Resubmissions

26/02/2025, 20:03

250226-ys6m7s1qx5 6

26/02/2025, 19:51

250226-ykxqbs1sas 10

Analysis

  • max time kernel
    37s
  • max time network
    39s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/02/2025, 20:03

General

  • Target

    jjsploit_8.12.2_x64_en-US.msi

  • Size

    6.3MB

  • MD5

    d8be6f14b4dd7a85a5b5479e88b940da

  • SHA1

    4c1ed04a00fb4fc31cc4c10172d0e6f310faacef

  • SHA256

    c3daa5b6503c601bf868de990dc5fe055c266a7cba6e269115290c37fb8a4d05

  • SHA512

    77964855eddaf57ebf7810185eacf2bd40bfdd883473ac063223ea496744d81db678c171707d44cfe19077df1fcfb8888a54021fc6af7cb4547dcc464ce717ea

  • SSDEEP

    196608:3dNnRdvjsTOvHK19gO8xbecifaCI1L5N1JTLX4:t1RSavI9sbf8vKf

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Drops file in Program Files directory 22 IoCs
  • Drops file in Windows directory 15 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\jjsploit_8.12.2_x64_en-US.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Program Files\jjsploit\jjsploit.exe
      "C:\Program Files\jjsploit\jjsploit.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3136
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=jjsploit.exe --webview-exe-version=8.12.2 --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --autoplay-policy=no-user-gesture-required --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --lang=en-US --mojo-named-platform-channel-pipe=3136.3636.11710213595325436611
        3⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of WriteProcessMemory
        PID:3828
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffb0a01b078,0x7ffb0a01b084,0x7ffb0a01b090
          4⤵
            PID:2824
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=jjsploit.exe --webview-exe-version=8.12.2 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1660,i,9206872347118049578,9865992814828687140,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=1652 /prefetch:2
            4⤵
              PID:2392
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=jjsploit.exe --webview-exe-version=8.12.2 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=1996,i,9206872347118049578,9865992814828687140,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=2008 /prefetch:11
              4⤵
                PID:1108
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=jjsploit.exe --webview-exe-version=8.12.2 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=2176,i,9206872347118049578,9865992814828687140,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=2280 /prefetch:13
                4⤵
                  PID:3668
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView" --webview-exe-name=jjsploit.exe --webview-exe-version=8.12.2 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --autoplay-policy=no-user-gesture-required --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3424,i,9206872347118049578,9865992814828687140,262144 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=3432 /prefetch:1
                  4⤵
                    PID:4240
            • C:\Windows\system32\msiexec.exe
              C:\Windows\system32\msiexec.exe /V
              1⤵
              • Enumerates connected drives
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              • Modifies registry class
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4612
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 94AF146C1E8B78ED9CE5348725E6890B C
                2⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:4208
              • C:\Windows\system32\srtasks.exe
                C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                2⤵
                  PID:1320
              • C:\Windows\system32\vssvc.exe
                C:\Windows\system32\vssvc.exe
                1⤵
                • Checks SCSI registry key(s)
                PID:1188

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Config.Msi\e57e32d.rbs

                Filesize

                21KB

                MD5

                ec48a969920880ae27c31471591d15a6

                SHA1

                1ea81d5ba45117257d93e26f5a3410e0e9794798

                SHA256

                2f352a30b2cd340db5716e3ac51a54177d3b7d1fe6d34fe83bdcc50f12e1dc98

                SHA512

                736edeb26441a09384749aa166c521c300c53decccbd236637c6d60f4540a04dc2a2d0be3eca12085b5a1518a3f3fb0086c9736f0d1d1892d438f74c07d9dec9

              • C:\Program Files\jjsploit\jjsploit.exe

                Filesize

                17.1MB

                MD5

                b393f1b89a320d6a0b42190c6dcb6860

                SHA1

                209e800233976ec908a87db948b5aa175d99b1e8

                SHA256

                ca45895af0e91692514e6f4b8b494e68392821fa18503526243091d7d49e3064

                SHA512

                21be0b7a232e7182455206b13beada6e9614335a0b3ada9875a68620efc14f43723778910dfb6070a47ee8f177d02add1d5a2e60d616fec914a88b9ecb01f0eb

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\jjsploit\jjsploit.lnk

                Filesize

                1KB

                MD5

                a6e0d87334b92b0876c8b56395570fcd

                SHA1

                b9c9b73091c0a7d6fcb8e066dddb180d17dea2a9

                SHA256

                896ae5a25a4f705b08ea4c1305f434512fd64df98be5ae859dea7a2b78946b7b

                SHA512

                c926edde836ef419f3a731a64eb7a89ee061f22a5d8ec91eb12c43d26631fd64626224ca1d08230f966f615dde7ddd71c00d024a6f2150c8cb27eab452ffda5e

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\jjsploit\jjsploit.lnk~RFe57e5cc.TMP

                Filesize

                1KB

                MD5

                7e618394f58e15eb5f721b7b4384aefc

                SHA1

                780e93bad77cc9869ac638e0fb1b0288a39e7ad9

                SHA256

                2f6055726e971859e295e5b3ec57a8c09fa17578a9f295fc4df7a69ff9bf2dc6

                SHA512

                1fa3ebb31a074a3b1768a9cd3f9b125f06440279cf1bc4d82169c570fb2540dfb97a7c23dec8dfeb6389ba23f24083e79afe7249ba6b6b7466777932867589b3

              • C:\Users\Admin\AppData\Local\Temp\MSIA633.tmp

                Filesize

                132KB

                MD5

                cfbb8568bd3711a97e6124c56fcfa8d9

                SHA1

                d7a098ae58bdd5e93a3c1b04b3d69a14234d5e57

                SHA256

                7f47d98ab25cfea9b3a2e898c3376cc9ba1cd893b4948b0c27caa530fd0e34cc

                SHA512

                860cbf3286ac4915580cefaf56a9c3d48938eb08e3f31b7f024c4339c037d7c8bdf16e766d08106505ba535be4922a87dc46bd029aae99a64ea2fc02cf3aec04

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad\settings.dat

                Filesize

                280B

                MD5

                ddbafbe790deca24dfb3025c0047e426

                SHA1

                61498babbfe2b2565396fbe2758095a0132d2cdb

                SHA256

                64686b18252bede54708389feae22ad1cc0d7bf03669783094e0dfae2b975970

                SHA512

                635f3c0282b67fb15d5a56cf57ac6daf7c2a817e9beaf1bff0db6736fa65c68d6e60c6a24a805f637012adbcbdc321d7ca0323d581646b82b7ca25c4ef419fae

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad\settings.dat

                Filesize

                280B

                MD5

                e0e8ffc78324f1ff4155fd9db7614eec

                SHA1

                f19129165bb638f9ead6c07804db158218b17417

                SHA256

                d345bc5a482a48cbee7f726aa945932894a0aaff180e84a0d456201357936948

                SHA512

                7f9642571c38cf5ddc1212eb499a8ea6493b788e8f1a79fc688de6b4e88887621bc0ec205fdfcb52554a750d0ab695550f018ff635dc79032639c9f2955a6a6b

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Crashpad\throttle_store.dat

                Filesize

                20B

                MD5

                9e4e94633b73f4a7680240a0ffd6cd2c

                SHA1

                e68e02453ce22736169a56fdb59043d33668368f

                SHA256

                41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                SHA512

                193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                Filesize

                48B

                MD5

                0da4643f3aa6b75af4167d86290e58a1

                SHA1

                d20d65b9502d3ba01bb17485d7debc61d4133379

                SHA256

                e195c5e7d00331ff7244660729071ef3cba82f23b8517659872f2337774b4e3c

                SHA512

                0464abde6bd037ec93add83947cb512e6fc5d2a60fb129e7f7b4c309087d213e87b2a80c4367e0e36e00472099f85cf6d6973c6eb0c1c371c0516a2f02bbd328

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                Filesize

                144B

                MD5

                5244180e8229a94e6f1e23bcc993cf7f

                SHA1

                577db2ea9bfa27bc261bd26dbf894ae2e3c8c3fb

                SHA256

                30c2307ece5988485b490c2148ff076c5cbe9b1e4bad792c2687c4563c23b6be

                SHA512

                205bcce91950202b9c2fbd3dca231b4361daec75d1647396ba21b18279f486d0be14d133430691ccde2b8c269046d99dbbc19e99b4071bc47eec54c4f8e48c82

