Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 20:20

General

  • Target

    41d1642b55e0676d0bec66325b3dcb66.exe

  • Size

    3.6MB

  • MD5

    41d1642b55e0676d0bec66325b3dcb66

  • SHA1

    cb47a71340cb2d6365a18d7caae63e906fb9a883

  • SHA256

    15db1f59b96bfa82618e48e8a149533fbdfdb1e8376059e19d23f24a09901015

  • SHA512

    6b82ee05bace9679032db3cb9886a4880a80e37713c3e143cf70d4edf6834a2cc2bafc00c009639c84022bc81ed0d93434b8f073c5a288d5894256355d2937e5

  • SSDEEP

    49152:MWVwEWxNIjbMoMMMWVwEWxNIjbMMMMMWVwEWxNIjw:gEWxvEWx7EWxR

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Manipulates Digital Signatures 1 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d1642b55e0676d0bec66325b3dcb66.exe
    "C:\Users\Admin\AppData\Local\Temp\41d1642b55e0676d0bec66325b3dcb66.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:636 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1156
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:636 CREDAT:799758 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A

    Filesize

    893B

    MD5

    d4ae187b4574036c2d76b6df8a8c1a30

    SHA1

    b06f409fa14bab33cbaf4a37811b8740b624d9e5

    SHA256

    a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7

    SHA512

    1f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81495891439946fa0ea4da55557a645f

    SHA1

    38392f0e7b00ce02d5b61ac0ab5fe42e68f739b3

    SHA256

    a1d506e143456768b87deec7c5abbc193dcb4852b0405d92a023d05712b19927

    SHA512

    e85a4152450bdb70fa78f6d2e19eed35ce27ca071934163692348734459fb356482c4629887f3eccd6a3dc78e2b121c1472245807734339fc66105e1bdbe2d7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ce20afb7564d214c891a000b89a2d0c4

    SHA1

    9dac3ac8aef7f6e8d852735bead24020a2771739

    SHA256

    90f734b0ba0b82708c13676bf5d75ebe338f96f341d2ad89b9885344d01bcc09

    SHA512

    ce799b8b8472f9e97bdc131fb6c9cd5ffd7401b57ae3680eea5a2d5f2339116f4e6adce9706a400e2ba007cd4de106e73d9432f1a64a0c95dbe7db813d9c8e2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    635a4275eb00121de0888a7372f8ce05

    SHA1

    a5a513d40a502ffb9366d59001380b3fc8e5c87b

    SHA256

    9a1ee97e808ff165f774f70329c7d365d741d17299596c8af0d8a9f8c9a1456c

    SHA512

    0ef9a3fe5d0f0a090533796beb631baf7f534a09111672ed4f14931f460f56644482d3be795a311a290a85af29598c24d08c4e2ab325348f6d90ea733831789d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0cc026ec325abdf2d759b652e0ec25a2

    SHA1

    0ef8a0c5c42003df55bce0f9f36f591d6bbd99b1

    SHA256

    22bac695d63b10dd7277683bb3fb1f4e8b19cc5ce0ea5c41a386969c7c530e10

    SHA512

    d380718160f5ac2a5d281d4d5a769651be245599afbc4ad8894a96711796fb180b800fc9ee38680ab0aed59ec4bec598cfc649b1cde662732b330c65209a7052

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6b5be866d0c862ff2dfe1a6423a11100

    SHA1

    6a0803085d6be503014f72c215397d0898181dd4

    SHA256

    00125f52763ed0b23d90f6592399ae28c191b1524db2e4b16964beedfe53ca39

    SHA512

    dd526b585f157b787ad5e29c4a9ad70ccaffbb8388ac07ed272499daabcc157277e9043ce3032a42656b24f0240d4b86dda6f5f227e775f5cfecd0ca0531cdc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4e75a4d9716fb9a0e83e3a198fe9112

    SHA1

    c2dbc359379676011f4a88171b06738b92fa9165

    SHA256

    274fefdcf2f2c2586d3100124b3e11a28ff9d3aaeea2ec31153055940dbf166c

    SHA512

    d15c87c25fd8f1d074f6875f0bd2ee0b9d04c165ea9973e2ceffafac1bb189a6d940fbe8916abf1ed6e5c5274c89d523b3ed6207ddec5a1d6c2a1e6050911ca5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d99aaba979aa30bac6baefd0beb82586

    SHA1

    8d1b844eaa6f18c1d95e439421694cf04959aa2d

    SHA256

    5913937f9ce7fd826d9a6da3d291f39ca761045c881b0134dadf0785fd8813e9

    SHA512

    b44e4cf5c4dd4cef34f2b20b38f65d052f08f8be73adc47c0aebb32035614ff7d0318677bf590a73edcd31f5266a7955be7fdcee12c4f000ed4fbbabdb9847ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b71305b0323e5035c7992fa45d6a66b

    SHA1

    757f52577731667989306b80022d1e178e2b8ce3

    SHA256

    2cc49419518cc39a7a9c042a4a1e95ebd899c861063eef29d8b429869fcfd92c

    SHA512

    d77c92514fda8b3b6cb308d51a4e42e20e06b10214a889a1dcd32d78ce64b68fd810fe260dabaea75dad25073f2b104fed68ee1c7d220b114a3199a15a051092

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7032b8695941ce4e55747895d7071809

    SHA1

    ba9f80258842f5a2237eff44e830fe47a7f156a1

    SHA256

    50d3eb4b6640c596beafb015be2431b29176060478b90a21f56c98e7e94d49fb

    SHA512

    eb28fdd1c6c34d85aa1f725e7d584a00cfe48a4ea14ec0b15834044908fddc279966a1b30932c84fe2943477ca7733666dc24d8fe54666470f9a385d2983bdd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    80e1cc878c588d59920d56e08a1ed0e1

    SHA1

    012bf3a9ef08ff850b85255e8d2434a28f3b505f

    SHA256

    5231cb300df7b6d9e04fcd0f7cc3e53051f371a49bfcb80d4113ec057bc7b68b

    SHA512

    e13924bc52d045ee729249a2ca509dd6d5eae33d296b15443576069bfcfcb1b37abec04d77903258bacf8976b98b8c9593fa555532426c8f036514e8ba03101c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16860bb53abca71042d9b51d7f46d6a6

    SHA1

    ece4ba363ebfaa867582e432f69a67a1efb0bfc2

    SHA256

    e750491aad84ebbc8c8198e49651605ce2fa8930e77151a408d0468b4ad402be

    SHA512

    16e813c269ad1ae1e381e0a260caa38c78c54b511fab113df7cbac5026455da695bfe30f691fb512248013ce627b684aa1d308b21cb32110cd63e2f319506cf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2cb26028bc85fbe6b2ef10701d2e0c63

    SHA1

    bb1eab5c6601d49ec449e33e3fb472a78d56482d

    SHA256

    4a3ecd8f32ad0b50373dc3e8c3cf3cffdab8165821c2a7a6d0f555b033aeead9

    SHA512

    039693e3669c55ec2fdd7faebe748a26c6683401bd9285675a555325831c5b148113db670e3241f0e2b9eadf5348001ab7e48e6917fead9150130a03593a3494

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7fc45cb18804d7934ff7c17aceb805d

    SHA1

    89aea07080c9759b50e3660d4985c71bf2029114

    SHA256

    2a9da1f5757439aea3ea7c0b1b93df8b8d42bb5ad283f7c95e34aafca2a3c36c

    SHA512

    3fe17ae8ba4a6916c5545d7141f44464490d9457139048db8df9189d6561c56a887fd817205d72e4d52c05ab921bd6a6b82bd9f1a720ca7823ad9ed77bd25de2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ce45be5af1b688e346852400b121627

    SHA1

    85794d565962e9646b80676250ad2876e0a98307

    SHA256

    35996d51dd05dfac6751f31a01c223fa6af2d6ce24b56f826d9a7b199086a591

    SHA512

    25f5b677ed287e2c62ef82bb136d8082cd7cb006ad6aeff03d279e821c5a9bec03b9ab2ceeb921e820a607822b39478e09f245b3c2396e705dfcc3ee1a2e5c9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    438cfe17a5c308fe0b449d0d998230c2

    SHA1

    d7bc387b4896202a1f355b4f48496f509c36940d

    SHA256

    8c75c61f2286167bf720b576d008a6dc19eaa63981b57f9127ddc9d59f81190e

    SHA512

    fc84d1ed9f4d33e18380dde29209ac50df554221700079894b8f9d2e51af0dae630a9bd1a61c8e4cbe2edc367793f273a9cc29a93fe3eaff2636fbb2ac689b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37c59e0fa9de5a70c4b86c7a59400b8d

    SHA1

    c4394a45dff37151bac7f1d3d335d3037b1c046c

    SHA256

    00fca019bfcacbacd37f30587859f44250f27d05662dcbe83c98225a365d5034

    SHA512

    04416ea150ec1df8fa3a8b831a1f857e991ffa44541aae99f5221f53e75d1084b6b1ae28ad0544628c80db61deba2ada4c76f840d67c6b16014fd287741dcd76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ba8ef71bdd836af33d37c057a2a7a2bb

    SHA1

    3bbd2919b99f3e112ca70bc35a0715effca9116c

    SHA256

    981256be47c4d4163564a2bc3c4bcc66c13ac487b993315b40bd0a9110596cc2

    SHA512

    9e2fff24cf51fa68a64950d913ca84bbb80e8f13dd7e94e308150b33257bd02730fa2da3fa08eb69acd9e95234b9d52ec51afa29a648782526041f4d53a78928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    34dfbfc34e100019bea171b49d6e7bca

    SHA1

    0fae4864e712687d860f1bc9f560288c6c000947

    SHA256

    6ae14e4114cd2f5b2340490ccf2f3821851512b8d82cdc1585455fd985703550

    SHA512

    7dcffe45acbffb2491ea26ea7c9fef526cd1666ea2473c262b43e6dc6e2bfbdae98c1289714c7ca724581adc9a7737c90a24734e992af004a69cb45d8489cb34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76633b9d48a4dbf6ce29b8f44c2296cb

    SHA1

    a867a68221ad197715b0b31a684092ac35098e6e

    SHA256

    75d41faae501932c6fb0a1b508913a545216a37ac70b6e2d29e9b37094bccf28

    SHA512

    9bee591a8d1d61baf557bc06652436f4c4e4690fb91a2be1d1dd87a470fdbb4811423166478c08eb747b00e0e22611c7ce039c323bea16c1e2d012ffd67189ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c0edcb02f40d06ab2cdd925ce8d5df06

    SHA1

    536b28ed2ec7abb24bf87da7a3812a8e87b01846

    SHA256

    f850a90da05517e3fe79d46c279d984783b072ef20cd004bdb5fdf6bcc18a7de

    SHA512

    e93af9d0d75e2d4a683d32984468a2abbaed95e683450f6a959bea750b909677d2bb83f2f9e6d0adf1bc93f42f3371ade437e639beda5d906c23b12c5c3e559d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6c7dcfa6521b9e189a669d381bd14b7

    SHA1

    ae21cce8eaf4c4f6f0b6e22da6e73945618eaa46

    SHA256

    eb99b01b30e4b54386de4fd7c385e4938aa1efdb28b58bae22ebd31343fe0951

    SHA512

    2e9c0b6de661805143d6a70c881e7ff83d484853506775b93e13003e08d8063fcf48f56a44a2d635e7170f8271ebb1d37538832d3fbb410e5e84a3321c2cb2e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b892091379dac2a48eb0516d1f5c749

    SHA1

    13c5332c2725191ab989152e47c1fb9cd8eef7fa

    SHA256

    5bb922cab5524727ad7734fc5435236e8d57ceb18bad6c35d64d89082a83f16d

    SHA512

    8ce932ff9614cab9eb9a4e7d833f3a42d2ce64c72caefbba589bf80aa67c0f115f572bf57cb347f2bb425fbc59e60ed3611dc8d9e2629ded5b20b56e1f3c96fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    58f1c5a4bd1395dc2213c33a6a029aa7

    SHA1

    89d8dd11d6fc0fe06c2dc60f4622f79722040104

    SHA256

    1f451de013370400c2471ee5409c2dfec2559d3f07a47386584c97162ddc5053

    SHA512

    42b74c6957ee4dedafda6e73b7c83bf53a66724cecdd9674db6678077f3df06d6a77afc7c5529550cbe98de0adedb1e07aa284060806a3bdbf192ea6a64b4b0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    593bff03f46d093ce07e2563aee74e47

    SHA1

    b045f50bc7c4f410cb40c2de3827c63cd6ef5002

    SHA256

    5f03b350c2b65d975b8624cf60bfe3143de372f3b0ea551db4135e7e0f95f5e5

    SHA512

    89c78c4ae1ac594e29cd858a931f6f02f42c6ab027b310d8a17907c41911b72b077dcc7f292575914ec425a86bc6267b8ad44227d5c69baf0527e3187a559e31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c81baf041e71448b5bd06c87ddd9693

    SHA1

    9ca16c15dd07efc144898c5ce216c4a6a4481c31

    SHA256

    36cb2a2e455bccbe85189e614ae2a38e9742c255b931d941d7bc7f541db33c71

    SHA512

    fdb9b0ddd7e83afea1bc01ed0f2d669a97c91bb3effd0e574c015a12809def182bc50a69a90f4a99e683ed3475bfe536dfe7d6cdef538803ce260115163d1abe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A

    Filesize

    252B

    MD5

    a9a3c172b784618432ca0ddb7ec4142a

    SHA1

    8b697d4e07c5262c6afdf50f13b82ff2ab57818e

    SHA256

    71726a4401526e2a239f34ec14ba0cf7466848b060a7db96ba7f4134d0d35bd4

    SHA512

    f84c5b191a02e899bc0a1e0f02c2eb523fe22426db5b1a4b556d09385b4e6bbaa40974ac4b8fb7ff9e80e2ee6ca366468e14ecec793cc4cb2c25ee887bc00067

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\RO2XW6QB\www.avira[1].xml

    Filesize

    224B

    MD5

    694b30cb8ef202d4f43c3d7ab00c6b2b

    SHA1

    e39e0400f943543b98049671bfe46d6eac7b813e

    SHA256

    b3c8aa9aaff38e0bbec29e15212556cf9629a0a85aaa69cea0456aa449127b47

    SHA512

    f1dde68bb438ab1c31aabf0a1315cdfebb640a40edc160ae47183fa8c0ef68c8d1075481bfd79cf9ff8ab75122e38e2b2a25c8ab66eb11f90b56fc73e956a5f2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\0ptx2pp\imagestore.dat

    Filesize

    1KB

    MD5

    fc74ca1ec56132d867f60455ee1cdef0

    SHA1

    55d8c826e1da3eb435e9692b7f19ded1120a29f3

    SHA256

    3759b6050011a685d4e82537191b328872d69eaae077d3da73fea3d1ebcd6fbf

    SHA512

    cde97ac29eeb410e8944b33c753841f7fec94cbdeee525931f8165fee88853a5f5cb65fd3acf904d17c75aa84270d8d3c2f5d806acaa3ff0bb3e3cd551b0e120

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M2VO416U\favicon-32x32[1].png

    Filesize

    1KB

    MD5

    13e4a579c3cfa586f665ecd794e0462c

    SHA1

    b629b7170f76734c495630191e665b6a88024268

    SHA256

    a961b4999fbb3ea58527df10b36cfd5c6ac7cf9fd12a0ecede32a8f7f48fec30

    SHA512

    813d424cb854ecda3bd1cb73e87af2e1072364e5e6345e2a7ff0c93cdac34628146786f1f5fbfa869b95d72ff0071414af13c4453545e76b3f627c1343cbdc8a

  • C:\Users\Admin\AppData\Local\Temp\Cab80B6.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8117.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\2ZLF5E79.txt

    Filesize

    394B

    MD5

    5d735198eded8d801851c2db5ea4a638

    SHA1

    02c50f20424745e3c64e36e56cef38efed81d56f

    SHA256

    6a8ceb96db4daed9feaaffab9bafa2b8b7f1da5f51efa95d322e08a78f6c9971

    SHA512

    de6eb8505f951a704d5cf1c0863736822a211aad4a42ad7f728094d1bcc2e843c8a68dc2e210d6a744a8247fc273dcb5e8277da440d9aad1822f357ce0204cf1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\D6WHM4BH.txt

    Filesize

    475B

    MD5

    3922591b874a2e5d316feccd6208d230

    SHA1

    5d8998085d29da527aaab6a9cf9ad0dc9d39a10d

    SHA256

    f1f95d9af18ece08999384fdf66d73d45208426f4c32cc65c5f3943c7fd5a8ed

    SHA512

    3baca45d52444730045e1726d078a2237afb1b3740ecec367f4e94085e0e656ada113e860e14479d38ca916b3ed979bd35fdaee163f8b30cf0296cad2add2873

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\D711WKQ9.txt

    Filesize

    392B

    MD5

    07e01effd1044f2dcde819e19a80ffe6

    SHA1

    5af7e5d566990f905f152b9bc434519c283da852

    SHA256

    8ad83ccdd3c173ba099bc879182c58f8d1464aa29954c75f82303d0423b5c063

    SHA512

    e596a008391407544ed7343cf9244ed44bde7a8c6c608770b24c2e3a4febb6fb252ea8ea66f827ad6adcd587384bcf5d8fa45451a9fdee5fe6c21dfb37ecab2b

  • C:\Windows\setuperr.log

    Filesize

    27KB

    MD5

    e71efdc9aa2fdd9097f81b2893840d2a

    SHA1

    3fea9b7427d703deffc652fe1cfdb20e09f0cece

    SHA256

    ba898674f10b21e6dc832b7b4c09d86e63cbc9e60fbc796a0828f7aeceaad334

    SHA512

    0373915d37eb62be28759f7a5cee5fa2d8e3f8fd0ffed4eff734346991b36ef7e57ebc1fa1ee958a3bbe295fe69131d24c1124e7644ca4b266ec96219a29835e

  • memory/2236-2-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2236-2010-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2236-1817-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2236-99-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2236-121-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2236-356-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2236-3452-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB