Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/05/2024, 22:11

240527-14ae9ada43 10

27/05/2024, 21:15

240527-z3zhbabd59 10

13/02/2024, 12:11

240213-pcwzdshd2w 10

13/02/2024, 12:08

240213-pa6qtahc7y 10

18/12/2023, 08:13

231218-j4g2nabaf5 10

05/12/2023, 08:54

231205-kt32taae27 10

05/12/2023, 07:41

231205-jjdthahh6w 10

05/12/2023, 07:38

231205-jgmcvshh5x 10

26/11/2023, 09:39

231126-lmxf5agd87 10

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/12/2023, 08:13

General

  • Target

    Malware-database-main/butterflyondesktop.exe

  • Size

    2.8MB

  • MD5

    1535aa21451192109b86be9bcc7c4345

  • SHA1

    1af211c686c4d4bf0239ed6620358a19691cf88c

  • SHA256

    4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6

  • SHA512

    1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da

  • SSDEEP

    49152:5aA7f7tlVmdqK23H2bpHI4Qs5ABV9WRHZRsgI82lcHGAaKLinXBgJ:Q+VMkX224QsWBq5SfARGRgJ

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe
    "C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\is-B3H3H.tmp\butterflyondesktop.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-B3H3H.tmp\butterflyondesktop.tmp" /SL5="$30156,2719719,54272,C:\Users\Admin\AppData\Local\Temp\Malware-database-main\butterflyondesktop.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe
        "C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2880
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://freedesktopsoft.com/butterflyondesktoplike.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe

    Filesize

    3.0MB

    MD5

    81aab57e0ef37ddff02d0106ced6b91e

    SHA1

    6e3895b350ef1545902bd23e7162dfce4c64e029

    SHA256

    a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287

    SHA512

    a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_2904BACC9596DCBFDE1A1AD512218F17

    Filesize

    472B

    MD5

    618c421ae8b21ead9b75846f59212e90

    SHA1

    5b0d86043df613f04ce45553bd97cdffa6989f8c

    SHA256

    0c09bb037f1099544939fa6a91412038f1fde0168eefbb64b6e0ddbcbd964cf0

    SHA512

    ff31251231a50ea394a59f5c042f159a68a9ca0bebc871dd4db59e8b371ddce2bd227a4b57092dcf0a9949a665e5c8b8b53b31841b72e40e5c12b02845cffb58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_2904BACC9596DCBFDE1A1AD512218F17

    Filesize

    406B

    MD5

    78bc758f7aacdf4947a1b8b3bc827449

    SHA1

    6e01bb72bada707dbaeaea7300b59aad2f72353d

    SHA256

    0f621e9c15f509aa02842928b7997526715b52b61780b60c06dbdde14a3c9175

    SHA512

    15a17d5367643da0c42437b20c138277a86a3affecb619006396ee0e6b6119d18ad10602882a56cc0edf4d4ba7bd428ee32adea1da0cecd340f6e59024b9cafb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1e5eacb219bf084e8ddb9b7658feab2c

    SHA1

    a7af1eced29468a8e0c5592bc4428d7204d6ec40

    SHA256

    cfd1d4731b2f3a508ed5ef87a8d527c1326d442ebeb715196bf3ffae7077733a

    SHA512

    6d20dd550cf04e3e4a06714eb4e3111ec5d0b480230b82a66c2e0c0eba91c077edff6461c1f34075b036b6c3eba2e7297b3bb690b9e48f980aa96bd837bb2f78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e5a40b31068f86bfb0bcedaaa86aab17

    SHA1

    f16067df1a46ccb8ee2fb417f3e87ada61d8a02a

    SHA256

    a4a03c01c2d0e77123d333f050c0668e64916ee87213aa36d27cc797099e4b09

    SHA512

    206a0a23a7475fbf3f5e3fe6f86d3a0c20961bcc8a27af3cbc1eede1bdb1a8089b683528e11c6add06c4f67bf8e2036a1d31ddd3cd0f8bd997af2075de390a3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    729da2915d2bd5ec3933101e5ab69b40

    SHA1

    a17412db3919a185d9ceeadc489b366be9032e86

    SHA256

    2e47a65ba8802480b0e3abcae357e5c49ed330f5388fc22d3cb9326b2243ed00

    SHA512

    b9880e8572c63c3be9f38f589914d87de79ed2df4db5b9f0ea185c6abb99898c7840a7f9867a5a395a887f94f15c81b898c450fa15a1c026aa9d4a1433d3c081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9683cdc666905cc35e19fb434eeeb939

    SHA1

    aeb3f35fc85d665d889866186df6d3dcf79b8515

    SHA256

    cb8110735664d44c6d289ca5e473bce02623a020cb7ac3372c9789b49e1e0acd

    SHA512

    713225bcc4dab98247e424eb78c68f00b20100a78c1b8e03b13e49c2a9295867a47e6aeb98965701f53bc6dbb001540b650cd00a6aef31e7164cbebef00a380d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89ce09f5af11d17c8e35473612da1b4b

    SHA1

    e08b5ed220d68ba41f41424bb5cbfc8ba41062dd

    SHA256

    dbc9c337c9f9929e8ecf637fa2681957a1936ab68575a7ec6481163f0362008c

    SHA512

    80c08531693b0464551a0d5f36f7fc295bc31c9ae10de44628bc13336ed7af3202fd4c9328d3f6a002e94d014c269eb8b0e1d144d1794e5357e765bf40a34e3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f05f947bd663a7c9bc1d88175bc182c4

    SHA1

    51deb4402153fddb391b27ec1baa95d7c1289c34

    SHA256

    3d078e416179048828cf9ddbe272730372aedaa8057bb5f35414fd698b0e26ef

    SHA512

    ed16483b508dc54d877a8c93a1327c83c21b7fc0dfb06fb19c57af819091063cd3c22b3ac73da10e38fb8f9c396f7b09140e1a011db33f62b7ce956fdcb27cac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8e3b55d42c247e8a257f4abe376ac9f

    SHA1

    9e789a99039cfa6cbe4c0cc53800def949ce198b

    SHA256

    aaaf6bd1eb1a86c7da73bb504c6cfc6005c1a16b43c725ccd911690da0ef57f3

    SHA512

    f48eee53ea3f82e39fe17000335d2e6c324b4a6871bc3979b57b61019e05e8b8cc8a2c9f493ce079d5c049a9c2532c6ac957ef106cbab449b33fec791aff2be4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b2a34036099d87a616f94182b024807

    SHA1

    0623d1167c0ab647e599213a3f26bb8efb34965b

    SHA256

    6bbe7bb7ba71f21808380c4bc9412639448f560d7ce227ef5924d877a730cec5

    SHA512

    694208e95363252d2c1689e490b7abf31bb693e7fbdb17eddcb0e03c2b751cff5d6a36a80921f611e641f952277da6f5a071b20e1b9f4de3a8c7c8a49c3ea14b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5382a1bc521c8a8b02da0b629140dcae

    SHA1

    d9e7fd4f6fcbc4bb39149ded474a7fe969db4423

    SHA256

    f560e8c6213fb93e417fc611e3952e5487924cdc0ce9e213006e689277df5ad8

    SHA512

    29897a3ef8002c4f5eae87815870ecd386aa22d0326f5a9136c6e1e0beff7761588c6604cb64ce9485b9cd363ee15c7deb92c6dd5398bd68ee49b52fc07472e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8bc8ec7764c4d56c908170bf691025f0

    SHA1

    7a21337fdf3044b320527e72db516e24c1e224bd

    SHA256

    4bd3ee4a9d1aba34764f30122a082c36e9bd82f7cabbf394dc9f43897c32fa67

    SHA512

    9306b6b12c7eb581f6f970453c729845e4139e99dbdd47f6d58cf111d2cb2e0f0aa7fb7ddacb07fb716605c151034d1f99b4373b0fafc37f604686a38f4d4a0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d79786bc311efd500c407ca26fd33702

    SHA1

    caae03cd746f76f81fdf5bdf16e21aeff9b159eb

    SHA256

    b6db51dd310a478e8d9df021785b01d520dd98e60080dc28745359d82706ae31

    SHA512

    b06f7af97106dd055dde49ae9aef474651a1f0b3d0b38413a1286fb91d58d5f986091c3c4c280378a9d3e22c9d540ede9c272526254c95fbabe76dcda296b405

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bfb34757b93a9b874102b9723ccebac5

    SHA1

    21e09bc03f2a93afa50054bac31c344aef269e13

    SHA256

    64e58d3c0dfc1344800a5c86a1928c2f74e1e8fdff7f14b4ce0c1dfc0fdd782f

    SHA512

    e60af858dfc2899a27b1907bef82143d54ca773b0ab0b29d832d29022325682259adee16de9889d67e45fdebf883d52c23c4b7273371bc4e597574ccb8ba0bb4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    566861a990533317cae20ab4b7c08dd5

    SHA1

    95a447b08bffbd91b62b7cdbe111b3cce625ca65

    SHA256

    06ac457fc5f798b761d207734ee3482833b833fd0a2244a5c5a002350ce9cbdf

    SHA512

    d5d3ba200305f16c8043411a72bec35ea17dc954cefe4660ed6e76aeeaa27853dd25b82f5b3e9db8471c1a37bbbee392dbfef4cb412888936da25d6628999cce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86c8b3dfce00ef3ed81f8c0e4b4f793e

    SHA1

    7bc30008773f2eaf6595f4193821f3eb838dd9d1

    SHA256

    8ce1983fc3697fdb13795d0bf17c9cdfb1889a6a849d06de605b329912c8a4eb

    SHA512

    73370a08a79152fed8fadd7a8260a9cb7c9ed7d5a8e2e30e2ae541cc3f0aea5e1f835d11e9fc4ab8690b3fe73ba030a1d483b21d7556e7d1b97c4a65625f7492

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c856e69fb693dbe8bfaff34d1e507cb

    SHA1

    c2f421f1616f8c62a5815825fe01b4579bf52540

    SHA256

    d1cff24377b1f8d50c3efc567f84e098a3026a32167e4acfb32913dac895af67

    SHA512

    efb01fcbac6d938ec7abbe42c8ab474ecc91ffe88b8c5064f2e7c1cbbb1415a835f29f3c6190ce966a99869085e12619ab791206818c858089a8882f862d1053

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e23b14e5cb606d403f24b85237d5046

    SHA1

    80480bc42f22f01b331ccccf091c5ec262b644d0

    SHA256

    e166ce82cc124198ca4bfb3ca613ceac3bf2ec203fd2c9356f5a224bf327b4da

    SHA512

    e7d64f62ad372fd911bc9a032f1daaab85ec1013e3ada0257d8fbdc87c5215914993cbd027cb4caba9f6d23bca3910cde0d4a3e3a2bf382d375c52bde8796b03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13576c7a4450f33207d66213e971636c

    SHA1

    5d5af4a2cb2c87ce1356d6d5b78cb3925c9d95ad

    SHA256

    c0939d17a5c9e491843af6119e910965f3d644ebafbd44709ddeac29bb0b02f4

    SHA512

    cc442255ad40709089a7db4d86b6f9eb4fa30191b46a5e796f8bf8513a08e9a6005f54f594836d0a39d63d7d477060a8f02104cee96c69ccf1af9586b1fd0fc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fcb684936bba3465a33e888449795e38

    SHA1

    631ac2e748725558d86f25700a54da182b06fb5c

    SHA256

    907526815fbe4627d3be21c8cdea8286f79995f1e662c7bba23d57b8ea7a4b73

    SHA512

    71966cc40f07b8aab495a3f04b89377992718b39c37f7c6a2de080f957ac5ca71010d47266c2d56ab5301a6afa1bccb1a3247637fea793625dd1fc4b50093f1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0bf13960414936190d5967563e54d5b3

    SHA1

    f750411ad7b1a469c91d177bb37a4b785eb64e51

    SHA256

    9d6d028dcef115bf058547891e570bd44b6e0ca1997a3fd49fcea77410f3eb11

    SHA512

    f582174180505c7af541476eb342e474eb37848b625b394f73e82fec08076c5980b2a523f05be2c2851a6536dafda880bc4014cf4ebfe4b8927a731680ba4d06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cf4a00bbae9f379b5396fc862cf74620

    SHA1

    81d339ff7329dda81f31a71a45f4efc5e56e26ba

    SHA256

    c00d9e56de95294af7e241e65f4216e53ced780c524b787d70e64a7ae0593854

    SHA512

    4e61cf83abd3d4d071b869084af832686ccaf84f533da090149293601a7a431fff69786b1f7697f3a3fd74bed095f23ffc77637303b5128fbc945875463077ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34b80fe8c220a6cec87c2df104455a91