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\DawnWebGPUCache\data_0

                Filesize

                8KB

                MD5

                cf89d16bb9107c631daabf0c0ee58efb

                SHA1

                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                SHA256

                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                SHA512

                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\DawnWebGPUCache\data_2

                Filesize

                8KB

                MD5

                0962291d6d367570bee5454721c17e11

                SHA1

                59d10a893ef321a706a9255176761366115bedcb

                SHA256

                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                SHA512

                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\DawnWebGPUCache\data_3

                Filesize

                8KB

                MD5

                41876349cb12d6db992f1309f22df3f0

                SHA1

                5cf26b3420fc0302cd0a71e8d029739b8765be27

                SHA256

                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                SHA512

                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Extension Rules\MANIFEST-000001

                Filesize

                41B

                MD5

                5af87dfd673ba2115e2fcf5cfdb727ab

                SHA1

                d5b5bbf396dc291274584ef71f444f420b6056f1

                SHA256

                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                SHA512

                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\GPUCache\data_1

                Filesize

                264KB

                MD5

                f50f89a0a91564d0b8a211f8921aa7de

                SHA1

                112403a17dd69d5b9018b8cede023cb3b54eab7d

                SHA256

                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                SHA512

                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Network\Network Persistent State

                Filesize

                1KB

                MD5

                007379c392147ea1fa5599655bc07a86

                SHA1

                24f38e72f6fa21c1ccc3998086fa79994feee641

                SHA256

                11356ad0e13af8d3e3284bb532493320fa6499c6416167c7b4249c3d041e15e6

                SHA512

                70989055a389f99b16cd500b8de024583edf9788921c3a928aeeda5e439054781729b7205fa2ae383d13b735722e0a93a651712daa791566579875cb76d21991

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Network\Network Persistent State~RFe582a66.TMP

                Filesize

                59B

                MD5

                2800881c775077e1c4b6e06bf4676de4

                SHA1

                2873631068c8b3b9495638c865915be822442c8b

                SHA256

                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                SHA512

                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Network\SCT Auditing Pending Reports

                Filesize

                2B

                MD5

                d751713988987e9331980363e24189ce

                SHA1

                97d170e1550eee4afc0af065b78cda302a97674c

                SHA256

                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                SHA512

                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Preferences

                Filesize

                6KB

                MD5

                dffc9559379f6c677109075e84d4847d

                SHA1

                45d258bbf9e7c985f8de0a06de23bf3572a9abb9

                SHA256

                8e27650e341e1d792e735d12446290bf30f33542dce42d29a3f9631c99e6f303

                SHA512

                434ba5e4f9f2d5b2ccb3f8850733f374a47188c6a2f635255a6f9040b8e7c437f89c2be5eccae409fd819c5a04bd5895a068329e4fe8ebcffb2a1a9ef85315a7

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Preferences~RFe582a38.TMP

                Filesize

                6KB

                MD5

                982057bd7d3e9d1755dc209ce165ef50

                SHA1

                03914737308a8a9ef28c94f919269a5cabd8e777

                SHA256

                121ce8bec9ae22fadd004e27941fb9af2bb41e017a4939da868c23a501bb699d

                SHA512

                ab10fe8b383e9ec488fb7c5ef726e11ff38fea77156c43fed25154dc7dc0c6ae2f1b6c9fe5c0be2ce4098897fc62233cfe2c23c0a7f61208605645276aaed4d5

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Default\Sync Data\LevelDB\CURRENT

                Filesize

                16B

                MD5

                46295cac801e5d4857d09837238a6394

                SHA1

                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                SHA256

                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                SHA512

                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                Filesize

                1KB

                MD5

                7c066319f13e758f1dd44c66a96b88cd

                SHA1

                e34617774ce06d099a2e6b1c041aae5ccf1582cc

                SHA256

                ac03c124074706af0ad7a0a39d739446cdca9bb70fb02f838c499f1f3ac476e3

                SHA512

                4fed3903c1d4736c082868a7432c08a2e171d549d83c22bedfbb68aabdc379a4f3bce24befef0fb40e17a0bf76f05797addddb0e19c05f503451d36288713f13

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                Filesize

                2KB

                MD5

                396563cbf7d74f5f05b963453813289e

                SHA1

                edb367ee1bc678baf4b9589829f87b282374603f

                SHA256

                11fcf658169754743c995eaa795f91f02e5756ea1183cec908aec28fd4f7c8f6

                SHA512

                50082d47e7b5554a624f0b4d074b12966fa5f6ad97b2e2918aaaadfedb910b4ed17d65440fd470762f5acb4f8751c9debf91263a8155d5a2a84d1bb5e02d0bb5

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                Filesize

                16KB

                MD5

                c89b8528f4cf3caa48d2ba6538f0617a

                SHA1

                8efaa2cb07f4b84fbf2e8c232f1c145d71314c86

                SHA256

                f943ae5bf322ae9c3d82152cd2fa484b01a36f2936b21a4de774561c33a4512d

                SHA512

                b254065b40a65cfbc2bc8496e21109b3723a6948da0c56b38df41427d26ab9112be24c0b6740176c3cf450a07d930cb8e8552c71fc86acf8afa20fcbbff2a26c

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                Filesize

                16KB

                MD5

                82bdb0a0ef268b62ad7373ab5178d13f

                SHA1

                cd30ea7bb127a524636fef79eb3eac55d28ec493

                SHA256

                a4d72950f2a5a445aa402d5063a1ef844253daba299f13e1d3e5bb7650364a00

                SHA512

                323743d81d4acf54759a9e6e4937bf67ad17bff87f1c18aef8507daca1236b86584ad837d1fd17e1e463d472811ab203c609744d2cdf17853871f556f9dfffc4

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State

                Filesize

                3KB

                MD5

                c8b141976bd552d511ef3e1b3c6fd770

                SHA1

                c7834a754128c750db95fe4067fb8838ffa19dd9

                SHA256

                a1274e0f576936ecc0df1ef15b7cbb264b219234d4532233483a9c465a4fa2f5

                SHA512

                4b7672dd11d2b05b297ec1c4e8108030a6f3e8b51f7d916bf43c1a5a6c2f68a06ff897eacbdeacbe0ccd7c8c0c64c668758e59a438ab21d66a3f1af3c38277d5

              • C:\Users\Admin\AppData\Local\net.wearedevs\EBWebView\Local State~RFe57faac.TMP

                Filesize

                1KB

                MD5

                6664f376617a947121ebd6ee33780058

                SHA1

                1f63a1c874642efc9f086af73b7d7ac03f842d96

                SHA256

                01a780d386341a82e3117bccf5c562fa9122cb1911aa59c152295840c980773f

                SHA512

                9cf3efa03f24a61a2cf4d21925daff429df133f7b0e9c32c6549f907e3e31efc008ff72a3986e19d33314a82f5d41bc6f4f9d8b4819d875a60c1454d84df849d

              • C:\Windows\Installer\e57e32c.msi

                Filesize

                6.3MB

                MD5

                d8be6f14b4dd7a85a5b5479e88b940da

                SHA1

                4c1ed04a00fb4fc31cc4c10172d0e6f310faacef

                SHA256

                c3daa5b6503c601bf868de990dc5fe055c266a7cba6e269115290c37fb8a4d05

                SHA512

                77964855eddaf57ebf7810185eacf2bd40bfdd883473ac063223ea496744d81db678c171707d44cfe19077df1fcfb8888a54021fc6af7cb4547dcc464ce717ea

              • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                Filesize

                24.6MB

                MD5

                e05b1e81d5a9aa84cb622575d4a06690

                SHA1

                61033d7cfba753418c38e9e52d0b8f543c58599d

                SHA256

                45d598f45c73f637aaa2b1f5dc3869d82a7e491d7a89d31d16d244de0bf97c09

                SHA512

                529136423288890752e65910ea4464599102cbe64cbadc1392e3bd026956fb53a5e4e8ec5def99cb33f1d60fd6662ed78dde3b6fb5912d995808381f67b8cbcc

              • \??\Volume{187f67d5-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e6597888-2aa6-4ae0-b8bc-1fd69aee21d0}_OnDiskSnapshotProp

                Filesize

                6KB

                MD5

                e2639370c813cf6aac44f9dc00aeb274

                SHA1

                43a3dc23e433d18d8bf53eef755f79a640946fcb

                SHA256

                0ef252cb03452c360e802102b33b905280dd35e344b20c9ed9e6880ac8dce8b2

                SHA512

                8d3206e953c923f1fb17537154bddd8dfa7dcf39e1b1ba1508bbe0596ff356f196f49b09b171ccd61c49facb7a2c7f36b04054f9cb824e12e6a1ea2a9c79ee74

              • memory/2392-95-0x00007FFB2AC80000-0x00007FFB2AC81000-memory.dmp

                Filesize

                4KB

              • memory/4240-154-0x00007FFB2AC80000-0x00007FFB2AC81000-memory.dmp

                Filesize

                4KB