Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 08:12

General

  • Target

    16e11b36262eb534ee829e2de2848e72_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    16e11b36262eb534ee829e2de2848e72

  • SHA1

    3f9d8e152540ce5ab007314eac12f5810350efee

  • SHA256

    a98d87fabab8e660425c9c1f9960070fbaf3a8f0b5f64c90537ce848b9e3ba83

  • SHA512

    60cbba94e0ca6ba8734cf40045ad19e1f38c1d6fcbe2745798fd61ef0b039d7fd7c2343b3a2645fc6e325fe0aa4f031977235e6be8f33cbde71b87e2e1bd09d3

  • SSDEEP

    49152:naSDJLr+Be0SeBk2a5wL18ou9DjMYcOajZqOLBNwDaebA5rOYiZnU:ntO0iaaB879Dj3cOodB+GebSivZnU

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 6 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16e11b36262eb534ee829e2de2848e72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\16e11b36262eb534ee829e2de2848e72_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Users\Admin\AppData\Local\Temp\is-S0FLE.tmp\16e11b36262eb534ee829e2de2848e72_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-S0FLE.tmp\16e11b36262eb534ee829e2de2848e72_JaffaCakes118.tmp" /SL5="$601E0,1888839,70144,C:\Users\Admin\AppData\Local\Temp\16e11b36262eb534ee829e2de2848e72_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:100
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /regserver
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:5116
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /install
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:3636
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1316
      • C:\Windows\system32\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox64.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:1064
      • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
        "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /afterinstall
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Suspicious use of WriteProcessMemory
        PID:4672
        • C:\Windows\system32\RUNDLL32.EXE
          "C:\Windows\sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\PROGRA~2\INBOXT~1\Driver\tbrdrv.inf
          4⤵
          • Drops file in Drivers directory
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:976
          • C:\Windows\system32\runonce.exe
            "C:\Windows\system32\runonce.exe" -r
            5⤵
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:3812
            • C:\Windows\System32\grpconv.exe
              "C:\Windows\System32\grpconv.exe" -o
              6⤵
                PID:3020
          • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
            "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /TRAY 0
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:764
        • C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\AGupdate.exe
          "C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\AGupdate.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3424
        • C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\AGupdate.exe
          "C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\AGupdate.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:876
        • C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\AGupdate.exe
          "C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\AGupdate.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4828
        • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe
          "C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /postinstall
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3716
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" -noframemerging "http://toolbar.inbox.com/lp/inst.aspx?tname=Games&c=4&tbid=80139&iwk=845&addons=1&addonlist=&afa=3&lng=en"
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1424
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:17410 /prefetch:2
              5⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3360

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Inbox Toolbar\Buttons\black_green.xml

      Filesize

      51KB

      MD5

      01116f926b28cb3442473d8b47a6dd8f

      SHA1

      5303b4976d13bc6f3ffa0e3c443a0d36ea55fff4

      SHA256

      01f5b90e46c63749261d30ab669b55b581ae0c41912b54b38f71c7dc2c454511

      SHA512

      df6debe9debe900ff5338aa9d8637a6c887b9905a1fc77b6e2a50d3f8067cfa806e9fceb3d8d2a57b5b859346267048bca60c5f19d2bd9092f9c08a2d2859271

    • C:\Program Files (x86)\Inbox Toolbar\Buttons\games_online_gb.xml

      Filesize

      4KB

      MD5

      04e1df757b9b5a6418d79d072db000ce

      SHA1

      f118b45fa1092a7d473886b05984580dfa5eb5b8

      SHA256

      20ddca93499bb0a82627577b4cac56b6bb4c0ccb2c10ad92d16bac8b09a96864

      SHA512

      380eeaa2bd01629c7128a0971d6855f30d4e99bb9347d465a670419d8684585b1f7d52c6ea6e30d12bd7b0101ea1c9399c7e4f1f781db35c225f97a5e0d8d871

    • C:\Program Files (x86)\Inbox Toolbar\Buttons\games_portals_gb.xml

      Filesize

      4KB

      MD5

      4b3274899a510ce0a0eaa6427bfd2869

      SHA1

      bbc6075fd32dbb95a254ceec0083f008113f7dc3

      SHA256

      1799d52866f0579798e7817e9168017bfd5a0a6e452af848e1dbe7311324c0f6

      SHA512

      4e9ebb12d5e6fa334bf7cb3dd4424036b3493958b9d6755fcaa5b61af9cc2898c588e6914b16298012b385cd0e890c024a607f120332c677f7b7d521952d4059

    • C:\Program Files (x86)\Inbox Toolbar\Buttons\games_search.xml

      Filesize

      3KB

      MD5

      ccd6e298e340f9adc0e7359e9e924441

      SHA1

      87a1a8110e60fe6e0322e253170fb07c64dfc97b

      SHA256

      81857ce2a92da97d87e489612c6b5a82fb37f2a5856a36b772764f7072452701

      SHA512

      2bd078aaf07ece5a21c7353bd1843f9be60615775f19d1f14e0551c688b63bd21ac8c158230669f719180a724d64de9665720ba593323b87a638e3163ace5d17

    • C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.cat

      Filesize

      7KB

      MD5

      dacf44f0b690f4c0053d31535fef87f2

      SHA1

      d2318c6c771a4adddd507c2fa6aa7d81ebc7aca6

      SHA256

      9175d7ad0f699049214a066e3b7672036a64354fbd88b002fb34f1d8c583d334

      SHA512

      60c7e1f3fa5c5515907b4e2702b0ffc1f32129fc92c75653ab7591745d78f7fa59b0a6c505b21cedb36151d4ca4a0fa1b90f09f8d267f7c9bd91a9605a87b7ce

    • C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.inf

      Filesize

      1KB

      MD5

      c84b4baaa44b8989b2e76b42c1ab5301

      SHA1

      36ee3212aec954e82fd73c914717c7ad32cfc367

      SHA256

      94ecff1e1ce8d5d5ef349769ee4236d230a7f58dfbd0a7d32ebf84c2b41fcec8

      SHA512

      230bab43937d5ec8600882b2ca6249b07fc580fea5b1c8817ede28fae6566bc78fb8f2088dc4dea0997e217c94659063dc3d2adff0405944b427d325ebe373a7

    • C:\Program Files (x86)\Inbox Toolbar\Driver\tbrdrv.sys

      Filesize

      35KB

      MD5

      e7c0aac166d688ab41dff2f17e420a3a

      SHA1

      00b70a50af14b497cebd100344fafbd3a564fd5b

      SHA256

      babb144ed6471079b6922914646a110f9fe5588ca3d94deeeda584c484e4ed26

      SHA512

      fe539d89e28204b1d09607e9f0450ae619ff71efdfccb4597641a27cb3234fce1a2061e273bd8490c9bf15d19871aa93c1bf98c909b6c252549c40915d62721e

    • C:\Program Files (x86)\Inbox Toolbar\Inbox.dll

      Filesize

      1014KB

      MD5

      cef98a42f1f86652b0ca1c31fdc2e288

      SHA1

      39d597dffab6d36bc47f21fe20f2eedba864a5ba

      SHA256

      39490eab802f21e6d00ef5eef0e1532b69a64dbed537c39f6c6129c14b6406bb

      SHA512

      498fe3191d3d9852c5d7ccd960847f24dc41af43cd2d4d05569b11a2b2f0b5b1c74d66ce520b58a7a6759bbc729d11dccfe5d0a1e6c5b2422ddd083adffae5e6

    • C:\Program Files (x86)\Inbox Toolbar\Inbox.exe

      Filesize

      2.3MB

      MD5

      7bfb9bd61a69e7a4717f34f22dae8b4e

      SHA1

      a8b1ba82ee7172e9e5f184fef35bd41bdd373906

      SHA256

      f8404bd34230c1db313e2659ea483e7640c10987917e2cebdd4dd9c4ae67a19d

      SHA512

      19e6a0c065b1f6980b6927c6af5accf7b5d29f450daf37e57feb9ec901f3105cedd34e2129f2c5c320b516bd6a709a3b8a6885f4ee032e12dbae0dfd4b9a3273

    • C:\Program Files (x86)\Inbox Toolbar\Inbox.ini

      Filesize

      2KB

      MD5

      7e2839c0e98367690b3af21d6408aa17

      SHA1

      99d41f4b0c57b5e6ef1efa2350038e10d4188035

      SHA256

      8cec384377ada9c4f9bfa6d03b8e6a2ed0dc650cad45b82594e11338458271ba

      SHA512

      d637ad72dd205f47ba4a163a88eb503dfb24f03a4f0b0c01aef8c29dc49942679eb5db47a1c63ed042f1f1fecd06d8ca6121972f33360cce5b956c0fc530286a

    • C:\Program Files (x86)\Inbox Toolbar\Inbox.ini

      Filesize

      2KB

      MD5

      565371d1e7f731b426c5e36e61d9f003

      SHA1

      c7752a54f5ad38002ed6452c19570adc833f9e89

      SHA256

      ac43b254a21613bce70efc92a047cec6c5b9d5c4d6a2ab231ca5fd3b3665520e

      SHA512

      f498bfb9dc3016cf8be350b837d668441e0a4fd0611c1f28dff72f87d305ebbbf5656a8521245b7d388cff8a19d57ba1eb747f50d140beaab6a1902f66af0e92

    • C:\Program Files (x86)\Inbox Toolbar\Inbox64.dll

      Filesize

      1.5MB

      MD5

      5c2c888c50585ade35e03fa261e6c7a3

      SHA1

      228f8b2423945596d44892fff79cee851e725d89

      SHA256

      b88171732c2054dbc64a1649430646eeaf7b5d63c491e515a66736aacbb7aba9

      SHA512

      af463a375586f7a07f29c5855146be05ad74bd18fc90d46c653bc6911761b911472ab5bd7eab75a7bd8b9533704118d2d756368c74ccca7b88c4de294e8ee3d1

    • C:\Program Files (x86)\Inbox Toolbar\unins000.exe

      Filesize

      1.2MB

      MD5

      67e866dbad2c21354f585086d3f3e5b2

      SHA1

      6b0ccd164c9108b01a81f249a2d9c05ed3b5f67b

      SHA256

      6d7c851b4dc1acb135aa18ef28c5921472ca46d555358fc97bf2b10fc82ad8da

      SHA512

      ff0945ec265d3c04335e3a0ab08737ae68ba893455ffa3fa9e45e73ae2d58df737d247827e6b110f904fb18dd40e0d45882655f43b17c6bccd88265ad2aa494e

    • C:\Program Files (x86)\Inbox Toolbar\uninstall.ini

      Filesize

      66B

      MD5

      b084e06a7f942ae74c984674b59ab286

      SHA1

      6e5316501f88e432d7144b176f18202072146677

      SHA256

      806847b184ad90a37e734caf5cddd9e9eff80099f24810312e666f49a060a83a

      SHA512

      ab3194d6522f6592a28c3e583fc4cf63f3875287efbd9dafcb68be90239982b76b398569121a0317942b39956c28d8e93dd2a1c1f2bf568a9c3c88cc3ef2d04a

    • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

      Filesize

      30B

      MD5

      129a4ce81f9a7b3dc2d98e090a069f05

      SHA1

      a266de9a5f3fea40e7de85ddfde49f4b6c515c96

      SHA256

      9ec3cb3f9a5f238ab518e7b57bcad1ca765c429fb37be15057da7eb9170541f7

      SHA512

      3d15c7ddf93e944ed5ce634f35050f95989b1f1f35b4b8233e10658508f07953579c6dd62cced8efd22cf783c7e9565f39270e5bb46d2959a1312148af6414f2

    • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

      Filesize

      89B

      MD5

      96339d98a30c58ee7785f4f3d87b695f

      SHA1

      4c16cc8ecac6a5eb9f6e9df5ec120e49bf36e493

      SHA256

      1002a24d46b6a7a6fd8a1c007e18bcd8c3126d7b61143cc995d1c05262f349ed

      SHA512

      0f4a0cd146092218ca32eac7427173ab2aaaf52c22b5c1c6fcfda21e9b76ae1c3984da132e3a2363bba9de125c920740a908b7f8865f147898e7249ba63b737b

    • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

      Filesize

      119B

      MD5

      8ed0f33758e83f41443df65ffc614f9c

      SHA1

      f865889a4bd5da514bcc7a689a9785268451e29e

      SHA256

      f27e521eddd77cdf261cbec81d0db38b64e7358fc94fd87327543e888433275b

      SHA512

      e9585968b0651e1ef042578fe19ab73e24c413732d34c5ebe3bd9a7fbf99394c7ae4767151ba25be1b03b258f09bc2913d56220a5489578c4470b847d1e48058

    • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

      Filesize

      172B

      MD5

      5dd7ede7ea96df45e50cadee0a8b6f78

      SHA1

      0be3aaaa041d2da0066b4cf90bb8757b40c2a571

      SHA256

      bed375f3b180f38d04de72fa3054a98c85cac1964a025552c0cd5aa9eb81f54c

      SHA512

      cb244f4a90663ae813cc8305609d05fed8decba572494ba94eee2b5bbb99cefd5b650746b4a4100df10418173cd411e34ec78d14a152148b333a3ab7441fa29e

    • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

      Filesize

      209B

      MD5

      9cd143abbd63ae415aac37dd9962a8e6

      SHA1

      4b394c4e5faafb2314ebbdbbdabbfd34f55b5688

      SHA256

      d0736f5b71ac911547d9dcf328882bd45145dbd2af776e53f1a06ff49adb9bf7

      SHA512

      65b39deca6bc79f3d2857b5ebe88af3371fdf7d2522af60e9ba0a1fd34c29809853c9477c395ada2fb554b114284f6fe0709a48a0fcdf8b053458cd10a59422a

    • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\config.ini

      Filesize

      241B

      MD5

      f91f31583d0a23228aacd24c8f0b8aec

      SHA1

      45cf3e0000e890c2ca5319ea291c35a63d60eba7

      SHA256

      b2abce43fcfefb445cec4e85c3006788e86b3856bdc5c91cd18d9f66a4cfd079

      SHA512

      98f6eb1315521b77a33f5832ca0949e86e8df912a825ac3b2d35e71e05e086663c0174c4805f6b510a7589e853e6eb2edacfee2597015b1cf00aece5e477bf9c

    • C:\Users\Admin\AppData\LocalLow\Inbox Toolbar\translate.ini

      Filesize

      93KB

      MD5

      6aa650efb4605f4bb39bdcfd8a2198ba

      SHA1

      da12240ffb9984e3f3d8e93a859bc8d768a242a4

      SHA256

      8729058fc0a109bfaf82d84abdc954805cd46ed499ff235d5181ff3facdaf2cf

      SHA512

      6893a2f796546c859c1a9ab2a8c1960f2606fe779a07bbe3cf3c0ebdb9579defa87c3b1d4dbb7e4934839a0cd5062255fb6d019bee11cf57e09b0cf350ce2819

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

      Filesize

      717B

      MD5

      822467b728b7a66b081c91795373789a

      SHA1

      d8f2f02e1eef62485a9feffd59ce837511749865

      SHA256

      af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

      SHA512

      bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      db7c83e09ebc4317f2bf2df7f66b8513

      SHA1

      29d58ef43f72ce7cf79ce6109d038a6c9b4873f0

      SHA256

      1ae4c8aa37bf433bc5b3b45e017c95bf843c7dbbe348c78c7ab6f3cad0fda4b8

      SHA512

      6eb46ae0c3e091ba13b1c0e3fb6de568882940df7968d0e1297568ea5356a4691f2a869c7c9ac9e9642bcc2e4e1388d00b15c663276143e8cb5015ab89c27867

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\832765B953AB3CF6C7F02DD7AAAC952E

      Filesize

      504B

      MD5

      8336d10842495d3006ef576ef017125a

      SHA1

      3cfceb3bc7a261f7b02ebe50f558bf4b40851ef8

      SHA256

      7861cb4d8433fe2884e2f7c08d7a2e2d1819d785a77aa20d7d7bcdeb058f6b0f

      SHA512

      ab6d5987cf1fe53b403bff775b168eb3eb5b7ab0719dea04fc57043274eb8a1b2513d11b48f60ca9b72ac8de71b5b6fe8edc17fa7293fb652a15e13ccb53a2f3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B624848E7D0C04204BF0E664FB37FBEA

      Filesize

      504B

      MD5

      53e4c765a72d4470b65a0a6045fec024

      SHA1

      f37af6a8616b1d81e56a7874552fbe7a885ea88e

      SHA256

      9213f5800edcf705e1809c7ddf05ecf13d01037b066d3b5e003c1f5ae0230171

      SHA512

      decced1fcfac40e21f2d77c7a85e91bb6b45fd97693fb7cfddd6f3fe1325c7c051de74314fd4f8fbef41096ddc7da3850196aa211d26a53b2cdff30dcd3d2821

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

      Filesize

      192B

      MD5

      a044c115041794e14632c0c32c60bb50

      SHA1

      3021ceff3d0c6f2b52e9640e29e48a57d4c11b64

      SHA256

      585d978c71e0f47ee7145172e4c548f12951b08c7b225955c0ae3e16cd19de84

      SHA512

      8013f77eb0f7703bdca2d18168301bf60a05a2e8d80e3c6e42d2ba88b5adf3154cd493b371534fbfddf9eec33baa2a0c5625c00a429106d5d784a9ef57ac4918

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      f81b96da5545aa83a4f48939d68e2059

      SHA1

      0975b35d949634b25982b7afb06ee5b77c43b5cb

      SHA256

      dc914b1a753783dc1a872706afe6c7578217fd038fa3de6cd4ff189c0e1df55f

      SHA512

      7adcf7f9fcc78af5e5600398edce31155e7bb5d6ace618c2ecfe7208d3347e5efd15cb8e112ae08d2cdbf6c1a3b06f647622d85cbb311e6ca6e8169da77d3b2e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\832765B953AB3CF6C7F02DD7AAAC952E

      Filesize

      546B

      MD5

      94b8e702c7d767ff39a438078d7085ab

      SHA1

      eb30ef0d6926a10faf3352e1bd952eec8711f110

      SHA256

      12b3d5b2a3cb54d35e5b6d91cda43daeef6df76ef2e0feeeac31f9e3c9e6a10a

      SHA512

      1bd78036da0b170694ee68540a1f87f5203dce4fea4dd5dd1ca539f267c09fce690c1e0c98ae9f324a683c88f0b4a4474ad81fdb9000d5bb8d876de80a7dd045

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B624848E7D0C04204BF0E664FB37FBEA

      Filesize

      550B

      MD5

      c9bb84048c69d1dc46d53a3668de0853

      SHA1

      cffeca3b02b07fc482953609ef52753ba8a4a7cb

      SHA256

      188bd0020425901014f1f6951cdc6a25fb350927fd0b61e31f007713fb2689ba

      SHA512

      08aaf595784020b2fd8800db56aa6484e8d49635b80609925df23f9b0d36d308251df695c7f952c65fabd930d082c07af004bf69142e912f2fb93f95de386511

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verBD21.tmp

      Filesize

      15KB

      MD5

      1a545d0052b581fbb2ab4c52133846bc

      SHA1

      62f3266a9b9925cd6d98658b92adec673cbe3dd3

      SHA256

      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

      SHA512

      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\s7fx7pr\imagestore.dat

      Filesize

      15KB

      MD5

      b97db078a657c9e96e08de48783a2d41

      SHA1

      f2840d22b539dcfb15d0e4f55f3cc1db55653a88

      SHA256

      2d86cdbd699519713197202723943a52a5899b30e094e8fb6e8b0928bc720d5e

      SHA512

      d124c14b89525208f6d0e614394de799e1ba1841c0615bdbc5dceb0b2c3154106fdb16a2bb52f6520dbc2973cb6fefb461d671576c055e8e155e991aeb151813

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\7TBBQW6D\favicon[1].ico

      Filesize

      14KB

      MD5

      de4c71e881f03193bb0884185b51bbdf

      SHA1

      8f51bb36b81298f9fb57824716539520553b77fe

      SHA256

      1f8e952702b912ccb4326c9bfd76f4cb49459787a2955924798792c20ed45580

      SHA512

      cf91b32ff05ce6fab615d727c6a1e25c9f4f08d51af5cadbba74650921333b0f0f3a0444a36c4c4ae77abd3ea54c846c8248af7cc0256c06ca4aabac457eced0

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FGWUB7UN\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\AGupdate.exe

      Filesize

      873KB

      MD5

      a3ccbbb0735800b89931b73ccb69f9b1

      SHA1

      53c70f80017eff22ad88a53fdb3ffc518354af59

      SHA256

      97d0684ab1ecb2f89a3c8e53dc383aede506a1f9367aa283c0b9992a19854d43

      SHA512

      e4461a7cf5e8b8e655a2985be672af25e44276b018b7b532a665f26c1a44032bbada7e5a071a78827020c3f18d9d5c79bd0f59fe97876b1eb4279ec4094f3704

    • C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\DownLib.dll

      Filesize

      183KB

      MD5

      db25dfdd4c1f2b65c68a230881072695

      SHA1

      94cd6a3438041f0e61b0a1bea7b66461854efe69

      SHA256

      1b66aaf1e7e3c493dd96af3b7442ea60072f6e93ba45281eacd31a14ca7e7e73

      SHA512

      db69e4ab2218856e5184d9094e7e39705b83e3efdc15225067205c8faf6e5836145364f1d509192defa3b48864e72b9f8c0f2dc53a7adb2b86c655318b7afc2c

    • C:\Users\Admin\AppData\Local\Temp\is-8E04N.tmp\setupcfg.ini

      Filesize

      85B

      MD5

      a6b61555593b8bbffe830a5886cffa9c

      SHA1

      0d25251000418b6d7984804e2548aa63c38b4114

      SHA256

      ef852e5af8ea1479848dc76fcd01e429ae8dbba04f840a3989af3a0b49c184d2

      SHA512

      104bb334170c592be3c212fda887f34bfb62e0526f1714dab737077affa2896b60d1d8944895f3de863f6af6661efcba0239a2ae3fac5bee8e49eb307583113c

    • C:\Users\Admin\AppData\Local\Temp\is-S0FLE.tmp\16e11b36262eb534ee829e2de2848e72_JaffaCakes118.tmp

      Filesize

      1.2MB

      MD5

      e7106fbf42fbc6d5b08a18ada4f781b4

      SHA1

      36d4a629f79d772c0b0df8bd2ae2ea09108d239d

      SHA256

      64e1f1fa7d91920b17bc7bc679a4cd8d87ff5b104318b6921bb6bf6a19055635

      SHA512

      adf876296a952aadeb4f25211c0939bf5a278809b5d3007ad7e26c5d4975e7684d242c1b3de796efd474a47cb7ecdb80f9047935924a1108bf0e4d7c973d1845

    • memory/100-132-0x0000000004750000-0x0000000004857000-memory.dmp

      Filesize

      1.0MB

    • memory/100-7-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/100-64-0x0000000003C10000-0x0000000003C47000-memory.dmp

      Filesize

      220KB

    • memory/100-63-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/100-165-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/100-23-0x0000000003C10000-0x0000000003C47000-memory.dmp

      Filesize

      220KB

    • memory/100-150-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/100-152-0x0000000004750000-0x0000000004857000-memory.dmp

      Filesize

      1.0MB

    • memory/100-376-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/100-428-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/100-406-0x0000000004750000-0x0000000004857000-memory.dmp

      Filesize

      1.0MB

    • memory/100-404-0x0000000000400000-0x0000000000536000-memory.dmp

      Filesize

      1.2MB

    • memory/764-513-0x0000000000400000-0x0000000000660000-memory.dmp

      Filesize

      2.4MB

    • memory/764-379-0x0000000000400000-0x0000000000660000-memory.dmp

      Filesize

      2.4MB

    • memory/876-402-0x0000000000400000-0x00000000004E5000-memory.dmp

      Filesize

      916KB

    • memory/1064-128-0x0000000001F10000-0x000000000209E000-memory.dmp

      Filesize

      1.6MB

    • memory/3424-391-0x0000000000400000-0x00000000004E5000-memory.dmp

      Filesize

      916KB

    • memory/3636-123-0x0000000000400000-0x0000000000660000-memory.dmp

      Filesize

      2.4MB

    • memory/3716-430-0x0000000000400000-0x0000000000660000-memory.dmp

      Filesize

      2.4MB

    • memory/3904-429-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/3904-1-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/3904-2-0x0000000000401000-0x000000000040D000-memory.dmp

      Filesize

      48KB

    • memory/3904-62-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/4672-304-0x0000000000400000-0x0000000000660000-memory.dmp

      Filesize

      2.4MB

    • memory/4828-418-0x0000000000400000-0x00000000004E5000-memory.dmp

      Filesize

      916KB

    • memory/5116-93-0x0000000000400000-0x0000000000660000-memory.dmp

      Filesize

      2.4MB