Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 13:56
Static task
static1
Behavioral task
behavioral1
Sample
bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe
-
Size
816KB
-
MD5
bc4d2fd23a3ca94216443cea23381b54
-
SHA1
7f3c793c3c6414d223f5ce7d5090bb9dc2dcd709
-
SHA256
34e6ca7fcd9b02405980bd6a92e20b8f972b0988e90576135c4ce12216f12f7e
-
SHA512
4f7ede4877feccbeb063cf7a2c9bcfe5c9e31f0336800f92c42259153724682599d466aa7500f344c6c370e3b300b3dc3ee4212f00b655bddc2a79fbafe0d5e9
-
SSDEEP
12288:6crq243ICNz1TJ987E77JALCkUBmke6dfDKT2UD4w3E1/JoV0TCV+Z:6e4d1q7o7Bkz3NDSpyG6+Z
Malware Config
Extracted
gozi
Extracted
gozi
1000
purbs.com
makarcheck.com
-
exe_type
worker
-
server_id
12
Signatures
-
Deletes itself 1 IoCs
Processes:
cmifsole.exepid process 2540 cmifsole.exe -
Executes dropped EXE 1 IoCs
Processes:
cmifsole.exepid process 2540 cmifsole.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2940 cmd.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts Explorer.EXE -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
Explorer.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Explorer.EXE Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Explorer.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Apphscli = "C:\\Users\\Admin\\AppData\\Roaming\\catssvcs\\cmifsole.exe" bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cmifsole.exesvchost.exedescription pid process target process PID 2540 set thread context of 1608 2540 cmifsole.exe svchost.exe PID 1608 set thread context of 1356 1608 svchost.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
cmifsole.exeExplorer.EXEpid process 2540 cmifsole.exe 1356 Explorer.EXE 1356 Explorer.EXE 1356 Explorer.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
cmifsole.exesvchost.exepid process 2540 cmifsole.exe 1608 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1444 tasklist.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1356 Explorer.EXE 1356 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1356 Explorer.EXE 1356 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 1356 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.execmd.execmd.execmifsole.exesvchost.exeExplorer.EXEcmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2332 wrote to memory of 2668 2332 bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe cmd.exe PID 2332 wrote to memory of 2668 2332 bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe cmd.exe PID 2332 wrote to memory of 2668 2332 bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe cmd.exe PID 2332 wrote to memory of 2668 2332 bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe cmd.exe PID 2668 wrote to memory of 2940 2668 cmd.exe cmd.exe PID 2668 wrote to memory of 2940 2668 cmd.exe cmd.exe PID 2668 wrote to memory of 2940 2668 cmd.exe cmd.exe PID 2668 wrote to memory of 2940 2668 cmd.exe cmd.exe PID 2940 wrote to memory of 2540 2940 cmd.exe cmifsole.exe PID 2940 wrote to memory of 2540 2940 cmd.exe cmifsole.exe PID 2940 wrote to memory of 2540 2940 cmd.exe cmifsole.exe PID 2940 wrote to memory of 2540 2940 cmd.exe cmifsole.exe PID 2540 wrote to memory of 1608 2540 cmifsole.exe svchost.exe PID 2540 wrote to memory of 1608 2540 cmifsole.exe svchost.exe PID 2540 wrote to memory of 1608 2540 cmifsole.exe svchost.exe PID 2540 wrote to memory of 1608 2540 cmifsole.exe svchost.exe PID 2540 wrote to memory of 1608 2540 cmifsole.exe svchost.exe PID 2540 wrote to memory of 1608 2540 cmifsole.exe svchost.exe PID 2540 wrote to memory of 1608 2540 cmifsole.exe svchost.exe PID 1608 wrote to memory of 1356 1608 svchost.exe Explorer.EXE PID 1608 wrote to memory of 1356 1608 svchost.exe Explorer.EXE PID 1608 wrote to memory of 1356 1608 svchost.exe Explorer.EXE PID 1356 wrote to memory of 2960 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2960 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2960 1356 Explorer.EXE cmd.exe PID 2960 wrote to memory of 2100 2960 cmd.exe systeminfo.exe PID 2960 wrote to memory of 2100 2960 cmd.exe systeminfo.exe PID 2960 wrote to memory of 2100 2960 cmd.exe systeminfo.exe PID 1356 wrote to memory of 3056 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 3056 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 3056 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 756 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 756 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 756 1356 Explorer.EXE cmd.exe PID 756 wrote to memory of 1308 756 cmd.exe net.exe PID 756 wrote to memory of 1308 756 cmd.exe net.exe PID 756 wrote to memory of 1308 756 cmd.exe net.exe PID 1356 wrote to memory of 1352 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 1352 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 1352 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2768 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2768 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2768 1356 Explorer.EXE cmd.exe PID 2768 wrote to memory of 2756 2768 cmd.exe nslookup.exe PID 2768 wrote to memory of 2756 2768 cmd.exe nslookup.exe PID 2768 wrote to memory of 2756 2768 cmd.exe nslookup.exe PID 1356 wrote to memory of 2704 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2704 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2704 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 1744 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 1744 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 1744 1356 Explorer.EXE cmd.exe PID 1744 wrote to memory of 1444 1744 cmd.exe tasklist.exe PID 1744 wrote to memory of 1444 1744 cmd.exe tasklist.exe PID 1744 wrote to memory of 1444 1744 cmd.exe tasklist.exe PID 1356 wrote to memory of 1600 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 1600 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 1600 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2152 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2152 1356 Explorer.EXE cmd.exe PID 1356 wrote to memory of 2152 1356 Explorer.EXE cmd.exe PID 2152 wrote to memory of 2396 2152 cmd.exe driverquery.exe PID 2152 wrote to memory of 2396 2152 cmd.exe driverquery.exe PID 2152 wrote to memory of 2396 2152 cmd.exe driverquery.exe -
outlook_office_path 1 IoCs
Processes:
Explorer.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook Explorer.EXE -
outlook_win_path 1 IoCs
Processes:
Explorer.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Users\Admin\AppData\Local\Temp\bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc4d2fd23a3ca94216443cea23381b54_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2D68\96B4.bat" "C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe" "C:\Users\Admin\AppData\Local\Temp\BC4D2F~1.EXE""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe" "C:\Users\Admin\AppData\Local\Temp\BC4D2F~1.EXE""4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe"C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exe" "C:\Users\Admin\AppData\Local\Temp\BC4D2F~1.EXE"5⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\E616.bin1 > C:\Users\Admin\AppData\Local\Temp\E616.bin & del C:\Users\Admin\AppData\Local\Temp\E616.bin1"2⤵
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\EAAC.bin"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD51cec21688d9d88179cf004761c1ea85e
SHA1fcf4bd147c5cf40ab275c80008e97d150dd75316
SHA256f54eaccbcb48fa122a4a52f144bc288a0f25c5b267641cbd215007c4b9163553
SHA512b94d1f0e573e33ba1cc212b6c78327e265853c0ce8fd08e6548e0a03146be620fceff2b1087ffea63f3111a1161895d9cf306c57f5a3840da120a6ec9b22103d
-
C:\Users\Admin\AppData\Local\Temp\2D68\96B4.batFilesize
112B
MD5235c1f936b1e29a18bb9140d76a716c7
SHA19b6467aaa979ec2bad013c111ab070bc31e2f64a
SHA256b1482045abb1ec7ed73e50e6560cd5a0a42d467f6851f5f748300615dc26552e
SHA512df791bd6929425dea16c62f59e04ccb8ca9ac4ca0c2a6d476f08e3bf202ecb130797c90b4738d5eb3244fed9006d2475b19720ef58acd845453c871f87c01383
-
C:\Users\Admin\AppData\Local\Temp\E616.binFilesize
64KB
MD5089f3663172a8b8a485a96c3bb35dd10
SHA1a298d45529d1889fc1359a9e2606bcc80d5fd984
SHA2565330e623abc1b6911b526652e6eb2d7c71b2132eea0e82f4605a49f63ce4cc35
SHA512a78eb1a5a9859c5b36edd2e240e5a156879c5cc05d994281cb24b55bade1acd8565c29f03a00101f757f8ba3e7a43bf295c3c61273363807eb642ae5e94934fd
-
C:\Users\Admin\AppData\Local\Temp\E616.bin1Filesize
2KB
MD522d0488e963b30bf9f68b974b64ec477
SHA1ce578b46be2a974bf12bb5c0efa2d2642f0a905c
SHA256b59c90a0dd3cda74aefdc920c1112c72f248efb0c76bdced0db384770df22d69
SHA512e4c9690525d2ed44e53ef1961248d64cb189654ce0b26ac6330bd7e7e2b8058a001ea20fde898c9f59e8b1390fb4b4a5d427f4ff8749d5c4b132c564be8805cb
-
C:\Users\Admin\AppData\Local\Temp\E616.bin1Filesize
2KB
MD5161aeb90d671ced00171595fcc624b3d
SHA12c11754e6e56bdaa32553f914a1f97e52504ac3f
SHA256e358dabfff1ebe90ac70b2d160421a64c0c143b98d952f1d80dfa3fe51f72e35
SHA512c30d41835f3edd1d2cc8e0b340c9efcb77a49eab53c8800d95d98d5a9837be565260c7693ac34606ab49984fd123edae5cd75cbf6e56003cc3878c46a38f1d69
-
C:\Users\Admin\AppData\Local\Temp\E616.bin1Filesize
5KB
MD5bbcbc662f431376fd4e7f79bb6a52a84
SHA19b48fa72d6b82f96c5ec028d731c4c66baf2d42e
SHA2568d63833aed19f395ddd137f63b9140a70371c0999c34e5bb8239bb110b68c90f
SHA512577fb287b46def3edc361fcf1ff0743b0758b7fa4f5442fa471db0d3c106cae4efd927197666c6e3fd5089ec898158328ae0aa1f10ac388608e810338f3056be
-
C:\Users\Admin\AppData\Local\Temp\E616.bin1Filesize
5KB
MD53ae88255516eb8f0cc2e28368e0a262f
SHA1bbc2ed1affb4e1891a6b2e4b8271ecfd29e1dabe
SHA256e73e885b1f6fc772bd9950213d496e1253a7f77353d6cf3ec33e9017d807d158
SHA51290bb96ae1ad5bc24ba1a50bff7caf8a4edff5f6e752a5ac325f8b45e1935aca5f621b3f03ebd0e982f2dd74c21ba75dae2d813b41a6a0780c01afc53fe827ff1
-
C:\Users\Admin\AppData\Local\Temp\E616.bin1Filesize
22KB
MD5c42572f5809b4485d4f93776a9b136d1
SHA1434bd3e8e4cedef859d02075789f27677d7c2431
SHA25645f9e1846b3db35c6bcd9a4d7e4d29bfebd6e877204039b957ba645a17bc4f37
SHA5128872c71e32750b8330cb0ce9ba2aecb1e254c23e24146e7c212d4a5bf2a1ee440cb9590f538b2cb4fc70cb881a4a3a2ccdf3492f892d04f8b4262d187c28612d
-
C:\Users\Admin\AppData\Local\Temp\E616.bin1Filesize
52KB
MD5d2a5976862f864f40f6e9b4589b86da1
SHA1a6dc51c0538b3ea0fe74aea6c5a753451f8e2cac
SHA256b3e82afe74a2b69c7bd2f9a1185590a0018f7e308b10c9452acdc7c19a283043
SHA512cb1f1299aa41541340fa5800e0e8b81fc8bc2fc238372cb9b1f97f230bcee3abefa1fd0c25016645713e0f5510247df6dc4bae857b0955365248a67cc5711e9b
-
C:\Users\Admin\AppData\Local\Temp\E616.bin1Filesize
52KB
MD58d59f96c039af1b5702e00b1411b12fd
SHA1582a7454128f114a080e8d52db7ab215c46f861f
SHA256d47ff24ce623ff8f0f2be1ebe27b68c77a8a5e041a3b95935275fad99984d88b
SHA512a68c691d24e2615c05f0e3c4be93fbb4141967a16beb06bc1a2ba630a24ecea958399ae25d34e3cdf7241786ccb55a6fdb63019195fd20dda00b1358e3d5db0b
-
C:\Users\Admin\AppData\Local\Temp\E616.bin1Filesize
1KB
MD5ed7613f7f24a90d09d4812ffd9ee120d
SHA1f7a7ce3c782616fea1fed386142ef546310b932d
SHA25656538979b4da118e86e62351d4484c86bff7c161a9a4719191ff5bdcc86a3196
SHA51278e7a300317803e2de585f3868d0ad500145053b25b1caeb7e3b84570bd09b2f924e723f2ccf952193b8f8715632917e4a2f7afd63629436417a6e6c76d3622c
-
C:\Users\Admin\AppData\Local\Temp\EAAC.binFilesize
153B
MD580c9431942fe15ba2f4ec021014b0c85
SHA15728d5dbcbb23611824b3aa07e78fe8dfc00da8d
SHA2569a95e040a5bf9fa3ca3f1442923c90e1dbf74c52986a11fd19211d0ead63ad78
SHA5121533675a21fc9ce885a3d0bbbb43644de80e75f4993698e6dd2f5f057a6b9cd29e0640b7d27c36c375f6cef2bebaf774f70c7640ab224ab8bfecca28023956ff
-
C:\Users\Admin\AppData\Local\Temp\F350.binFilesize
9KB
MD524d99baff1386de321bd4ec7450dcc2c
SHA1261e859437f376c1f2c9fa85863c88c732b08e86
SHA2560c9328f0915660c280dc818b176097caf64867448fe3187d18ca5265311d2603
SHA51254fcb66eb846b47351ccbf781681756a80f6f3048590f049bd2be96cdd4ba280858307b659f6a882d173c8f5bb63e1dfd6ef02c165c608f62893c9f98aef9cdc
-
C:\Users\Admin\AppData\Local\Temp\TarC8C0.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Local\Temp\setup.infFilesize
939B
MD58469578bec1e7b5579bdcb786879e4ed
SHA1e2fbe02f1271fdcbed645be88a275433d906f0e7
SHA256ef937ce0dbd8efc04e8e69d35950330f5004c90d6b1ebdacf75e3ba8b75f631b
SHA51273092b3f05a7ff0829ab94e7bcba29e9f41856b4da21b14e81ccc264ff5984f577e7b7a3beaac8cc1980c35c72e25025e44afdbd9c28d84e488a16e9e388861f
-
C:\Users\Admin\AppData\Local\Temp\setup.rptFilesize
283B
MD50039ec37e5b6d6bb9e903b0ee6947139
SHA1ad5e5e1683385b6cb25cf14abf78c23cca6f1075
SHA2566773ad2bec0237a717d23532b1c4dd3a221a358c6ebe0f0530be37dd670ce65c
SHA51204e76a988fa7e1759b6dc1a299918c4ce321f9337fe12e41871b1aaf79e073b03313395136be34c1472487f44c2234ff529334354bbc2f960ec364a7f94b1a11
-
C:\Users\Admin\AppData\Roaming\catssvcs\cmifsole.exeFilesize
816KB
MD5bc4d2fd23a3ca94216443cea23381b54
SHA17f3c793c3c6414d223f5ce7d5090bb9dc2dcd709
SHA25634e6ca7fcd9b02405980bd6a92e20b8f972b0988e90576135c4ce12216f12f7e
SHA5124f7ede4877feccbeb063cf7a2c9bcfe5c9e31f0336800f92c42259153724682599d466aa7500f344c6c370e3b300b3dc3ee4212f00b655bddc2a79fbafe0d5e9
-
memory/1356-58-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-65-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-397-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-63-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-60-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-59-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-56-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-44-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-55-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-54-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-53-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-52-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-51-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1356-57-0x0000000007390000-0x00000000074C3000-memory.dmpFilesize
1.2MB
-
memory/1608-43-0x0000000000420000-0x0000000000553000-memory.dmpFilesize
1.2MB
-
memory/1608-38-0x0000000000420000-0x0000000000553000-memory.dmpFilesize
1.2MB
-
memory/1608-37-0x000007FFFFFD5000-0x000007FFFFFD6000-memory.dmpFilesize
4KB
-
memory/2332-5-0x0000000002B00000-0x0000000002B01000-memory.dmpFilesize
4KB
-
memory/2332-1-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2332-2-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2332-4-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2332-3-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2332-7-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2332-0-0x0000000002710000-0x0000000002718000-memory.dmpFilesize
32KB
-
memory/2332-6-0x0000000002710000-0x0000000002718000-memory.dmpFilesize
32KB
-
memory/2332-24-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/2332-13-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/2332-11-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2332-10-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2332-9-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2332-8-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2540-28-0x0000000002710000-0x0000000002718000-memory.dmpFilesize
32KB
-
memory/2540-29-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2540-36-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2540-30-0x0000000002A00000-0x0000000002B00000-memory.dmpFilesize
1024KB
-
memory/2540-42-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/2540-32-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/2540-31-0x0000000002710000-0x0000000002718000-memory.dmpFilesize
32KB
-
memory/2540-35-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB