Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 22:00

General

  • Target

    defaaaf754d0ea2fe664e82061f56f74_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    defaaaf754d0ea2fe664e82061f56f74

  • SHA1

    d83c4b6cce9d18c3400f472d5d7f6a36d7f19319

  • SHA256

    c0e1d9f27d5d57b7dd90853012e16106be85923796d74f15fafa7825007adcbf

  • SHA512

    cbb88febe57a203c1b581acc15b8f2a7681093d6d19bb77da90611380f26abfb9cf3454a768cba43cc8ebaec86a30768e7eb2bc7b5e06ddbb0f81f38b5c82865

  • SSDEEP

    3072:boFZSQ895kPwaH8y0YrftKo8PiKxl8k7H4+CPolWyG6wYR5KKfKO9iYqE4xm:boTzwacQrfWHbYJPo0n67R5xT9WE4

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 37 IoCs
  • Loads dropped DLL 38 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 9 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 35 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\defaaaf754d0ea2fe664e82061f56f74_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\defaaaf754d0ea2fe664e82061f56f74_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\srvpoolsql.exe
      "C:\Users\Admin\AppData\Local\Temp\srvpoolsql.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_win_path
      PID:2408
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1.tmp.cmd "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE""
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2924
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:2252
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2848
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2676
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1208
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2700
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1432
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2820
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2152
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2984
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:3024
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2264
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:3004
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2616
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1968
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:1440
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1068
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1096
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2184
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2132
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1512
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:744
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2488
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:784
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1652
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1300
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1940
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1416
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • Views/modifies file attributes
          PID:880
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:2092
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2332
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:1496
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • Views/modifies file attributes
          PID:2504
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2288
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2780
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2636
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1992
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2792
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2296
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:876
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • Views/modifies file attributes
          PID:2988
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2932
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:784
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2444
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1612
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2172
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1896
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2112
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:3040
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:876
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:3004
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:996
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1456
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2204
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2020
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:1268
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1152
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:1096
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1980
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2028
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1852
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          PID:948
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2488
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2384
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2568
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2380
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1300
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2124
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1940
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1888
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -h "C:\Users\Admin\AppData\Local\Temp\SRVPOO~1.EXE"
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2092
        • C:\Users\Admin\AppData\Local\Temp\smss.exe
          "C:\Users\Admin\AppData\Local\Temp\smss.exe" 127.1 -n 5
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1520
      • C:\Windows\SysWOW64\regedit.exe
        regedit.exe /s C:\Users\Admin\AppData\Local\Temp\win5.tmp
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Runs regedit.exe
        PID:2160
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2388
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    288b967757a0d5fffce479c8e3f7ee78

    SHA1

    64b81e4c7a8e929858e3fad01754d03fe47024ce

    SHA256

    cfe721396f547309de4df38a005a3347a347af026e25d148d2393504efe40e82

    SHA512

    042fd53fceba6a75f9ba1e9f5916a6d5cb4283f5c784c4a746caeebe20c278b437f4ac71c325fc62347ccda4ddaadb68ae32ced336da09702924c73761a365dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    636f4fccc6e46a147b656f624b3caccc

    SHA1

    1ee2169319da8804bac4592c6fdc54fead666aa0

    SHA256

    b53583a161990b2e18ddf3d293d65019212e328e5fd56a32cbc9f4460566c2fa

    SHA512

    87f7775618bdeaf5d9b9bcdefe17df2f5a5c39c063c7b08c5f8300660e919eb435ab2d24cece4743286b9af6f10b2b5b95d093b1c757a7999902d67c87b110bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3323c5821b13a3980d202da93ba5ff02

    SHA1

    7c61c5f218d5a5391ad8aa0cb0a132b38f81a300

    SHA256

    d84d2ba2c856d86a9664f158b5c8bbead989f013502f7d4dd1563c5396c4d3fb

    SHA512

    9283e17a9de8fefa81663ac2c0b7b494f8bb3ca6cdb0defa4615b3762b79f4a7433dc02949d5868356298b05c10cc879c1948db526a041e48ff908ac75c8c670

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c898d4122a270fa37fca1ff82b2cc18

    SHA1

    68225a644a34775e422cdb3d66c088ef0283ecaa

    SHA256

    1e4826ed6c4466eb113e74b876e204f2bdd6b1de409d009398e8194c05174794

    SHA512

    083c0678df7e2d35cea0bc44daa679f3c7f703b241d0abf92ac1687b2a57054d5274f810a76d93fc665b53343643f8b4a109fd0b4564c34d0aa0865641759a31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9204ad10ea55d69de3e62ce58a5dd336

    SHA1

    09498cd70a1af7563e0f8e561e24be0341d468e6

    SHA256

    6e0d60cb7dbf0c92814d6fecbb2a499fb21c692b8ef129896f37a7b6abe9a66c

    SHA512

    851b7f92fbc143c969ca98852de105642bf876c142cc453bf197b7396874e5399c593270b7702a84739577a445670c184d18a4002aa30b7c7810f74d1966bf77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ed78a67a4d43a62abffd1e4fd6de045

    SHA1

    28f6ce9c359e23f3a6df9a16f8ff8bf2f549b4ef

    SHA256

    0eeadf24167f69686911b0428a7cb04debf2abdb3152e06824ee0bdf9e2bdb5f

    SHA512

    c1ddad4b04ca5b776a16758f8c4c0e076fc04c41d5c583f1112799596109d0cd4b42e5bb17d13f223882a1010e72fd730e04d726662b1cb54f18762a9c70c4d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75eada6cb1d7676aa4f928e6733b39db

    SHA1

    5def8c465907da47046cbc2f0131b071dfd3579b

    SHA256

    3128ee0dad669d454601ee60d5a5e6bc4ca7ec3128a0b36c05718348151a105e

    SHA512

    b95130b5721c013941cd37fc49c63ec71616c8cd9c42f2eb89bb301d72ecd1cb86319ad194ccd723dad5b62a0dc943366d12e6476e72ee46217f166a2eec42ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    554f464da0ae658a8fa35535fddc9a29

    SHA1

    3126d8aada45c36acc5fcce3fb4cef3f33564f21

    SHA256

    15cd671cb10f7968f4c0fd0a4529f24ee0ce163b37f8130a3f530448f0eaeba4

    SHA512

    865a9bfc0d3ffbcb7442ded630f2ce2acb747776258a7ee853bd25cadb1a0a08ad9f59330669d6b0129bfaf093cf7e1f06014f7593614b46aeb661f8ab6483e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8dc3e3dda255164a9bfc7381ab09b15

    SHA1

    9f7038a9c843ff71a95b1c381f3a1860c9ae1121

    SHA256

    199bd642d15739e91bb4bee07e16619bfad943e378b9db686e89a5006550b904

    SHA512

    23421c6a9749295354434f8a3338364eeb75e8957b5edb9f9d37ae46c24626e7c578f105ba0860fdec877d6cc587cffc8ed91eb0b3251d426ec4bc8f0fdbd9c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf9ab8c929acda0405565c89187655e7

    SHA1

    e35d6fd0bc991f00ab3752c9a6db58ab21f20b24

    SHA256

    2ba899f62bff56710eada74b4f65c9d3f1d67636e626c6f52f9e9f2ad07d07ef

    SHA512

    a60a3093b77b3e5822ff935bf1f49be4999abf89ef710d83042482a30ad4d867222b765ea1f49699cfb0773e4e36ba6dab5606e3bc41362ec8ccf0709e6b8b43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03944f3696f3c7388ed56de631f9582f

    SHA1

    bb1a622fb26545a9c9910ad10be5f1b5bf9916be

    SHA256

    9ca9db98d90070379205c95fe3bec6ce913b927d905464890027e62960c8d649

    SHA512

    746346b6baf35bf791bd235e3bde013e4d351371ce6e3ad4f5947c17d84cc0d5e6f2b0641f8ba66d567d99c762194e161593d7c22f3e3b6e3dc319a969d4ca18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6a0525b06e133a6f6e4e40dce3d70a2

    SHA1

    5d13ec3316c2f5b27ca16cc6196ca07c15a1d8a7

    SHA256

    28f8b9157f825857ef3f495a24ea4aa2aeda75429602d4faf558e1571c52010c

    SHA512

    5e7f1ca5ca20e77c7a099c383783b7bec40eb056b28831a8c0b0ddf52c669baa5906bcf755c0b5cb53ab14791cb56a8e20bb6204ad49a03e5636e719e4acbaa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e3a1663eeba89dbd5d21b867eb5b28e

    SHA1

    14071fff274a2eef6e7954d5efca5d9bdff1d488

    SHA256

    1eee39bb3db473b6e6e74ff451ae54c95980a3b01498d69bd58a08064e365c6c

    SHA512

    e78d33c47defcd6f16582647e6afca85ad99677fe9b1eb21a6b108d0122703bfb519c0bee9ff1bab5135f6bf1fdc91dc72b386e1a71279da9fcd135394567f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98b15c65e0d3ab61c60634040678dfdb

    SHA1

    8c6eafb0aa3c2a3e478baafeb987c4a80e42c8b9

    SHA256

    c544ebf36347c0480ca80fbe58d5f720888fefbe8e61cbc76119bfd843501815

    SHA512

    9c51f5479b981431b7405c9fa0a5f15cfce16e4e42424edddae9325e856f6aa28695222a3d5efe0c72f92549917a90a4f5d40fc4742e7544d2bf163caedee618

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96ff4d58842b555be674c3e469b32fe1

    SHA1

    35f9d288e50e4500fbc1d53f34946990b6933897

    SHA256

    784f86acaf5e9674a24ea8fbe9cb37f0acd15c57b62351fbca010dfea4472d43

    SHA512

    12629a03a8ff87615e34a0f9f3e569785bc89de85b2a52ca14ed64115c3aa9d99c1f9c299079f9e415cda80670901e265ebd39670e810a52038f3ef8b7055582

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2849b61bbf2b70e165af4a67071e88fe

    SHA1

    141d028e7407fc7832b26e121e5cd612149dad7c

    SHA256

    9ad45586ddd03cf493e34f77b3871efc403a60f5a8454aa692db1eb14828da32

    SHA512

    dc144e8df5937693a8b682da61b6abea4b519196aacd741dabe3618376aa68c014010cb339cbe93dba74567b7ab2bac9bea618938d9f19477ea668b33437136c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f998582b1b37ecd9bf42f23dfcbcd89f

    SHA1

    d99c17b0084337e92054ae89a27b60252e03213f

    SHA256

    74b922c19cee0cc650731800939ab7ecbe39291d4d84a691626d9a074f45ec75

    SHA512

    497adc5a4572a3e4da1b70759db312c555addd6147f05a2c5ea24f725b5149d6268d7a92a478ab867aabcb867c36bfbca6a2cb4c63c08ad5770dccee3df45a0e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfe4c1d3e5867a1888b1fd4179e3fbc8

    SHA1

    e226bc965e7204969ad9695a20e636c27b8b7b9d

    SHA256

    cf34f256f80ee088bceb5adfe11ee89824744802ee1cd33bc25f3d0342ba68ec

    SHA512

    ee0f03cbdf141c3f5db05903f4e451d15c90db5fd64ae7721ad51877537d9ae955d575f52d4e85098ed2d34c95f58da5d1af86f16da282fd0c2434ed55b6c97a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36f7379c96559baa44e9380543be2594

    SHA1

    73d959afa582451375d705d7e305c58f47ea6213

    SHA256

    93c5156543cf6be6ad92225a2fc8034831fcd73c355790857e0f0a64ca432848

    SHA512

    cb477f5f5e78f49545ed90596521e235b815204138311614d64bf03a60767dd3b16c4fc345b349d05231a0ed799601ea2bb202efbf58214c513a30cf7fdb742a

  • C:\Users\Admin\AppData\Local\Temp\1.tmp.cmd

    Filesize

    168B

    MD5

    e7efc2c945a798b4dab3fe50f1524592

    SHA1

    0bb937ccd89e40c91c0e58b376873ef909fe805b

    SHA256

    624acac79fdcfe30592f5321b4ab73d360f393dbcdbe8daa50fcce63c710f5dc

    SHA512

    e75840979404587aa15fd4d1e46707c33e32dca086ca72c7666045e14191e29857d06dc8ba737e69925c71b2e2d6a5ee3b63c36ecd2f32ae515f85a985d8f257

  • C:\Users\Admin\AppData\Local\Temp\CabA6D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB1E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\win5.tmp

    Filesize

    233B

    MD5

    ba947d6bdd19e4f78a02678d9160fe2a

    SHA1

    33d3d9360345a5864690401e29bbb4e2d4f24b96

    SHA256

    6b789d76092d99ea06c44f740d136c71b67624faf9ac3ef20d7014b3a3cb4a7c

    SHA512

    e029d29b1dbf63c497bce1e72117b6c92309ac1d97e348ee63da5febdd6be130648e81b80388ec88193ffcf9092b376613ad7b698e94ee92745f68bcbdda2736

  • C:\Windows\SysWOW64\objpoolmon.ocx

    Filesize

    4KB

    MD5

    3adea70969f52d365c119b3d25619de9

    SHA1

    d303a6ddd63ce993a8432f4daab5132732748843

    SHA256

    c9f5a19c7b11fd866483adc93aa5bc4bd3515bd995ca79297b227e3e5ef1a665

    SHA512

    c4d836fcbdab4c859a6fc0f849d1e41e98c7e23fc0fe0fe0a09cb68e9a57d60b2ae9ad46762d7a5e05db28d6179bd431ef179ee1f9ff016db74cc3b1d74ed7f8

  • C:\Windows\SysWOW64\procmsmon.exe

    Filesize

    1.7MB

    MD5

    defaaaf754d0ea2fe664e82061f56f74

    SHA1

    d83c4b6cce9d18c3400f472d5d7f6a36d7f19319

    SHA256

    c0e1d9f27d5d57b7dd90853012e16106be85923796d74f15fafa7825007adcbf

    SHA512

    cbb88febe57a203c1b581acc15b8f2a7681093d6d19bb77da90611380f26abfb9cf3454a768cba43cc8ebaec86a30768e7eb2bc7b5e06ddbb0f81f38b5c82865

  • \Users\Admin\AppData\Local\Temp\smss.exe

    Filesize

    15KB

    MD5

    6242e3d67787ccbf4e06ad2982853144

    SHA1

    6ac7947207d999a65890ab25fe344955da35028e

    SHA256

    4ca10dba7ff487fdb3f1362a3681d7d929f5aa1262cdfd31b04c30826983fb1d

    SHA512

    7d0d457e1537d624119a8023bcc086575696a5739c0460ef11554afac13af5e5d1edc7629a10e62834aba9f1b3ab1442011b15b4c3930399d91dca34b3b1cbaf

  • \Users\Admin\AppData\Local\Temp\srvpoolsql.exe

    Filesize

    112KB

    MD5

    b84a148f40c3a694b930c5374f7a90cb

    SHA1

    333f5acc35ea0206f7d1deadcb94ca6ec9564d02

    SHA256

    7a3b78feba1670850602b7c33cb0968b4d89db609d98c81744b43cae23d563f5

    SHA512

    032ba7ba40ed36cddbcd9cedaf53db82db98ac35a122a3cf37fb95452cdc62f1a7cde68d232525114cafe0cab36451ea977e1ae3912449cc738b8b99797bee3b

  • memory/2224-0-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2224-38-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2224-47-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/2408-67-0x0000000000290000-0x0000000000292000-memory.dmp

    Filesize

    8KB