Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 21:48

General

  • Target

    def612ad0554006378f185d3b56efb57_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    def612ad0554006378f185d3b56efb57

  • SHA1

    b27ea28e772fbc6b7f80b75b2ba6d32b39d6f256

  • SHA256

    219423a32336987838bea44a471fe02700e2e74ba4c98ebb41512b7bc15e0c32

  • SHA512

    5ebc664726aad811d6f91de8c7d355b312799e39e69af5218de0eda7d6696c5f1c025737c87c7bda0b22883425fd808770592c9bd7a3f39e759c5dbc46f14f9e

  • SSDEEP

    1536:OjLzLxke+a6vLZqyMe6Gfo84U0taH3DfBTF7kK3RmkdumKlT4j0wEwVAcEDKgf:oxka6gGfoucaH3VBmkduXl8+wVAcw/

Score
7/10

Malware Config

Signatures

  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\def612ad0554006378f185d3b56efb57_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\def612ad0554006378f185d3b56efb57_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\netmgr.exe
      "C:\Users\Admin\AppData\Local\Temp\netmgr.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        -nohome
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2684
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        -nohome
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2536
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1900
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        -nohome
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3020
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2016
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        -nohome
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:592
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:592 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf0b570bff1a0d71c0cd69b729fbae3b

    SHA1

    121c94da37f2b410417afb6286520d7d9c14228a

    SHA256

    d7206f39512548d85165aa1ef4f37b445cec0b6569b6b9548e9daefe7d30afe1

    SHA512

    c5da57d232661b1d828db150db62e9eb7c0bfb932bef268ed40dc36a1e7b515bb46066cdb989407c9ff3b29733b3385fab77eeeb70ec864f3784648fc14c2fdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3d3db269ea97ca7d748d7dd939b1859

    SHA1

    4df46cd10a8d17617dbaee90a01b6ab953b234e9

    SHA256

    300bcd2477704f4dfceb803dcf44db3cda2176ad01aa5cb19849565e368422b6

    SHA512

    2c0943bbb0f7428cf5d808b6cf5d0f1058e5cd99f74698a94cc68a1ca5b55cbaee9cedc8c4c56533c511f725171a20a7f5359461adf0bce7546b8a08635c5c2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    007976d379bcec65fa704b882089fa4d

    SHA1

    0f3407d4f9da9b1d55760e489f13ef2310078d55

    SHA256

    fd25951760d3578714824e4b259e83f269706d22d6fa203f96cd2a78341dda62

    SHA512

    6a9aa04d6dbf9e92606e30af8d9c5e6f1ec4df8f60478e3b3a6610c57bbdceb09082ff4355debb4c0771efcd388e99399fda06e32a109d9e8f6824ac77813f37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4adc91f905a7260e8a411a6fe21f234b

    SHA1

    d1059f31a77a64cae0999e91ec641ce4bd72100e

    SHA256

    c793c65f9f042744b5bfacabf63679ff86e298b990548fff9cc89906e457f710

    SHA512

    aad60ff42332c7c8afcba130b1814fa8077fb0131c97388fef2188239403d2f30cc8a136867e2e2ed56a601aaa426c20f73057b8c4b8ee645525189a8e801b7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1412121ac80143c86331bebd506f7db

    SHA1

    341c906d469b17d5032bf761095e1c9dbdf22b33

    SHA256

    6d1ed7c04c9acd96ec30e81bc43142a1c3e7a9ceebabebeabbd16bd726200c82

    SHA512

    bd0f8669231bf637a07ac04145ed4bdcf472b7f79984db35a0675e97dae6a3258f5d318c2cbe7fc5a934bab7148f81d18f7dbb1448fb2980153843040f5b9d57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    927e5936c92bdc15c441394a72da0f52

    SHA1

    786c531d78303aeca90ecff6e3668e371b35337e

    SHA256

    4dbb4813cff9c97608046518bbd89457b17c0b659a1c737f779fc89b1799c81f

    SHA512

    6cd24569a516667075d04e3e160e573094084ae6d7fdcbb2ae318d6710f660dc207e77cdb1181c1ae05d53744b16ee8e10d3297eb386f9227960b6f2f29b3b93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a53e99487e21d52f7073af9e5536a8a7

    SHA1

    a17d61cf0968b601b737a2bf607c7c6571c7fcb8

    SHA256

    180e1990acfad154236429c694363b58dfd857bc79841e3ccd74e605ade8c5c9

    SHA512

    4e131ffb9ef70f455d21dcea58cf86ee84c5f94249362b77a9487b205bda2ba61a2f14460d33e1a911ee13609a8adf31f26cb481c36469f3dd61923ece4056e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    296520e434ccf4d7c3235666f7d76a07

    SHA1

    83e0ee11556c801a8cd8b75a3032aca87f337cc3

    SHA256

    a2286a59d317fc4baea82b6eae767b3e2f4d53d89bdc286f8a45325d37912324

    SHA512

    d96149816ede6b0d0eddc6b29a8211d5c8208c5b1dc49d062892ee9f1cafa46108e16e7001b3f5721987ae9a867dbd1e3fc225be3b62043c727d79d54c427302

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c47d77b22ec7b1f2f379e6d87db9b7c1

    SHA1

    9872b19fb1863a34e5aff5c530b15cbfaef1a6ba

    SHA256

    b17c3e0f3e663bb52a0e030b6780a49fe7afcb63b0f704a0f669282cf13594ce

    SHA512

    f37750b80593ff6404325d5287fd21356e0d78add84a3730b2423ccf9fd884a36f36faff72c1b65457d7b67fd7aadd01cb6fc676e05672fa81877eb4c2b983d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a990ea138070023658cc3781316b347f

    SHA1

    75383fd17da3510c71c92b0916b10371b6047a4c

    SHA256

    f34061d127794659778f3ee401f70623a581f31f07c23addc348473ea2e47275

    SHA512

    e271b75c60c254a2c4b8757e2e8b5c16e89c35a07ff38a7d5a4148dede3a341e045770ebeee0772f681c02618281d777e3e2512f924208c8b7db8e186cd54f78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d941923ea37a59b488980fa6b5f14d7

    SHA1

    97ab5e79907a8a9cfa561f5d591d865f25d89a1f

    SHA256

    51632484f28add129504e5666fc36c52e8079f3ab601f5c2cc45b90db03960cf

    SHA512

    26ead39690dc56707796be1c1b55ef2017b985d963e4471d5d7fe23251bc706fc89b796b308b7ee0e0db5fd98cd74108be29b1b9bef08613c0fe71ded96a0dcf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bb9a679e2a06f61b6972197d3df69c1

    SHA1

    e3d0c7aee4d665f91ecdc9a10e52ea1a5eebb6bb

    SHA256

    ee12f28de8b5d15ebf29b8ae105eb250738f49800787daf2af7d05ef2e2ead41

    SHA512

    327bfbc00a009b7f468b9a821738e6e0601e69fd2b32130235845fae3f207c2b1b0f0a3ca6c736d964166a7c83063caedcc635cea898076211876cb8c30fe76c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c66b2660f35e467fca80b3db357be7f7

    SHA1

    a45f3cc3271b32c671be60986e7c615535e80226

    SHA256

    77cd32e5b53c2a81f6fa342e4beed133a9083e79629b5abebe9747ae74a96445

    SHA512

    ee9442aaa6f7bcca3e94bd7b894fad5c5fb569c17dd1bf993a79c444fece4de42ad10ff1ab96b9d6b5876b4d7f1acf3683f65ee10b1ef25ffa32456eb0970166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2012f0c773c9aef01a59e27cb6ae465b

    SHA1

    071a63bafe5ba15ba9e2780def0d49e7126670b6

    SHA256

    d89a007e159219f116ca54645dc142f3673121194d756ac1c41ce9db7a20c562

    SHA512

    a8d7904cea8c8d9d78013184a42cccb2d0b32ae32ba7ca69d4bdb62637f28eba6c28acc07e8e2d3535f7e451536e0856ffb0bedaa85a9323d48f6119c2174b12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dca9561dfb0dfa557a3b1584ec8105fb

    SHA1

    a02107be74059cc2f245b5656714c96d4aa70125

    SHA256

    ece605d464d85fef0ec030a82992a08aa566b5c6df3af034af3cfbd17f10d42d

    SHA512

    fe09cc38fb098a908b31ee2a1c5fb2e142058491af94628d3d90424615587e12ab1650c1f802ca1c82d629e92a55cde7e24ea371b67771531dc8a4a488051093

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b5825e7ad846b689513b0fdc51cc409

    SHA1

    b2c61e5922e9e4cd8c0124635d838f6a938853f8

    SHA256

    5dc9e04680e1c982f83c3483d381dac1a0f63d53b023edde4af24ea995b66596

    SHA512

    b5a634b59765df72a4a27947f33db0bf5bc63b4cdb3c7f21b12627a1d3905817d75f18c88d624e898219be49289bf6d17e38727c66c21c183d3a3caa7e05b017

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    443e36d14e8d8caddcc16935b77ee046

    SHA1

    ddff099b8c783547f26c25efd04ac254e2e31bcb

    SHA256

    8ddcf84e467d81fefd9f0cdfae45551fd3162a6ed0541b34e5786d7328e3fb18

    SHA512

    2c5cc1d1468ef42bc3adc96bc768a256478431cc2d058446dceacef97efd656db79b1d67eb54c558038d9f32455be6bf7657b3f459977ae486ea4127ae950ff0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edcd53105081afcff38b0e88878ff3aa

    SHA1

    3ea09379e3b08881efd1c8e9c8cc3833712edc75

    SHA256

    1e592284ad67f476e4ac4bb1d1062f1a389bf09773dd549a182b80e19d1e056a

    SHA512

    54b62b1d1ae573e12f9802cfad45761b280a1b8e40d8e52fa8964d7bef77350517d02834c8a47590a56dd3f3de2b125cd14e13b2a00402eb67b41d3b9a0c86d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3f9a5ddb2069159986345803189bef5a

    SHA1

    cdbd447c09f0501a7acd0430cadad64c2b864796

    SHA256

    38f4653482dfc18d5d67983ca5dd2b27f829fd106e03b74308765b5d95381cc5

    SHA512

    1bf5c4fcab946a082d0d3dd63e938202bf589686892f881a1b5a008f7990619b8793b7e1fbe402762a7f0e8c66268c24c3a5e9a5216c2657e280a53706382b93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb59e389922424d598b64e1999567cee

    SHA1

    51f06160a30460ae4d9f9953d1cb6990163f7e3f

    SHA256

    4fe5892ccbd60f93104c54945ba2e2ca3c9f2a924eff7013c3eaa486ef34c179

    SHA512

    c44c03de3d52481263a403737f83943ed50ddb53fe26c1fc547fcdbcda22d6ab697b6e188e589ad59afb24da566944206b65e514d403ab6000bdc300413ae953

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03334908e0da9c435c470522fdcb944e

    SHA1

    3624e408a6dbfe33553bd0e45ea9cb9bce5e96d7

    SHA256

    a55a2ec3fd0da62fbe7d9b9dcbb67db2295c99e6ef27c821407bc5e2be3b9768

    SHA512

    9d52b6fe416fe39f5d23f8e47c71c92e2cda9472590e9d8290d7ac6b6ec73e4bb7f72632b4783a6b059319499a407df18a91acc705543e4e35cbe2179d4aa139

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bc351e041dc2866f973d41dce98dd49

    SHA1

    e20b44730073364947f8e0135dad3c7373dc2208

    SHA256

    bcb49a4b8f30fe1e6a84c25142aecee2c35a1d6dc0baeed2ee5655cd5d53c78e

    SHA512

    ddc85c892fb198c3cf107356a43b692a703fcdefc5da0809066d736d7857fc8d847be3e0019549dbd80d77029a5b8cad90f2c3fb43dc0da0fdbe0e63b85a429c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91e04a7ad6e5a31d05a4a5990213063a

    SHA1

    bf1935fea99feeb670485431c13db933472a51d1

    SHA256

    443dc21d9150d614925feab1b6d81b23a61420cdd9523c8d80749364b8da064a

    SHA512

    98a8fad525a8837255d496171220512f241a15364ef9f8ab37fd9948ee918f4f49bed2b21c1bcb424c09a867a7e9a61585d0565e20f1964af44634b54bdb16f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e96ac9465060453947523fbe3d94e5c5

    SHA1

    f87bd60164bb976df6bac26c2fa92209fd6ba215

    SHA256

    f78acd7990234c89d86e6ad2991557c7047841f8e0f47f61c1c12ca02a715c51

    SHA512

    81997c7507170290731aa0be56ffba7ea2281b52dd074d399348b2744469f2f330f345dc3164a0e2fc89faa4fd1b8d941bedaa3b4adff48f867f2ba7f2463748

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3bff96d0355ddb00055dae93661065d3

    SHA1

    8a5f245d9dbcbbd690e861b1e6cb098d828e9200

    SHA256

    441e44883b34c0db0d13154817db871d54efb7b108b10d3ef4f1c7de0d941a44

    SHA512

    549046933d0e2e93f57c8b50c2787553a046838d83b20d581cd7b41a868b85a787f53dc203d2cf0f82474bda8630ebf6af6ef9e5942fb98bae0c5911a20f9865

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d71baf0067135a7f0bf6fc5c12cc56b0

    SHA1

    de45d93449db330e29d31f7309fee760ca994352

    SHA256

    4d820d9827301aebece7ab458bad9815d6f18703a56c095c98c11a1d81e022e2

    SHA512

    5f89765d14f91e03900a7b605cf678d8c285f3a4758926e82a6aa52dde6d0d30fa8cfb3a29b718b702a65bb5596196e8d82d82b6c0ac998695cc145b6ebd2634

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21a6bf7240170a38fb356ef836a2ac09

    SHA1

    b92edbb8eec5084a0e05163affcd71d8bec6c254

    SHA256

    df9dd465ffedd9521889ac2234caeeab34e2f04cb1d8b8c1b7fd52175a6a6883

    SHA512

    441e0c60b44e1b7023d0d1de138e843ccea21e98427b74ba8069d2e43e596f0ac6a31184cd3b57a4333aeca7a25dcce75bee2b49339521c89050bc59cd44d508

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2942884c91b58f9d414c48a415196a1b

    SHA1

    c9834ef02fc98c9277b0903ae17178127f1d1e45

    SHA256

    3c8a8d687777cfd1a9ccf67686c787e6e586179af3dc436a29a1520a484b3a5c

    SHA512

    82faffb3e1c9bbca2aea8ed7b48745ac33101ece8e58bd0b105d77cd71ce1e0bc3c55ede67ad7fc80bfb8d2bbbd7e602e21501c2da8f5db7aa84fa0c2ae36737

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    892cf05911cfe4077561baa0ade29cce

    SHA1

    bf7030812df26f8a16a8da2dc4f96dd01db74733

    SHA256

    71fa8f2a7052242784a44827cbb28165f66bf252cf83f7817afab41808a83c6e

    SHA512

    5209a8b69925417c6ecdffb0ad4779359a5b7b2564004609978518984f19e018c501e7ab8673eda36915c41ed5a95a1aab10e0556f5cee5391a5cb904bd89be9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EFE01661-7219-11EF-B25F-FE6EB537C9A6}.dat

    Filesize

    5KB

    MD5

    bb6e3249fb191231da92c53eadccda1a

    SHA1

    572b663d6cb11ea0aadb02b2a9033153e9d67ad1

    SHA256

    444f028133bd72686971ddc2de2fc309a89c5ebd344b42de4629dee108f9068c

    SHA512

    0b9cb945ee468b52814fc4cd830ebb6ff63689fd68bbd48728e1d55f1cc5d63523778524ffac37410a40547d9f05f610844ace80c7b62be6ce6bec9fa686c68b

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F3285BC1-7219-11EF-B25F-FE6EB537C9A6}.dat

    Filesize

    5KB

    MD5

    6d68eed3835fe2ba01bbb1c8dfbb6470

    SHA1

    7a945fc945e5ef9800061bd62dee4fc4421bd9ee

    SHA256

    820d583ef65f9428c0a55fc7e4174fef5895f6c88e49b975003213c4b8d56c84

    SHA512

    a07afeba3d98b5909dd75d164d7e605551e3659fcd6cdd2f30df0dd53a2ca376d3c3c7a661f9a89e2622ad6228c95070c886c3002d3c5dd2d82548d21a39b8de

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F3285BC1-7219-11EF-B25F-FE6EB537C9A6}.dat

    Filesize

    4KB

    MD5

    633150b3c4dab292b8cd5fe4b84a82c8

    SHA1

    0c30a899f20e8ffe785e498f64f0dc7f8c7a7b57

    SHA256

    514cdbaa5ba5334b2b1e7536f75fd407ae574d916c8da962ae6b1816d7c5ed8b

    SHA512

    55ceeed5afc179703b21a8b0c9ea8c762bb3ed8f6cc28bc991b895b1b3680b5697b3dcd7de3948b419873004b7e379bb84d61a6e3ba7fa8f3988c22ae30081a0

  • C:\Users\Admin\AppData\Local\Temp\CabCF81.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD030.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\netmgr.dll

    Filesize

    96KB

    MD5

    c0c093987a55fe9ac61e6e2b5a362d51

    SHA1

    52126b81560e3319518c50058c86a8c5fce0d3d1

    SHA256

    5c7d07858c7d01156a7f624d86b16e948a4630a2388d0c3cc1be86bd95f4858e

    SHA512

    716e9dc694a1544be5730cc8b82a4a73d4f8763408c80fe38a61d66cc201d9cc440510b036dfb49d2b1353b827a7628c389e833678860e358c72951deea1c7ec

  • C:\Users\Admin\AppData\Local\Temp\perf2012.ini

    Filesize

    138B

    MD5

    1b084b39bb267c7265f99bbf76c58b9d

    SHA1

    85abcded0afb763acaa24801236fa58bc2a2b740

    SHA256

    ceb3ff7139c7ab61399b932bb6a98746f367b6ae1304062cf8fa61dc66a1909e

    SHA512

    b986a1800fab0f9091ff174c318284097639bee155576976114820cdd7f8543dc0a3c3990be22f38d8d571d11adf6f8a0248e142b205bb5ac7077e481fc39406

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\netmgr.lnk

    Filesize

    923B

    MD5

    2bf0794708317ce2b4b9bba1411b314f

    SHA1

    4193e7800c8b48dab66cc07f7d50ee359dd0c557

    SHA256

    1ca74e021a8f1a59005b7fee84bbeece700ce469b61585909a76ea6d58d83386

    SHA512

    d182e6ebd90ec69443d7e09615ee47e230f33f4b8d8218c9124d106d55f431653c0da61f7ad107af34f3db1c548cdab97466e11740108243627b5f9690654d2b

  • \Users\Admin\AppData\Local\Temp\netmgr.exe

    Filesize

    20KB

    MD5

    4968882f189236952fd38a11586b395a

    SHA1

    1e9838e98b25619d9680854a6bd2418e044e52e5

    SHA256

    e917d277ce6d27e9740fede690f7bd810e99c0757ae4226cb30f8227c6b30b43

    SHA512

    3164a7d5fdbf3abc67caa56f974ad74d87059620d42ce6a656ede0480cf5a8d2fb87dd2fd3ba247409376437267af8b6388a78f3fbd67b42517ac0f2b4d13ef6