    SHA1

    39e0a5c9f7a415cc5cb7ef3ae06f77d1dfcdcdde

    SHA256

    3f7a6b136b6857dceb7ea9422f6e01c6ad404773f6f8ea2fc7e71a0be7ff9ca0

    SHA512

    0c13b39072a3b141c74bdadce97249aea4c057123675364bb3d64825fbc2709596c02d6964cf010d3d6d24f5d67548b91d60968fc17abee8d9af260b67c6e0c4

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\3TW25EW0\www.google[1].xml

    Filesize

    92B

    MD5

    39a8b8d0f3053380197785d28a884351

    SHA1

    d126c93976c1eb1087a3a71fb744df2e58d088ce

    SHA256

    7025f6773a217a2a52533b4e850907f4ec9ed43d8a5dba54f8a8c33847586599

    SHA512

    e7655a0611ffb09f9c233f06fa1e255c884f252be8ee2f49f94c2d362dec1e70be31656b84cac9be2e77db248259c6ea7bb2d3551afdc24df23c9128523b9843

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\C3K85OER\freedesktopsoft[1].xml

    Filesize

    103B

    MD5

    2f3721077a76a82df464e6d7a22d1849

    SHA1

    ca928ab7f4991499ffca5cc7a9f073b3e5a98cad

    SHA256

    56118a1700b44aea6dcc40d73c43c6acd08d4f112d0bda92e2f9da3a6396ba88

    SHA512

    9630a9f28d5e92cd8c75c2def77cfbe0e20fcec882c55001a07fe9fe49dd3a519f08d45ff8487bb3950d745465607dac7272d55f58f8c1982ef57a65889adf9d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\C3K85OER\freedesktopsoft[1].xml

    Filesize

    5KB

    MD5

    5b103281af7a7397e53d6b9a12d02f24

    SHA1

    7c32a15f29bdb8f5f28e0bd5d84594d53af7b5f5

    SHA256

    face941139533d364040a20a078573dd613d4be8ef802210d1961dec98f2533b

    SHA512

    e124ee1d02234b91fca4f7c6525416931e992013dbb73981d49697a85e75066a05cee8a96d02cb1ec40a06317c6310123cd57a90fc211cf0ec15cf64fe8409bc

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\wz5r4lq\imagestore.dat

    Filesize

    1KB

    MD5

    6a00b8a19485d782bf7fe123b8898aff

    SHA1

    901d22f5a95ceffb266f555abb080007c5c69d59

    SHA256

    73ab5855de20e32d0aa5925d10a0f20d3301b10cd3297a4cc89b87fd6e3538c2

    SHA512

    8da4cb26100044b3f711c34c741e457fcd9aec9196cffb22e3494a48046a044067d2f6ff0f0740cc56879436cbd557e90253aefe30fda59ed47292ef0a055e99

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E324WJ9A\f[1].txt

    Filesize

    29KB

    MD5

    7bc13e084e4b651981936b63e5262df3

    SHA1

    f06efe403f59d8ff15a771596fa7e4121b2e1421

    SHA256

    425c887bd8caee3ae355f251cb53649dd492f884523e1609ce4437ef70edc727

    SHA512

    4f9363e3fd5c651aca56a72ee5935b2421e9711db56c3505df6570efde6ff092cce7e7dde6fb40d27bbe43bc9f3ae6fe48e0efdfc6f3bf3b97776250d5b4109d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E324WJ9A\f[2].txt

    Filesize

    53KB

    MD5

    7528067fcf996e8d6cac25c95051baaa

    SHA1

    92267f58a3ab0959a5e3954c9c9c8b839218584f

    SHA256

    60fed3181b6988afdf2820001db18b9ebde443b9899fc4e89c6ae5c6bf6bdd33

    SHA512

    b89d7f77c4e16ecebe6c03c06faa6cc08232c2d462287a846e281e599c9ce6e357b324971387124f934d6526c47b466f4f739f962da637dac8b5a0e2987c860c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGM5U0T3\favicon[1].ico

    Filesize

    1KB

    MD5

    972196f80fc453debb271c6bfdf1d1be

    SHA1

    01965ba3f3c61a9a23d261bc69f7ef5abe0b2dc3

    SHA256

    769684bc8078079c7c13898e1cccce6bc8ddec801bafde8a6aec2331c532f778

    SHA512

    cb74de07067d43477bd62ab7875e83da00fad5ac1f9f08b8b30f5ebb14b1da720e0af5867b6e4ab2a02acd93f4134e26d9f1a56c896da071fc23a4241dc767f1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGM5U0T3\ufs_web_display[1].js

    Filesize

    203KB

    MD5

    687f36959d3133324c89c89fa708b3da

    SHA1

    d95eecef21ac59ff2d9359d452394ebfdbcd8181

    SHA256

    566012676f5d43acfea4dc0bc5d9bb2c0805d8775fcdd081b1c895310956829a

    SHA512

    cd732600d7f757fd7d031c035db9445b2564936a79c1d8ad7b481fc295989c7d2c10bfc0c0cec53656c99ce5479a76d5f231ddf2322c9ae2496611fc287b4f5a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SP6DRJYJ\f[1].txt

    Filesize

    31KB

    MD5

    e0a8b8097300144ccee5948026827cf3

    SHA1

    5a693ff5850843af1797cfc8781322934e812051

    SHA256

    565592ede82822decb298ebd1e6f56e9c6a680b1a79cd4208513a834295e4c43

    SHA512

    e19564212d6454eccdcb772b9dd4ed6261e2f9a010da30dcc55098eabb4b30e9ef458e92af84b73f67bb68675d62dde616e63e48f589fd5f8b0837d9445f20c7

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SP6DRJYJ\f[2].txt

    Filesize

    2KB

    MD5

    43df87d5c0a3c601607609202103773a

    SHA1

    8273930ea19d679255e8f82a8c136f7d70b4aef2

    SHA256

    88a577b7767cbe34315ff67366be5530949df573931dd9c762c2c2e0434c5b8a

    SHA512

    2162ab9334deebd5579ae218e2a454dd7a3eef165ecdacc7c671e5aae51876f449de4ac290563ecc046657167671d4a9973c50d51f7faefc93499b8515992137

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SP6DRJYJ\sGrT9ysWSs9_t34896WOusE8LdS7rNyFrC7hJy7peMg[1].js

    Filesize

    52KB

    MD5

    d48d74adfc515a71970fdd0ebbdbf6c4

    SHA1

    fa16d2837d440b0d29b8311ef819b2a4d324656b

    SHA256

    b06ad3f72b164acf7fb77e3cf7a58ebac13c2dd4bbacdc85ac2ee1272ee978c8

    SHA512

    60f9683fb6d79a52713b301f853bffda4dd72944b4699eaa388be5a9d1cec929b2a21b584d9f11fc33d236438088cc5468ef1555c9e4b7dd816bdcc5c34022ce

  • C:\Users\Admin\AppData\Local\Temp\CabEF1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF9F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • \Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe

    Filesize

    2.8MB

    MD5

    d878cc1292f398a1ddb81cb3c33deec4

    SHA1

    006d7989fa4fafec6f600f97c2568f9abd778f7d

    SHA256

    04f0249051e5df983cabcd4d42452cd34c89a75bfd55d1badd690d030c10f6ed

    SHA512

    7c1ad56f6b7506592a0f18ab6b80cccfb12b7d75db12c2ee88e89afecce734ca3e947e9a349f34dd3db323ed07a97e7df5af1122028127a9bf7bcec15fcbf90a

  • \Program Files (x86)\Butterfly on Desktop\unins000.exe

    Filesize

    698KB

    MD5

    1fee4db19d9f5af7834ec556311e69dd

    SHA1

    ff779b9a3515b5a85ab27198939c58c0ad08da70

    SHA256

    3d550c908d5a8de143c5cd5f4fe431528cd5fa20b77f4605a9b8ca063e83fc36

    SHA512

    306652c0c4739fce284e9740397e4c8924cd31b6e294c18dd42536d6e00ad8d4c93d9642fe2408f54273d046f04f154f25948936930dd9c81255f3726f31ee65

  • \Users\Admin\AppData\Local\Temp\is-B3H3H.tmp\butterflyondesktop.tmp

    Filesize

    688KB

    MD5

    c765336f0dcf4efdcc2101eed67cd30c

    SHA1

    fa0279f59738c5aa3b6b20106e109ccd77f895a7

    SHA256

    c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

    SHA512

    06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

  • \Users\Admin\AppData\Local\Temp\is-LJI67.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/2344-9-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2344-57-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2344-1-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2880-756-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-759-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-757-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-52-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2880-758-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-755-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2880-1195-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-1194-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-754-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-1193-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-555-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2880-1192-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2908-56-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2908-8-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2908-10-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2908-19-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2908-20-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB