076d11bb6bcf066d57b6aa37ddf5214864d44632d8c8f5ab4b3d0e4c

        SHA512

        700eb9a878ea9c1a13c0b592bffc68c4c9e96ae29fd38da9c75bec4492bad01eb6402b2a3ddd17c8d8a7a066e8beb946e3862fea45513dcad97d0cb89b6367d5

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TJL153IX.txt

        Filesize

        220B

        MD5

        7992b922868ebf3c552180d019d68805

        SHA1

        f6871920af62776ef6f413fdb532a3dcfa4de3ca

        SHA256

        7a82343cfc990d0e3a178796925cae7ef79024ae7e9076d36a560aa83e7f485c

        SHA512

        311f45d1e991baf9612352d92203234494560df8ad9767a31aebf11a799a24fba2f0893116168858b2fb0060b28a3135b7240af64669990d6bdbdcad2efa52c9

      • memory/2464-25-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB