Analysis
-
max time kernel
161s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe
-
Size
113KB
-
MD5
17e5f525e5c5853a71f3238ee0a12e41
-
SHA1
f4bae783f1a5abae35c5ef8e6ad87bd1ed099004
-
SHA256
1e3818ca8b66cfae092f94e6a55c840759d28ac76d08bc5eb2b7e5f3b8c3ad73
-
SHA512
1fd3d915c9a1d6b6e57b941006b2d78a2fca2890fff401d15c7c35f634c59abf2b129ece39354872a0e2bbc80dc325be1781d8a616931aa48986a83f6a5b7096
-
SSDEEP
3072:kE7YdXFjJHu5puorSE5/fTNjliDs+TseWBy2D5:p7ITcFrSE5/LVlms+weWBBD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qRP9q23description ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation qRP9q23 -
Executes dropped EXE 2 IoCs
Processes:
qRP9q23jwdkyenngcrftxpf.exepid process 3112 qRP9q23 920 jwdkyenngcrftxpf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4924 2080 WerFault.exe svchost.exe 3508 1984 WerFault.exe svchost.exe 3592 1984 WerFault.exe svchost.exe 3260 2080 WerFault.exe svchost.exe -
Processes:
IEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115496" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F59596D0-34DB-11EF-B9F7-CA9969386483} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31115496" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FBB8A052-34DB-11EF-B9F7-CA9969386483}.dat = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31115496" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\MINIE IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3153305403" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3153305403" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3150336655" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\MINIE IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FBC95041-34DB-11EF-B9F7-CA9969386483}.dat = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3150180569" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31115496" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F5956FC0-34DB-11EF-B9F7-CA9969386483} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 676 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
qRP9q23jwdkyenngcrftxpf.exedescription pid process Token: SeSecurityPrivilege 3112 qRP9q23 Token: SeDebugPrivilege 3112 qRP9q23 Token: SeSecurityPrivilege 920 jwdkyenngcrftxpf.exe Token: SeLoadDriverPrivilege 920 jwdkyenngcrftxpf.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 3516 IEXPLORE.EXE 2804 IEXPLORE.EXE 3516 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exeqRP9q23svchost.exesvchost.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription pid process target process PID 3500 wrote to memory of 3112 3500 17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe qRP9q23 PID 3500 wrote to memory of 3112 3500 17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe qRP9q23 PID 3500 wrote to memory of 3112 3500 17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe qRP9q23 PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2080 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 3168 3112 qRP9q23 iexplore.exe PID 3112 wrote to memory of 3168 3112 qRP9q23 iexplore.exe PID 3112 wrote to memory of 3168 3112 qRP9q23 iexplore.exe PID 2080 wrote to memory of 4924 2080 svchost.exe WerFault.exe PID 2080 wrote to memory of 4924 2080 svchost.exe WerFault.exe PID 2080 wrote to memory of 4924 2080 svchost.exe WerFault.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 1984 3112 qRP9q23 svchost.exe PID 3112 wrote to memory of 2856 3112 qRP9q23 iexplore.exe PID 3112 wrote to memory of 2856 3112 qRP9q23 iexplore.exe PID 3112 wrote to memory of 2856 3112 qRP9q23 iexplore.exe PID 1984 wrote to memory of 3508 1984 svchost.exe WerFault.exe PID 1984 wrote to memory of 3508 1984 svchost.exe WerFault.exe PID 1984 wrote to memory of 3508 1984 svchost.exe WerFault.exe PID 2856 wrote to memory of 2804 2856 iexplore.exe IEXPLORE.EXE PID 2856 wrote to memory of 2804 2856 iexplore.exe IEXPLORE.EXE PID 3168 wrote to memory of 3516 3168 iexplore.exe IEXPLORE.EXE PID 3168 wrote to memory of 3516 3168 iexplore.exe IEXPLORE.EXE PID 3112 wrote to memory of 920 3112 qRP9q23 jwdkyenngcrftxpf.exe PID 3112 wrote to memory of 920 3112 qRP9q23 jwdkyenngcrftxpf.exe PID 3112 wrote to memory of 920 3112 qRP9q23 jwdkyenngcrftxpf.exe PID 2804 wrote to memory of 4660 2804 IEXPLORE.EXE IEXPLORE.EXE PID 3516 wrote to memory of 816 3516 IEXPLORE.EXE IEXPLORE.EXE PID 3516 wrote to memory of 816 3516 IEXPLORE.EXE IEXPLORE.EXE PID 2804 wrote to memory of 4660 2804 IEXPLORE.EXE IEXPLORE.EXE PID 3516 wrote to memory of 816 3516 IEXPLORE.EXE IEXPLORE.EXE PID 2804 wrote to memory of 4660 2804 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17e5f525e5c5853a71f3238ee0a12e41_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\qRP9q23"qRP9q23"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 2044⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 2044⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3516 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 2044⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 2044⤵
- Program crash
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\Temp\jwdkyenngcrftxpf.exe"C:\Users\Admin\AppData\Local\Temp\jwdkyenngcrftxpf.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2080 -ip 20801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1984 -ip 19841⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2524 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5fa34ecb8815a2d98849888cb1cdbf38b
SHA184fd0e04586009efb3683c98da8d9aa41487cd42
SHA2565077a54924f80491a74ed78bbd73ff7bf85a27caddb80ceaa9ccb86f8b9a11be
SHA512ccfdb76ccedd0076601e17272d346229e2b9c0dd884c09bb7701b32c5dc177da8a91bb539ce751297d8ea44716fc497e8a337a9499c93a474ba85915f28f1053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD568c97149a127c83c3b275b65b03cd39d
SHA112aa4fbe9ea290c8e26325d512c2817d4d8a19a1
SHA2564de83b296850ec879b8ab24caddf7058fc74af77ff214cc41af75fe6dc54ab6d
SHA512fcf2c3722e9305167ccc62c9469f67b969705ae012be8949bab38b69319dafd27591457b7b3a4f1bf53ae87d0bfc71aef4f4c40f472ef6ae11c6ee5f500756f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD53c0adf46820a7949f8c803d5438db1bc
SHA1f86ffacf0f22a941e36212842a135d95765af7e5
SHA2565992e1a69c43c6008759a4436b130b4352e9eb304a4e7dbdd086f1c3dbe153f2
SHA5121083bd7e9dc78f1d28e26acb394ccd8c8210e584357ba9a3969ae93e7a04460e1b939f5f3f40ac7fe84d5f1e61ce626dcb1288579cce7d40a5ae1b4d0b1b1f1d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F5956FC0-34DB-11EF-B9F7-CA9969386483}.datFilesize
3KB
MD52b8c8744977f2294cae8cb02b1454eae
SHA1948bc1408187cb65aaa40a0602cf893c9be32e4d
SHA256edd5cd58cf723e6c0db99e1031b919783f3d20ec53c1543ae1a21c2d3c9a976c
SHA512655be36e57f29168e7a893b1d731327c94a861a57f20a28df73adb829f4ad78c499d994fcfb0c161952568fcd783971a3e7f20c850a62386c26b197f90a859a9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F59596D0-34DB-11EF-B9F7-CA9969386483}.datFilesize
5KB
MD5d885fd60c2397470f2b75ea83755abcb
SHA17934dfc0f4443d57ae133f83761a5a38c61690ae
SHA256ef7f557855eb7ecf3eaf979f3d941293a6ef69e30a5a4596e185e211deeacce2
SHA512b687e120c96c5986362a4d1c4692ae688f0f6b97dd787fe74cb9a039dde4c3804def6db1f9cbfbbc54bb8b8485d1287981e056f76adfc98343913a54c5a6515d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver7BDD.tmpFilesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
C:\Users\Admin\AppData\Local\Temp\qRP9q23Filesize
95KB
MD57fc51f7f09344a3dbeb28e14c35ce39d
SHA1c8a9082351f5edcd3012d5379caa33e0804e954f
SHA25691eceecf4fdcaff36652a1a3a5d25ee37fff70796e71438c60446a2ea72c0a78
SHA512b40a5743a212038161065af0dbfd0aa7b386b9bd8ae080e621459465e6f6dd888cb9ee35b4f152e5f6931446ad3f1696f6b98b9494903d02ab86493939cae508
-
memory/920-36-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/920-43-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/920-41-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/920-38-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/920-37-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/2080-14-0x00000000004D0000-0x00000000004D1000-memory.dmpFilesize
4KB
-
memory/2080-15-0x00000000004B0000-0x00000000004B1000-memory.dmpFilesize
4KB
-
memory/3112-10-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/3112-9-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/3112-26-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/3112-23-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/3112-22-0x0000000077C32000-0x0000000077C33000-memory.dmpFilesize
4KB
-
memory/3112-17-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/3112-16-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/3112-4-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/3112-44-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/3112-6-0x0000000000400000-0x000000000043B000-memory.dmpFilesize
236KB
-
memory/3112-25-0x0000000077C32000-0x0000000077C33000-memory.dmpFilesize
4KB
-
memory/3112-11-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/3112-7-0x0000000000400000-0x000000000043A04C-memory.dmpFilesize
232KB
-
memory/3500-0-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/3500-13-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB