Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2024, 11:47

General

  • Target

    3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe

  • Size

    885KB

  • MD5

    3b27806de4152ee59c982d9d67d7f470

  • SHA1

    db0835a7487d0a66d38409df711fc5bbee6e9720

  • SHA256

    ca4c8f542127562abb8035bd912a61e82d888fc957677f6c7e99f0d3ca32b9da

  • SHA512

    38d7c079c6147a4ac220a3ac069e26fb7cc0f2ce2c7a09c9ba6a817b681374eb5717746cd6ad565eef49031de9e07941dd9a55b62f843eb17acfc7c421265155

  • SSDEEP

    12288:pANwRo+mv8QD4+0V16jUba1dUHXTDBptaxyNgW1IBG7co5yLyWm7vtwrsKSO2OaS:pAT8QE+kKJQHj3uxBPuWQxOGnhmb

Malware Config

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3b27806de4152ee59c982d9d67d7f470_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1eVfw7.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:340993 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2984
    • C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe
      "C:\Program Files (x86)\wotsuper\wotsuper\wotsuper.exe"
      2⤵
      • Executes dropped EXE
      PID:2660
    • C:\Windows\SysWOW64\regedit.exe
      "C:\Windows\System32\regedit.exe" \s C:\Windows\wotsuper.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2572
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/1lTHd.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

    Filesize

    299B

    MD5

    5ae8478af8dd6eec7ad4edf162dd3df1

    SHA1

    55670b9fd39da59a9d7d0bb0aecb52324cbacc5a

    SHA256

    fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca

    SHA512

    a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    7440d455ea52e2c249b1f15fad51be98

    SHA1

    bb239885b5113f2948ec967c447f5e8f52ca47f9

    SHA256

    55a10aac730c34de2f7fc1914e857822e4906a79253f1bf2d3657c16800e00e1

    SHA512

    3030da8c77df927a7494eee0114e48d2e5e3d775ab2e3d5e5e562a87745a9467c8da7bba5ea94ada01d124290cf4c1a41fd9f2bcdc9f8e9ee0985b7b5c97cb37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

    Filesize

    192B

    MD5

    41a700b8140cc3d498d8a320a0e9b3f7

    SHA1

    6b98422db82c699222da8bdb5f060687887ca00b

    SHA256

    028b105ee2fc92c6e23b48bdfacee55872fd6d9dbe8f4c94593536012083749c

    SHA512

    f0db6c950a8eda6208f4159ab39faed840136ae9aafcd11db2a396645cad902bb632ff616c09bbc9392c0227d2de95791612f4aaf9d9e746ef2f601cfd4a5e8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    7df7ef314505f38cde6575ecffc29238

    SHA1

    6e406d3cd25e102f62a867fdc16c051a3c2f374c

    SHA256

    7209d8fd24a28fa525d685c0ea6f6caf884c3798ec33c0891ddf3b1dae0065a3

    SHA512

    114552691e0b82dbab3e70eb47d1f89003a04543c6bc4022557c4357105298a18c62795a29a62d0f7b45044b4048004efc9186588b65e23d5e3bcf71a0fd3414

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    789eff4919ca5336f562e0f3c9c50c2d

    SHA1

    83e7886b4c3b61c83357f7e4fb980c97a987267c

    SHA256

    6dacc6b9e5f8a5da792a75855a7b68575d040158da8f72bf40fd0c1c504b619a

    SHA512

    b32f03e437b23cb268a51bfcf3978a1c2a6b03c6bedd165f7aa372a070bc8855604b6a5900739ca5b13d36ccc4800660f56fc05e874bd2052887c0e817390290

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f708b0416577b1241dde1eb914a6bab0

    SHA1

    e70b856dabb6ca44f431e1da779368f439cdb39e

    SHA256

    825dc2566c9dd9ae3add9704470cad770365e64d75fdb1a9e9baf66d344cac2f

    SHA512

    74028fa61f3cec681f76dbf0e8d0ac75d16ada2ef1f78fdc1b895e016e2aa0a20f9ec0a8ae602c1fe4ba7e228f28ce7337bab197e94ce5cbbd10f20a8fac5b77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8363e9a745ebb1c629f8be50c9ab9a4

    SHA1

    b05045f8e71918e35848e24182799c7df814a822

    SHA256

    83332412ec8a08472264de6e9238cb41d9abbd507f929b882a0bf3881f7e0f9a

    SHA512

    289dfeb289db562a49ff80d1846b85a8d12f09dfafd7be5e8f3f7566d462f9be581ea51bda231811b122bca9e2b581fc5b5a6d5b4f239c1518954d9dff9e46d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ab29156f887ecb5844ba8ba981b53e5

    SHA1

    d0af4116621502a4a8a197d46f12521343b5f668

    SHA256

    cde8eadef5a0ba211a509c979e422a2d99c022368c90a58d87f02524291e974c

    SHA512

    700a618cce781de8f5bb88ff0c656a847825314d8e58b755c44a280b072deaabfb4ecd44602993b0b12c4f5e70eb04809b0b30cbbfad8429509605d953e286b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    02744b6f04f73c199c766906cb60851d

    SHA1

    11ae1dc0a16d535b1bf44e4e1cedffff3d935077

    SHA256

    f9d83009ca73a477cb88efd0ad49836a36b90de7d92c296c7d5f8c884a8d2e8b

    SHA512

    e8c002463a9e5a9e88f9cbeafd0e23b90474173cbd4d37506637737c535e245fb9ee78291da58a455e1a6f9481100b3483655b24a7036ba9457f501a0dc27af5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    eb5eea7f792c6e1ed392434bc24301d3

    SHA1

    d063e575a2bac4039ab2656de20020c7a0db30c5

    SHA256

    a7998a5327c208d7b7dfd042b719d0658be6f8e40075b85bdd35c97aa8015827

    SHA512

    8bb496109baddc91722987d4a69585478319bd73671821754a54910067e5a9118ca56163316af9603e8160b6bc360827a8ef5861cd9d86240360b13d9599c2dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ea613bdb74528b3bd839af9bdbc4745c

    SHA1

    592a465f755fc772856b18bf9d929bfb67c3d63c

    SHA256

    47669c4c3e0fcb9e1e88f9625ceecd1c4249158e1cfa67449c7aa51d7147b775

    SHA512

    fdd66e196d48eb8cca59c6fe0301120a6157090c4bb122ac1ab04f1845bc55c524687991082f6f308eea69626aee5a95c452dd0d029dd649edb51cdb9d9eee4a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    062ca71c05d31852283c14a35c598faa

    SHA1

    18bbb62dc09428a27279608586ebb9c7edcd6450

    SHA256

    f58b4f2e2d4295a06034b36f8a977105fb15b1c621e06824809141088b12fb8b

    SHA512

    769e1d07b8bd8eb383534e2a6dc94b7e2306679c732266d75bad704d218372a45a5fc886a7e9168273b3dcb0831191f55b8e13608506b8dd58556e3993923b9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    128167095637b4a7bf7bc6f9dd386b80

    SHA1

    511c23cd81dc863eb473ae3f5672de24b04613d4

    SHA256

    6d43787933c6e8bc4a94b84bbfdb4843015c42639d24487649bc5780e3ed59be

    SHA512

    b2720eb5b44ef77c34a8627e310b85714bb4ab72caccb8684233bf74c3c6d4fa41a2c01e2e4dc05e25fe5b8922abc97199d6f61fe21d19b1522e428901b47fc4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b5ca0a5d9ea59ccb7058ee5984d0054d

    SHA1

    4361fce6275b3ce59a6a1f2ead057fe2ef9ef548

    SHA256

    88a6fd365549f3a64d72848c0d8e7c6a02f8c846627088f6a2b6f288d760f6c6

    SHA512

    56dbd2a8f04f1414a1151645453b22868ec3ad7251f40ec3102a93d27baafb3e7f1f954862fc5f399aab4d4d1e207eec1a9848b0b9d981c3675fef3f24aed261

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cc0d7ec7dd7c55e44922b0cc62d4da2f

    SHA1

    de09800a46dc2011d5b9924c5ad97033a105dc0f

    SHA256

    5040a620748534e21397392bee907724e0004616e5204f7ec829e63a9998bceb

    SHA512

    63af1065c15ea09dfcfcacf79d0430f6cc33a0f4fce694e5cc78f95528e8a7e776fc4b67db2ccc01d0b49de3c7c8293070aef3be2a1d30e545e310572c875f4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a7c20a930196218c21bdd1052210e6f5

    SHA1

    e58bf3f20e1e2e55b98288f202163e86d9d91035

    SHA256

    29f53568b3cbd780dae8e6530e08bb6d73e05f60ae104df655ff97d6047ab1a8

    SHA512

    f9fd59e05eba7bb51b9b5cd4315054711dfb82b269265d43b2f75a4051021718c1dbcc4e4724b0c92de74dbefe92ecd0d4352095c24a4e09a3ae11260d7882cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2b27ad74c336a3582d81721d3dbe5fd3

    SHA1

    a4f5ee86e934c91ae4bc92e3e72c8521807901c3

    SHA256

    f2f2084c8aa4646763e2c25970375147df46a5a6a554091c8b7641ff4b373805

    SHA512

    fe0fb9727dfcd04ce95c78f0028e48de722bfb7a0b555c14b54d89d9bcd585e49eff1ca3b0400d3765ded8400c6af8c288f2b9053eb7fb7af5015172b8977b40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f1f6bd1cd14fb67645bf063ee6b91faf

    SHA1

    58f8fea16ce523b5556e5b169451bf58dc8a7e69

    SHA256

    2b108db26845c60326960f4c050e0c6ccfa6fd08ae5c829af8c01122f2680eaf

    SHA512

    29c820816864d8e1890dc0bbdf2a4e4d12d1b9061c37b4aeccf587ff57f051bce48d011b92b0c939bc90224fe102ef057eb6f567e822d3d8366bc71dbc5737f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0bec14f172f1f34c278782a7aa05bb00

    SHA1

    9484fa5a5ec99eeaa02766ab2728acd3dac69425

    SHA256

    5f3b5033cd0eeed300410ddf535cfd20841ba89b14e144436ad032579507a522

    SHA512

    a0231e1a6a9a064c7cadcf3d663a80c32a6f06abb3db03719e3b0fc9b92c735212d6852c18f30fe43633bb7915c714119a45f92a662f0d5e480d0db55592f60b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e134b77b05a1e62a5dcec3bdb4ca43be

    SHA1

    b8c71493a1aaa93722f20a24aaeca9df9264d869

    SHA256

    c8bd4a8ec876bd040749b86a5746241c3c29476564d6a7f6945fc080783eb13e

    SHA512

    0605eb11f3d9845b27e12c3aae46cae34dd6f278fa4cd756219e3c2b03f2b00de2d9ddf90f801480ec5899d40705524c41bd7cbb92ecab9f995e90040cc149c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac601a186141bbfd73568cf316d1b294

    SHA1

    3bf4e9dcafe031eb5d67b45d595137be5433d0dc

    SHA256

    054bdc7c05765d9e5433e487b103e78ae69a2fb871914ec43407ea1b91347c99

    SHA512

    ab65a2760dd9a84ea6df4024158ecb2d1fcc485b8bf96351058bf85c98d579b2366c5228a25910400086ef2f5b9bf20de0f579973a3b19c1db597dfcfd13958d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de2417558480d35ebbf076e7b1420b7f

    SHA1

    66a0d6a1794b526548bcfdca8fbfb9b55fb52e16

    SHA256

    15c465f32c2df425c0d624f6b7b37bde380f076a6548658ee8fc6fb0801410a8

    SHA512

    1725e7b73f16f3d5200aa8a9462aecaa459ee4e66453faa90a9d1270d3874b1ccfd28debff31425e6e348f4bd7c94552a3b599033dff2198513542f13c13d0ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21469eeff02d4658aef1a08c7b1e04d9

    SHA1

    dd72bf1863447007e96a23b3a2e58964ccef5dc0

    SHA256

    a0878224b828b58c7ebcc52f2797e2b76037ddf253f8db5f4d08139d29743633

    SHA512

    71be76e305d2f6ff6ee961362cfa807df84e53dda813d58f11ec214299369e4d76c6e395c12268a191e15c579b170ed7d2372c89e0cae35a042e51c4a8f00003

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e86ba0ba8d8ccfadb36b6e69c6bd32f

    SHA1

    addccb3bb8f74eda3d9f8747c895e7996bfdbe38

    SHA256

    45a84126197b80fd5f185246334007f91223004b58090a9035083c0106c08f02

    SHA512

    90c14dbce6996a9067241b3209ccd431f3a8e03e54d2487de014d457e97b919fe104f9315ef090f9282b2bd3fd8c2b8086ce91ffb88ea0a7d82dedccbc741ede

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f76d2881e2f02e84eeb0801efd8c211

    SHA1

    27df46abf9d88c49576f31c3b1f8093caa48bc3d

    SHA256

    6d3dde0f9aa0e7418ce212d378d658556048ffde7e0af00abd05c9f5885e7ced

    SHA512

    1b5d956a63c4492d20c451d544c55555f6cae0f3c012ba4a270ea04e03b7e94663483ecde9d4dd5dec0f4792d9df631d3e1fd8a35731785679264e8da570dfb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d428c1b635a6913ebdda4b1c5350d6ec

    SHA1

    3ad743f110437ec160d076b79023c2c6dd2a71dc

    SHA256

    df858b1efcfce1bc0d25d1a97d97ea25fedc33f49d330108038fff0b2a31a7e6

    SHA512

    034cc4b17d095d32268e6a76150fb0fc540e11407def03417820a67122473ceb40656b43f34ac6df09424dfe4de7f8e0739f07a23be3e47418e33b1461a7ef16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f899c04112cc6110f23da4058503e886

    SHA1

    0ad33c8d925397be4b5a7f41106d2308d89d5f30

    SHA256

    a0fd439d86c8f0d0eff301787b19940db73965f09d0482817535df077aa848ce

    SHA512

    2547297fca2faa087303e313d6782c40ac5e99f8e89d2f20199e7d026cfafce4c87577a5c83aece249540f2a640107c402dd9bbe05183c63c6b85e75e07115f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ea4643334442eb6faada6093868b8a5

    SHA1

    e6be0f3a3470180c897f57f7a7b0c4ca4d6ea9e2

    SHA256

    9a28135b219dcc6dc22ee1d7d35cac498122d7b645bf9703df9170fb594cc429

    SHA512

    f7077dd61b64e8940efcd3a9bc301cad608e463798750f710666487ee143abb09e720fe5474e06f141c999d024ee18dbe4d106b2f6bf8bd71b6880b936f5444c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    48e7c9dd4c1c6fb5449d12a787f8221e

    SHA1

    f8fad23447730c20e14f69806e4a2e22329f6655

    SHA256

    cd9c7f3ee4a8cdfeb9adac51693f8b84a8a70aafc9afd463d518ca4c90d366fd

    SHA512

    da4794511110ebfbeaadd75dd271cd486d048d1d83ede816837d44d59d46d58eabe2068248ff99bcd375c69ac96d78a11e8df62cc3dbf28d2c7350662ec7157b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6107c5cec6d40f88db18d0a051cc900

    SHA1

    7d44a1981607555795f65d2b3720c2294aabe4f5

    SHA256

    e75a178f47037c6de1506d0bb89d70cec8ff17c42b1d7e1da8ce1432a385eddb

    SHA512

    00a3acd1593b31171f5e1b95c239ff2b27e619e71280b83f3a81b95ec481f6229f394d515e1755063c77f2021169b0f2cebab73624121643565fc1c0fd4eb0ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1898f0ab9cf7755f98c47f5c4a8c024a

    SHA1

    f0cfa29712e4091a590db4562597212fd4455230

    SHA256

    c6e4d1b215b938dadd5339402395b2ad81615731cf2feee22ad9fac085fbb5b8

    SHA512

    bb3bee4d6eaf854e0066c1479d7bd7fd719f42712f19215af52f29750b5641fa953267b43ff81a9edd1ebaf73b2595152f84966c33df68c4883aa85519bf5daf

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3CE2C741-EE8B-11EE-B6F2-56A5B28DE56C}.dat

    Filesize

    5KB

    MD5

    68f75ef9cbfb27b75df2f4d1b02f8ecd

    SHA1

    e346dacc781093da67271928e10eee6f882e8a1f

    SHA256

    5681d70c5aff45d2c76961002f83e6cab11365ee49efef323e4c5240da3965f6

    SHA512

    90e979b2f4bdcb8718a7bbd2eebcec105cc154b60c00a37622dae449a5026a53d086458b7f0c84381339ff75ab50df3ee75d2beb0195f2224d438bd159615360

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\92bocja\imagestore.dat

    Filesize

    2KB

    MD5

    9b5c6ba250839ede60a51964f214c068

    SHA1

    e768ceb6e62415e2b8fbe18239944db576d6dbe8

    SHA256

    cc4cc140666461a37b70a047bdc1e58288c7139b023cce1043aa1febe3d758e4

    SHA512

    3c2aa7ea6f832d681a0d32c272adbbb165c2153dfc031768a9accde9c901250148814ec9fc576780fbcfa3b76818635d76c6b81303d712cd1e27936c17c435f0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\favicon[1].png

    Filesize

    2KB

    MD5

    18c023bc439b446f91bf942270882422

    SHA1

    768d59e3085976dba252232a65a4af562675f782

    SHA256

    e0e71acef1efbfab69a1a60cd8fadded948d0e47a0a27c59a0be7033f6a84482

    SHA512

    a95ad7b48596bc0af23d05d1e58681e5d65e707247f96c5bc088880f4525312a1834a89615a0e33aea6b066793088a193ec29b5c96ea216f531c443487ae0735

  • C:\Users\Admin\AppData\Local\Temp\Cab13C1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar13C4.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar1495.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BI622RKM.txt

    Filesize

    164B

    MD5

    f67083d94858846ce2c965a34919909c

    SHA1

    c4cd769bc2863c71908c413e567592be377a6620

    SHA256

    7332b2f6328f5f540fe79ba86e380a238d653e25c36fedab44e3062d3fce4c8d

    SHA512

    b07df857e68649fd3a75c6ab7f2b15dc88cd68cd473a630b9f7a9e9a9b0b21a4c6c15f7c4b20dc0751a4034d84c43a9e9b02d8b05e3b2f809bd291a0a74a9f08

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\IFW2Q1GL.txt

    Filesize

    243B

    MD5

    89b82e161cfff8c42d3dcecd45df3a58

    SHA1

    9cd184504c836b46c22cea797a97026175044a27

    SHA256

    78376e5930c4814164c52ff3079d8458877f578973c5b24f50be4897977ea06a

    SHA512

    f194f2aae1fde59974f62cffe55a50bd55657c488cb54de944f07624f614aea73b5daa13ba1ac77b261a710d5e123107083dbfad36b8a1059f6335b97bbddceb

  • C:\Windows\wotsuper.reg

    Filesize

    450B

    MD5

    42f073434559fb6b9c67aba86de89d1b

    SHA1

    9b969de41fc717353619068e46f21ec1db093ab5

    SHA256

    03ac69047bce954fdce3d00af881161a073f921d73ff79369e9ee96a109f9eed

    SHA512

    b1ae4fb02d7e629f824e084c5cd81e17be3bb37937eed7a1bfcd6aec0fd1cfe9a7299ecfc35958a5d98d11941fc6478e653b69140de02cbec28c4bf0647bd547

  • \Program Files (x86)\wotsuper\wotsuper\wotsuper.exe

    Filesize

    490KB

    MD5

    14e3a4fb7e7f51c099e72372e2bf5d82

    SHA1

    11b4c01ae3ab9dc000fd1534846660983f6dc527

    SHA256

    ca2638676aaa3aff95d83564ae8012a6e3d5eabf2d710cef3eb372af1bbda4db

    SHA512

    dec12490f346dae89e0b499ea1a8927e0c7e294638a5257276726c44c093e2bf547831259b9d60ed13b0430ee7d03dbe97a1898b5814cc2dd863b63da2004f9d

  • memory/1280-30-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2572-31-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/2572-706-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/2660-274-0x0000000000400000-0x00000000009CD000-memory.dmp

    Filesize

    5.8MB

  • memory/2660-708-0x0000000000260000-0x00000000002F0000-memory.dmp

    Filesize

    576KB

  • memory/2660-707-0x0000000000E30000-0x0000000000F30000-memory.dmp

    Filesize

    1024KB

  • memory/2660-272-0x0000000000E30000-0x0000000000F30000-memory.dmp

    Filesize

    1024KB

  • memory/2660-273-0x0000000000260000-0x00000000002F0000-memory.dmp

    Filesize

    576KB