Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe
-
Size
664KB
-
MD5
192b7e38dacf1d14c887b109a6d5d262
-
SHA1
1f1fa04d42264b763b6beca075cec24f603fa961
-
SHA256
61fdd1038772d9bdb5d24ac458f25d1f503761bef935245569f780c6e784c08c
-
SHA512
785ed00931808f273a7ab010219f533245620054925b6799bffae186ad21be1e24368a9177b9e5f371ba9b475cf58e219c35e151098f1299771cbe0930116338
-
SSDEEP
12288:nkabMod1JJ9/AHC5cM2Hu4cz2KMBB+vhDzsfdkx3JoLC4RRqEwAskg16quner:nVj5LV5cM2Hu07dn0E6zr
Malware Config
Extracted
cybergate
v1.07.5
DarkeiC
wolfieboy.sytes.net:100
8S880G00F8POY1
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Windows Update.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
admin123
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Microsoft\\Windows Update.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Microsoft\\Windows Update.exe" vbc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
vbc.exeexplorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{1JJK20P6-6227-I5NO-O0HW-JBB0EEEH7N4S} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1JJK20P6-6227-I5NO-O0HW-JBB0EEEH7N4S}\StubPath = "C:\\Windows\\Microsoft\\Windows Update.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{1JJK20P6-6227-I5NO-O0HW-JBB0EEEH7N4S} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1JJK20P6-6227-I5NO-O0HW-JBB0EEEH7N4S}\StubPath = "C:\\Windows\\Microsoft\\Windows Update.exe" explorer.exe -
Executes dropped EXE 1 IoCs
Processes:
Windows Update.exepid process 3612 Windows Update.exe -
Processes:
resource yara_rule behavioral2/memory/1992-3-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1992-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1992-6-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1992-8-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1992-16-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/1992-19-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3960-81-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1992-152-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3924-153-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/3960-760-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3924-1439-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exevbc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DefaultSystem = "C:\\ProgramData\\svchost.exe" 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\Microsoft\\Windows Update.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\Microsoft\\Windows Update.exe" vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exedescription pid process target process PID 740 set thread context of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe -
Drops file in Windows directory 4 IoCs
Processes:
vbc.exevbc.exedescription ioc process File opened for modification C:\Windows\Microsoft\Windows Update.exe vbc.exe File opened for modification C:\Windows\Microsoft\ vbc.exe File created C:\Windows\Microsoft\Windows Update.exe vbc.exe File opened for modification C:\Windows\Microsoft\Windows Update.exe vbc.exe -
Modifies registry class 1 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid process 1992 vbc.exe 1992 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vbc.exepid process 3924 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
explorer.exevbc.exedescription pid process Token: SeBackupPrivilege 3960 explorer.exe Token: SeRestorePrivilege 3960 explorer.exe Token: SeBackupPrivilege 3924 vbc.exe Token: SeRestorePrivilege 3924 vbc.exe Token: SeDebugPrivilege 3924 vbc.exe Token: SeDebugPrivilege 3924 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vbc.exepid process 1992 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exevbc.exedescription pid process target process PID 740 wrote to memory of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe PID 740 wrote to memory of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe PID 740 wrote to memory of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe PID 740 wrote to memory of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe PID 740 wrote to memory of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe PID 740 wrote to memory of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe PID 740 wrote to memory of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe PID 740 wrote to memory of 1992 740 192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe vbc.exe PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE PID 1992 wrote to memory of 3432 1992 vbc.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\192b7e38dacf1d14c887b109a6d5d262_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft\Windows Update.exe"C:\Windows\Microsoft\Windows Update.exe"5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Admin2.txtFilesize
224KB
MD5afeaa288a334c7fc5026a69430b96638
SHA19e04eb19ef4dbaef771fd9db8d17165395bca985
SHA2563fa394587b3c211de933819ab1048924001df3060b3fc9b90b078a15066fac43
SHA512f77203f64e8dfb4cf68d7cc1459c7403af0f7146749169798cef432e9736f6cece41f6305e9004b3be4eda3b3161a8cce202912fe46cea9320b2ee497cadf22d
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5d8544174400f315d144888462568023b
SHA19b1124be65fc355fadaeeb62d8bc493a3749ccc3
SHA256d8284f7bfe6c524cda79f5240c53f7441e942ed286826268c188756a59862de8
SHA51291247f077a71652cc0439445d7a87300e5792c22bd1ea7365d85317843730da8de0f67cfd28e7d8b670f00c522f6a69e68980559bd2353dcf71a32ad2332ff75
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5cdd5cf4b0ecbdd1d47c6dba104b59a8b
SHA1f158d739958bb8817cf586e8dc6a251e9f21edac
SHA256b44afcff4eaa9beec0031d552c5cd3a9067c92404bf0ad5d0210a76beee6e73e
SHA5123c1b9657642d879fa793de4836609aa8b8fa52d6ac9c0e55adfc9d793eedb746e7c04a14d8dec2f6d5ac68d1a10974b64d44b7c8189d1f904c0875eec6163e9f
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5e486dbf60468eb0324ef28679cdbe285
SHA133a4352fdfeea31cede084eb53191c7ec43419c2
SHA256accab860e784db537540888fea226d715badb703efa9e456b465638c2e8a15e9
SHA512a887453b5e75f7a1f1525a207e90d77bc3bceb350d171c96b8c7f6458a1a513ab1d3c0fdbb2db9eaeb7539de2699831abcb02f3f936388e1644b0755d8ff4dc3
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5202dcb88b421af51c91f6841849b9474
SHA1744a254127879e2e2821a2c2cb44b4a558668911
SHA256c6826806e7a2a169d892ca1d17f124ffe528da78bdf7fc22e081fd0c11c7d436
SHA512b196ada8739bdab7bdb9820cf33000a65365e3df471a8c39160b0bfe2aaec5f1671044f4c8c09301849b0f26aa776b7abc351f8b9b5b4cea454ef7e7b51bdd25
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD56d97a15acb82945e5746a2a1f0fdf986
SHA18d0220ba9ce01749a4b46b1110483c6a078a4c90
SHA25613f8a9251a1c39f6e1233512487a263facef40ab0c4c57ed2e5d7bc23bea229e
SHA512ffa3ac82214b6b721f14ace26125f0b8271b73b388488711ccdd862f98ee9abc8b278aeeb232d3f91906d46d5c5bc38ca3ada0977066c70e27b1763af4bbea18
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5aad951acccd0ffeb6e368ec9615be8b7
SHA16773a7cf45427b4a24bf325fb5f6538bc21cedab
SHA256ea2bc28e746502e25b18593f935ab6653c00837f6d0120d4b3844e3987741056
SHA5121f6785a601568f6452dcf76989cb424fc57abb697cc0e79d15a0cc4602c6b50e564552f8b05e7bf5c78607524324da10e3d2accd0fa5b7f4109d0612f24d8c89
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5771a1860bda0830b1b32ca557d033438
SHA1518c1b74671eca5b0350fc7a41d8a62b33709374
SHA256c5774693063461c3cb15edb23e924f30c389c5153c09b91dc1aa34f49340896c
SHA51218716f61cedc8311d00a157f0d08a867dbe488c8cfc38eaf98cbfea6efb26f9e95dceaf3114b30e4d34f538e4787b46ae5302985d3423f95e4ba718bc667f303
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD58ac0ae6621243c45fd17909cd11d310e
SHA1288fa9caed838951225d7964f24f24a4f41174a2
SHA256ed435ff46134801843e9e01a64078db2fb26b7b47c8061e58f323e6167fceda3
SHA512e432830eece55b7bbfb92f16c9e86481516723d5609df01f429e26fa844a871c1c9647837404c33de890c969991781bc127502a1e15943f03aad470a3ac7597b
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD58f035f51e943cb30462336f723d5f319
SHA1419126c0d5aed137508d5932f4e3303c4031bebc
SHA256b3e00895cb40a9a6dc366cf545738c80351a0be228e4f7552645a472e2cf4959
SHA512175bcb6ed9af738257c44c0dd0d3e39448de6e7a647c2fe8611df26dd5091e55ca96a38c9a4cfe5cfd1e2bcd7d11085abd9d4d13ed6cd35f73773c873062211f
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5db5cf08132727f98d5a7dc8c1a9d19ac
SHA1897623c4e6eb82b1de42a3cb1d47cabb0efb1400
SHA2566a1c2a4befeab7eb057a4a73103c4c422ca22936fc22d4e1db9ab127a7653562
SHA512420fe8a44b697b8d157fef3dcda3af0abd6a9a3ab08a4bdcf658ee52bb299f22ab129467ffe84894925a572ef4ad2ba5e7e3db60d314b8c7c937f572db2bdf89
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5ff83af7ac74a6e491f755125006391a4
SHA14fdad4441348beda0ff2803490ed3fc20e7ca2bf
SHA256c287bbb63a80e2385edd2753089821217c83f004a4d3a859d40be93c0396eeb7
SHA512e012c2ae1846d090b614a1b76743b0925ed93d48c2838ddaf17e70fcab86d0266e7fe4036a71f998f450f25136471e58886c2c929ccce6c885e43ebed39ecf63
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5b7b32bdf0af63cd3b137cce904420aaf
SHA1ff430941ac27301549a4b4b1321581364dac6e74
SHA25671de3b6276e47495f002321759bb75573556950fd1d1571e6d793a38cd0931b8
SHA5124fbcc08d319e164d10dcb8ddf6c28d257ccbad1366592ebc8704794a1df23bc661ac59cf764a3242d14b714cc15d15a1715d8d925a3e69fb58d2eaacb9a422b4
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD57dc795388ef88feb08e079112e53a2ca
SHA106cb0919a6a96fe9f4e6f9b3807aa7d79a6c199f
SHA2561bf0d74fa60177e09ed4071b74c296086ace88e9ca59cc054624d56a8e279fba
SHA512f937fe33da89f8a34eb8f7a122023fdd087f0a8c4c4e113d4c8b7923a4776755cf5043ea0dfb3e157519fd351a332e5bdfb4df0d5da7dd02c70a161ea74d5bc5
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD54a627f809dbd931d144bd97c4cba7dd0
SHA13d85ee054688e3971c6b273ac041d7a0b4df2996
SHA25630e55af82add2b3afc35e30801fb546bcb918af5cec98fbcf2bd9aef6a2647ba
SHA5121a7eed0461cf856520bfd05f1e4fbea6948f8433f1e4a77648fd34057ba843e55f77dc0afcfec4f5331edb83bc6c2f1765eb1e6e596783e964932aeed2481f1e
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5b2c927cc42cff06f19400f50b9d79ec9
SHA1f35a207c79b9a6d324113db7180b09cf552479a5
SHA256a40e7878e22e122dafe9c75bf10972ba0032866889dae771233c63b1087ee101
SHA512e3d3432e6ac7c811aa56f46faad2861e1924c6b476f3a27707d6c0c31a5ac8ede26f711b54f97858abd16556abeaaa5ddcd6b41ea9bf4a535fce683f12222a62
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5c96d3ed3f411d483885034d88f6a4a05
SHA1de7b031ee81423ae8ec102d9031b244e6e14e19a
SHA2560479bc8dc2a0098b04d44ba9094eabfb144a4aa8f1fb8ac08f6e2cd646587991
SHA5123441f0df599c00fa85dff17aa952c7cdeef402aaaeaba1923fd741ad91d761ccaff13007c3127b9388f0925f5af4330a0c28dc300d58eac732214506bfd58a11
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD5d3199362e7f00b48589e199b838d37c1
SHA17f50a2249679eb78ac75b01bb821e5e9bf61b8e0
SHA2567e9f16ff9a99703444cae45c029f2a371f4d2dd51a319eb788fcfe141f1abed4
SHA512dae104fc3cbad516111d10ded65db255be6e80d731a3cb699f7d494efe707d6d827c33b0852602d5785900a49701efafb361730771feb1d2b27f31313e8452ed
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD599ff54a2a7e00898386769518574d390
SHA1ea2eed7f42fd416b12fe28cd90919897c0d070e8
SHA256a269ec9e157e3b1570e1e3b5b6a9e1613d486af3fac2a3306d6e38b5342474f9
SHA5125c84e384657092b83b876fe995ef5659adac918caa704844217203923f2f96910947b50b5b7239048f153a3d26019d5ceba8b466ec5efe7c84b45b899a7c35c2
-
C:\Users\Admin\AppData\Local\Temp\Admin7Filesize
8B
MD540c72a149f2b2938915cafe7c3e45770
SHA1165edd0dc675c5c8bdbc30af9a21f791464f3d0d
SHA256019689edae1191c403c8027ab95165a91694ee185764d40a91197fbb8f447358
SHA5120a96ab8ae7f1f72c8682ec45a933b00b2b45de118d8f033b9c0842ff7d0db306ce1dacc3d2ec2777d02a7a9dfd78f936c67680629d061293dbbfe89c6eaa988f
-
C:\Users\Admin\AppData\Roaming\Adminlog.datFilesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
C:\Windows\Microsoft\Windows Update.exeFilesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
memory/740-2-0x0000000075110000-0x00000000756C1000-memory.dmpFilesize
5.7MB
-
memory/740-12-0x0000000075110000-0x00000000756C1000-memory.dmpFilesize
5.7MB
-
memory/740-0-0x0000000075112000-0x0000000075113000-memory.dmpFilesize
4KB
-
memory/740-1-0x0000000075110000-0x00000000756C1000-memory.dmpFilesize
5.7MB
-
memory/1992-5-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/1992-3-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/1992-6-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/1992-8-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/1992-16-0x0000000010410000-0x0000000010475000-memory.dmpFilesize
404KB
-
memory/1992-152-0x0000000000400000-0x0000000000456000-memory.dmpFilesize
344KB
-
memory/1992-19-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/3924-1439-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/3924-153-0x0000000010560000-0x00000000105C5000-memory.dmpFilesize
404KB
-
memory/3960-760-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/3960-81-0x0000000010480000-0x00000000104E5000-memory.dmpFilesize
404KB
-
memory/3960-21-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/3960-20-0x0000000000660000-0x0000000000661000-memory.dmpFilesize
4KB