Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2025, 02:44

General

  • Target

    14b6b2ef72a4e0e4a28330aa401567ea89f39e029016267a83ae8850cbd5cb10N.exe

  • Size

    945KB

  • MD5

    66e2a63174869d2eac1b1873e0b78820

  • SHA1

    83df596581fff25d38f419de5bdb96f434b70212

  • SHA256

    14b6b2ef72a4e0e4a28330aa401567ea89f39e029016267a83ae8850cbd5cb10

  • SHA512

    ca84ba22e7d53c41fc54e31eb95a1173030c52e8aa89f595086a97d41931756d2f5751e9f177219c0bb00fa6c690a5c06fe9db9a06fa2e7d587fb7eb8ca48a41

  • SSDEEP

    24576:0YK4aYXMHVFhCz/jQHTP//LCcfyWAtBcPW:0YFaYXufsMz3//dAzcPW

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 51 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 4 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 7 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14b6b2ef72a4e0e4a28330aa401567ea89f39e029016267a83ae8850cbd5cb10N.exe
    "C:\Users\Admin\AppData\Local\Temp\14b6b2ef72a4e0e4a28330aa401567ea89f39e029016267a83ae8850cbd5cb10N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\crpEBD6.exe
      /aflt=babsst /babTrack="affID=121441" /srcExt=ss /S /instlRef=sst /mds=7 /mhp=7 /mnt=7 /mtb=7
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\Setup.exe" -xprm="cat=delta" -expg=none /aflt=babsst /babTrack="affID=121441" /srcExt=ss /S /instlRef=sst /mds=7 /mhp=7 /mnt=7 /mtb=7
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\SysWOW64\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\A5357F~1\IEHelper.dll,UpdateProtectedModeCookieCache URI|http://babylon.com
          4⤵
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Program Files (x86)\Internet Explorer\IELowutil.exe
            "C:\Program Files (x86)\Internet Explorer\IELowutil.exe" -embedding
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2852
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\SysWOW64\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\A5357F~1\IEHelper.dll,RunAccelerator
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:2044
        • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\MyBabylonTB.exe
          C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\MyBabylonTB.exe /lng=en / / /babTrack="affID=121441" /instlRef=sst /aflt=babsst /srcExt=ss /noFFX
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1200
          • C:\Users\Admin\AppData\Local\Temp\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbar4ie.exe
            "C:\Users\Admin\AppData\Local\Temp\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbar4ie.exe" /lng=en / / /babTrack="affID=121441" /instlRef=sst /aflt=babsst /srcExt=ss /noFFX
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Installs/modifies Browser Helper Object
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1552
            • C:\Program Files (x86)\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbarsrv.exe
              "C:\Program Files (x86)\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbarsrv.exe" /RegServer
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:2664
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.pdfbooksr.com/Dialogues%20in%20Public%20Art.zip
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\BabylonToolbar\BabylonToolbar\1.8.11.10\uninstall.exe

    Filesize

    195KB

    MD5

    d5cafd1094c003ed8b5ee0769d40468b

    SHA1

    36accbcc1114475aae0195d193f9d0a0d978cf6c

    SHA256

    938703cd98e89398e129ccbea6ae0546d8aa5eb90bbaf96c2ecf18f88852941e

    SHA512

    0395cf4e48ef1f49793eac95cb25089c4a7c24546af65080d8feecdda7532a461a13596cad928550926a90ca971ed7a9bd1cfb651ee1d1d18133e01912228d7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    132c3f83f4e1c22b513388a23382940c

    SHA1

    7390153258fc40ee906d2187b2e880f8d4543978

    SHA256

    a75e5bb77b969d284853d46272421b4ef802bdc90df4d27d1f2d8a4d82652726

    SHA512

    09190cdc48722ebaedb5671c8f60804c4e85dcf790ec717b106f8bc1b100a3e44199fefbd059953ca60336c5a5b175295f95e2c9481ff87607e3bd6af4939d57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fb0074fd3adb46ea1165505d4e7b289

    SHA1

    738b188201444c97656279e27708aef20d5a2b5b

    SHA256

    b947a761f8c89c90e99acb1d705c33ebb73a8f97e678f10f4b25ee0d8f8d452d

    SHA512

    4c94e09dfc9d28deb340429857423d92e295b44b8817d654f690172ca1b9a62d895e8d99f373706e3b5950aa8c6519e7a358aa720bf50f449fa3f47421500dde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efa0a1242deddac1203ebe8c6b110b02

    SHA1

    b2d18c023daa6c52a10a083f4dc3201e23eda92d

    SHA256

    e41d5541de7e3620e58bb1b479e8f569e1543473de81e8e6a7c0f1a84b6d701f

    SHA512

    ca96c4bd97ac09475cac8b9260335f7406318311c9eb4d16636c9c95c248d29f897073fee60bbbfdc8ab63b344c17333f6488181d6633af9a78bbd39e164dda3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edb1f4bb3834c6c77bbc8fcfe3119c76

    SHA1

    8c01caeaf103010756f0d86f1ebfb121314685b0

    SHA256

    220ef23d797efe1772c1261801ce0d99eccc3c6aa8f5ceb8437efd3f047b3815

    SHA512

    bae408a2dd1988783a73c2c0066ea2f0f0c5cf3d354df69d6b05d3e6b14a6605df5cd33804facfee36389de023c957ca11d39ecfa17c076bec87223ab6e6b3e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b0600ecfafa73a0fe53d3aea5ec7a06

    SHA1

    0610042fdbf1a214d29fd9cea45732321a554764

    SHA256

    23938cd3fcd9a533c0988f1de3bfdcf01ac40827094d59658ecd48f6265a328d

    SHA512

    3f24abb476552567f53c01e6a74e60d6a5200d23b4e438e954f1222a7ac21d9c4651e52706a7ca38f915766584b90a9b732a53194dbe9badc7ae82573c8063d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b8ccd21c2a536453563ede69f2816f6

    SHA1

    b526bd7cc40e6c8e2ac5aa0af196ea5c22e81969

    SHA256

    7b8f3df9c7449a4b4bf8a2350a966d8d1896638eca53edb425537aedfe987a2f

    SHA512

    7ede6e9df198f2c57f07662047f5ba2569c3c48b3b236dbf1bbb54a346e3c4ba37720a48a36119fe4bab964087c1484899483d16e892a23bf3047693fae494c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b8bede4c4eff8f74aeadc58140aabfc

    SHA1

    803896f48eea579769c9cbe02666d7165c755076

    SHA256

    e89f9f9f6fce5c413dca6396c0e28e8c22d8a317dd4ee3f6c129e125472269b0

    SHA512

    93925b63bbb9f7131061b77577586dcf55951c6210b2812ce3a29f02c2c1087f79f9466917064b3362a7e108725de9b8a59e22a0f74631472afd077cb9448a65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19935f83382ecf6906abebe6faa6b9d2

    SHA1

    554c46b62c00ff93e8344e52ec7e370ccca13ad6

    SHA256

    d7daaca952d7a7c332993df1d3777c3bda8c97b9b6ed2665184273785b39101d

    SHA512

    3991c6bddf7e22e43277549fcae2213de2ae4b1e4e242e60e59d43a66f1e5faaf9594aa355a90d1114629dfe6d6a8afd2896463066b6f44f0a72da1e32ebad02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf3d0e985b165ed2a231c9615abea357

    SHA1

    9766d63aabede8730c73b11c44f6d9014492a6cb

    SHA256

    67339174c36f354b5272733623ace562f66883150583aba1022d811eccb4eb75

    SHA512

    9170c6c8dce4487eb6af6bca3d5d237445c57ca429d6537a2c8327a6885dabfbb729db05ea59ba8fc868d0118be46d0b1afc1d2d2576c117e50bb974998e9ac6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    916b8452104ce3fde9f9f6728ba043af

    SHA1

    de7741e4b15b1d7cdbd542b5d393f0a04c7d2f43

    SHA256

    f1fd9e4d545f3788021f82154a30a956cd46e0bce0adc8e9d58388eeecebc863

    SHA512

    ad4cdcf482de4359c96f8c4334724fcb33bb52a97c3c0d22a1b3d2bfe18fde55211b5f6cf8315f7f94ec494b64fe2c0c6849e0b09d217aa03d9cebcfde53a673

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7193f11da4aa9f7429079da75deae606

    SHA1

    c8724a94e851f97bff7987f7c84888fed94d678f

    SHA256

    d807e5bb8eba0f5659279ac38db23bb6440454e291b1de6c720a66000abd8261

    SHA512

    51189a2033b1b17844f08493da619fe9997b81c0202efbc5cc21bade32a9808e305c116677acc0c6944a6f3b529c9ca6ea55bb72f4974bfee697db59a860822e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    69693786f0851a8cfd05613116d317f6

    SHA1

    ce0b5fea27ee7d187cba817b37b997ce7cea3af4

    SHA256

    8d244791a3159f64d6073af9eac320218285665aeddecf7fd4936f37dc7f8c95

    SHA512

    dd25de3a1e9b45ae0806edd15ed2fb647ef2f8189938d9a515aeb27e2ef67b58cd7716c951456111ecbf7b4a52be4976c736fa9b01aa468dd973931b404be1cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef8c43636725785336c1b29f0249da00

    SHA1

    bf7222d5867cbfe9e41d8b31691960911fc043e5

    SHA256

    eb4c536bdd6416a65e598e09207b1cda6a3652e1138e2bc8c94f6c309a0d22b1

    SHA512

    416aac2b796a96e67e230514ee246bbafded9fd3702d27af9536f6f69345ef48e9aa1fc2996d8a2c1be8de0b715278c759076859cda8ac43df04c65b22509578

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83077d7f630aab98c570554e8fb6865b

    SHA1

    ea1a591fc3d41eb2bdba00a758d6b44a616ef8c9

    SHA256

    60ecde3d2f4278e160b3c2c7d6c60bb881aaac0430e14a71475eac26e89d825d

    SHA512

    96a4b3329623176ae66b5178ca8a877abe9e54e070ce3d03af4360b73352227220287b8eff9c5c599ee6502b334e9a1cfdb83ad85b46c2e3bc40aa40a5d944d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    c45ba84621e283fda43459c3da267df6

    SHA1

    196d6506aa4f655563490457ab11f184191816f6

    SHA256

    a6c5d2322d3073a9420c835ffce9830ae34cbe3a0578e5277ecc8d95950c8ee8

    SHA512

    64bb784dc72f44331e02c22a2b16d55e679ce7750e6966ffb870597ac8d9b1b362d66bcc03fcfaac39495c8cd3a1148e1cdac864b79f714fc041bf418d0dec0b

  • C:\Users\Admin\AppData\Local\Babylon\Setup\Setup-tbdef.zpb

    Filesize

    1.4MB

    MD5

    85499627e8e83a35ba23cb860067b468

    SHA1

    758d2902f93e28b92c1f422b3d5e16d03835c3cb

    SHA256

    8b1b99fd1eb29d888fef74a3733d60e3c0b5af2405beea8fe2223fffae79f4d0

    SHA512

    bd2b00be1b78a37b6b8d6462c358045ddba18d46021c820dbc73c5f62309b0c08d5144d3a65666384a9ba646d6e942791b949b220969a27d307352db08dbc052

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\8360YJZL\ww155.pdfbooksr[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\BUSolForMontiera.inf

    Filesize

    199B

    MD5

    bc3e8cc74871863fc921511e2e6cc88a

    SHA1

    653cab5ba2107004f9525849ff5625d64b83e4c3

    SHA256

    c9e2a3953cc5ea87716f2a9a16078adb2f9c60318c6f1cfc877885126cc0dd17

    SHA512

    85f4130758ea38e4ae823e6fbae7448fa780bd295bd177afb4395ddd118c019d1533238e963e5277be453a1cd7681667c4ab06b10004ab8ed890d6e0b9e0529d

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\Babylon.dat

    Filesize

    12KB

    MD5

    825e5733974586a0a1229a53361ed13e

    SHA1

    9ec5b8944c6727fda6fdc3c18856884554cf6b31

    SHA256

    0a90b96eaf5d92d33b36f73b36b7f9ce3971e5f294da51ed04da3fb43dd71a96

    SHA512

    ff039e86873a1014b1f8577aec9b4230126b41cc204a6911cd372d224b8c07996d4bb2728a06482c5e98fb21f2d525395491f29d428cdd5796a26e372af5ad4e

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\MyBabylonTB.exe

    Filesize

    1.6MB

    MD5

    7c82cc9aca3eb71e463ff607cd607e3b

    SHA1

    5ffcc47376a89ec39fba8516694fb37c3b7d2bda

    SHA256

    9c1b8b8b3372737fe355bb6f4f96fc9b04bcdda5f3bfbe9617d22cbc35a400ea

    SHA512

    7ef9e92153607646f9eb9dec4fd087e9523df523d4f06eff994698d79ddc4e8e1f681fde13e1eb888e5a85457db558b10ffaf190c17bdc98688a59a90efc4670

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\SetupStrings.dat

    Filesize

    89KB

    MD5

    407846797c5ba247abeb5fa7c0c0ba05

    SHA1

    44386455eed8e74d75e95e9e81e96a19f0b27884

    SHA256

    0147b5b11b935310752666fcf1e6afc922b76ff03d01a0d1ee2babeac10ca1e3

    SHA512

    7399a9228f971698db7362aad28d3f9694c0bf453d4529e48bc7869af0960452cfe1a5f0a5754e7d567d81b5aa1e35be05a9e36ec745e5470d20fd44a61d20af

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\TBConfig.inf

    Filesize

    23B

    MD5

    e6d6dbe1e36a9ccc040369ab905e0d4a

    SHA1

    f7b40129e12f9f8ec3dae49d281ea1b8171642c5

    SHA256

    24d0d8de57d4bb9d88c6079d19b0efb51c18c8006ddb805fcc6cb7c302f94a12

    SHA512

    caa6c8ba543b92a49e41b736d560a3dd62651885f3c0c30ebb309e57bc77ec0dd1ccc20ebc6d4ff04d17083f112f3b6427356ff585ed40de6d08b51e6771dbea

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\bab033.tbinst.dat

    Filesize

    205B

    MD5

    90713ab7a74884cd36a5fb4cfcdece8a

    SHA1

    7bb56d08fd69a98e543b923bd0a9156f92a9c473

    SHA256

    bc40813f6d07dbc1a4d4c74363460d1ad6ee76275729de4c4f10ec40d8cc46eb

    SHA512

    639d68135fb54264f2e21081d6ca9ffe73a94035982f4a2d7133d6d402cdd3ef4a695eeb61ad173dc6d1b8167d1f5df2be61a972c96f07ac357ecec887a0d191

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\bab091.norecovericon.dat

    Filesize

    174B

    MD5

    4f6e1fdbef102cdbd379fdac550b9f48

    SHA1

    5da6ee5b88a4040c80e5269e0cd2b0880b20659c

    SHA256

    e58ea352c050e6353fb5b4fa32a97800298c1603489d3b47794509af6c89ec4c

    SHA512

    54efc9bde44f332932a97396e59eca5b6ea1ac72f929ccffa1bdab96dc3ae8d61e126adbd26d12d0bc83141cee03b24ad2bada411230c4708b7a9ae9c60aecbe

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\bab148.spreg.dat

    Filesize

    249B

    MD5

    a4af0a0c254b38f2f9eecbf0e00b08fe

    SHA1

    ef730bce77699730dda378dc444b997ce7ceea7a

    SHA256

    810e0e32d54b9e1557da7ccf1ca9f6354814e90dadc6b4af5e1cbdf87fac925a

    SHA512

    b74596e55e75413303559c135db393a04d6fd6cbab147a51ac2f46435f52b92b82868de4e67917a7b388d82c672fa36b525b88e2eefe7ec40695f028395dcd84

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\bab187.wl.dat

    Filesize

    234B

    MD5

    6358860cd0c336c1f91f86be701d77c4

    SHA1

    5dd38b818bf0860b4c5144ba670a759d4345e4ec

    SHA256

    2ed42e3c958eb21352bae4b00db2fa5be94149abc64eec93e5258b9c4a715457

    SHA512

    7df3b3e1487d3a65000b6208969f1e695815133c052f369beb36877fe5c6f64d979aefd030a193b04a5e46fb0d97a3cc06837aa381efe6bc24a0c084c768dac1

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\bab307.sp_pop0.dat

    Filesize

    178B

    MD5

    0b7be9c4b72c2c5166bfd61ca5ebbfed

    SHA1

    aea0aa4e8226c1b4efce92e909da773744baa6d4

    SHA256

    673bf972d308bc6108360575608cf72f393413f2d3993489b06da4a6efc749bd

    SHA512

    4dcd7ea01b05550acb00b71e7e9fdd52a04fe1cc574655030dcae94b87dad86bfb7973adf9185de03bcacb100fff758b1a2f928fcb951e2b31e320860a2226d8

  • C:\Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\bab456.TB_OldWay.dat

    Filesize

    174B

    MD5

    7e72d256e34635d351092955d1f8516b

    SHA1

    7f240f8f4bd61ae59247d84d0ec85f5bc8729f36

    SHA256

    39eb1667a67149b5d930e5408896027e3c3fc06282735e61cb8d85f5b38f587c

    SHA512

    621eb4bf2864db2fa0f861c233ced790124e9060c081948beb7117f8c058a36ecca23ee05ce2d6d42af15533c050f648d276589682d91dfe699ebe871cc9ae8c

  • C:\Users\Admin\AppData\Local\Temp\A5357F~1\IEHelper.dll

    Filesize

    6KB

    MD5

    a21de5067618d4f2df261416315ed120

    SHA1

    7759a3318de2abc3755ebb7f50322c6d586b5286

    SHA256

    6d13d2967a37ba76f840cd45dba565c5d64938a99d886243f01713cd018e53ca

    SHA512

    6b5c40d09a9548fde90c1b1127a36e813525bea6ff80d5fb0911ddef67954b209df44cbf4714cd00c4e2e4da90cfc4967db7174c28f751f7c5b881fa18cc938a

  • C:\Users\Admin\AppData\Local\Temp\Cab3AC1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3AE3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsuF3B3.tmp\InetLoad.dll

    Filesize

    18KB

    MD5

    994669c5737b25c26642c94180e92fa2

    SHA1

    d8a1836914a446b0e06881ce1be8631554adafde

    SHA256

    bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c

    SHA512

    d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563

  • C:\Users\Admin\AppData\Local\Temp\nsuF3B3.tmp\Processes.dll

    Filesize

    56KB

    MD5

    cc0bd4f5a79107633084471dbd4af796

    SHA1

    09dfcf182b1493161dec8044a5234c35ee24c43a

    SHA256

    3b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c

    SHA512

    67ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3

  • C:\Users\Admin\AppData\Local\Temp\nsuF3B3.tmp\mt.dll

    Filesize

    7KB

    MD5

    4fae8b7d6c73ca9e5fc4fe8d96c14583

    SHA1

    10865e388f36174297ec4ecdafd6265b331bfdcd

    SHA256

    069db1a83371dcd2dd28a51def6cef190edcac6bbf35b81b7ee3c52105db210f

    SHA512

    73a5547c6d83227a08e2427f2e5eb6abf429d4b5b7e146fcd59b9fb8c9cc6eb9ff61347a3d46f83d0c7adbaff15e94e70bf40660c217f48e9a46a6e310aaf6b1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KR7ULG8F.txt

    Filesize

    297B

    MD5

    022296d6b9288540463aa156cb30d9ac

    SHA1

    3a0ead37c30e9d8f8c6739e10dc0b50dd58e664c

    SHA256

    80603d348fb6066ed918c01c468a246eb2f36df02e5d5863840880b55a2e4cdc

    SHA512

    7e36e9a6a11ddbf7d12fa24431407bba40b5e686baf4c651c2dea99cd65a0208eb2787cff922ad645fd9511e3a652730096006d1083ac8444aa9392746116f4a

  • \Program Files (x86)\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbarApp.dll

    Filesize

    307KB

    MD5

    a3d75a31cf0dbe0f3a6d70ac3b06775f

    SHA1

    9810662290f2fe96bf0883ccc9e210fa7318d486

    SHA256

    49a42460f5ba5706919d8cd31c2fd77a698473830459375ecb007527d0ab5d09

    SHA512

    88aca7198e3e2c7e2fc5f0245d0b23c548cfcb4d143b46f1ab8c7ce3cc50f96670a67dafd4affc1a3b727f8be880383e7880c98d9ac3b475b3a15991e5a4ad8b

  • \Program Files (x86)\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbarEng.dll

    Filesize

    566KB

    MD5

    3aa58b7922fe6ea9a1d596d271cb9060

    SHA1

    9326a20660e8039e9ad8bb4c384f2b00007201e2

    SHA256

    8bb023161e8163eba6ebfd1e76567ee5674d67c32c0fbf233e36791777476bff

    SHA512

    c3ac17d6425890b1c52949ace7848109b09a52139d4059b7d777992c22a7b1b8ca18f42d79e5b8a973e57a20652d4ab73a2e456b05843de5d37eea4c97b7394d

  • \Program Files (x86)\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbarTlbr.dll

    Filesize

    312KB

    MD5

    da4797ec88cc756c55e04c1f335c01bf

    SHA1

    488dd0ca62ea5b0f3294c9c09e0e5b0123e2baa7

    SHA256

    04941cbdd74aaaac3ce9ae4a001eaaeccde37a1acd8bd026af0d68d2405a3b31

    SHA512

    5263d87563025034f98a25076048fb75de1c198ac4b32cb584e65e411cc79a58d6d6eeeaf3745cb05e8cce374809609a8c9f9bc14880358581dcacf3e6190fc6

  • \Program Files (x86)\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbarsrv.exe

    Filesize

    374KB

    MD5

    84035e957a892e12ab74aa9cd4160f7f

    SHA1

    19ff35e966b79b29d05553cc70b51047dfee3bc5

    SHA256

    0a3331f3f867a38f7474ab7c620c4e82fd37109c006588de5c588bf7e4a4fe05

    SHA512

    a5e37bef316240ab50175336d4ee39047aac907f103fe045d9e14705b2bca8da71af0066541ebb43483c6241029c743046637f5d2cef4422e72891d3d09845be

  • \Program Files (x86)\BabylonToolbar\BabylonToolbar\1.8.11.10\bh\BabylonToolbar.dll

    Filesize

    242KB

    MD5

    d2dfa8819b1714d444f0b100c403d3ed

    SHA1

    bdd79367762dc63966342223df21884b45805530

    SHA256

    3b5c3ba7c3061b1bbab546c1733f09cd4e240e1b07c028c80de73643502015fe

    SHA512

    ecd16ced6f2db7b06a67b8eb99e9cc39b91b12bb45e5f84e72776924f7fb69c17a403caff9e60efe0ede7eca6d3e6dbba7504cb10a4784b269387ebf2fb8c5d4

  • \Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\BUSolForMontiera.dll

    Filesize

    105KB

    MD5

    64bea1da4d76085d0a47ed21450401cf

    SHA1

    296d8b511c0f7b8b7d0791c522db553f9461ba35

    SHA256

    80924cda632e20e1ead804b67fe64ce87c2b6dacbe73b9a2ee1904d402b2ea9d

    SHA512

    f4644bcd3dff71648209caa2d7489b0cc87050271cbddf875439cb4eba3e3fa400acc29703cff231f6a1c6f2097697f2f4387ca265682d8e4185a1242dfeb2d8

  • \Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\Setup.exe

    Filesize

    1.8MB

    MD5

    26f6d1b6756a83de9755a05f7c030d75

    SHA1

    935f58155f74b051f9123b6022b7d358b52b146f

    SHA256

    2acab7c986bbf80578c3bd998dd2d853257719ceb74c9d30bb4ea28952403d5b

    SHA512

    af9603572bddb6244a7ab0484cb3ac9ed7c91b1cea3e3f8c8886478930dbc102925b45ed094eaa2801755644e3bb4a4c0685a423f937f4b02af16feec56e4f6f

  • \Users\Admin\AppData\Local\Temp\A5357F0D-BAB0-7891-978F-3C8CF05A7C6C\sqlite3.dll

    Filesize

    508KB

    MD5

    0f66e8e2340569fb17e774dac2010e31

    SHA1

    406bb6854e7384ff77c0b847bf2f24f3315874a3

    SHA256

    de818c832308b82c2fabd5d3d4339c489e6f4e9d32bb8152c0dcd8359392695f

    SHA512

    39275df6e210836286e62a95ace7f66c7d2736a07b80f9b7e9bd2a716a6d074c79deae54e2d21505b74bac63df0328d6780a2129cdfda93aec1f75b523da9e05

  • \Users\Admin\AppData\Local\Temp\BabylonToolbar\BabylonToolbar\1.8.11.10\BabylonToolbar4ie.exe

    Filesize

    1.2MB

    MD5

    5b34d794ec99c2b883d7c1affae96055

    SHA1

    54b894d8f473b3beb1037af57d4490fbbf623a66

    SHA256

    d8c7c0fdc6f24d58850b0838f27521d501e67d5c2eb712d9643c17a8e24112b6

    SHA512

    21eab533dddd3ae02d34ed695ae231202636407b50cf16df741bcdf617780ff51ff95d532b98dfb2d1430fd8c6a54b59265d873951bd960b0af2c68b1a1c9f45

  • \Users\Admin\AppData\Local\Temp\crpEBD6.exe

    Filesize

    767KB

    MD5

    eb2764885565b6c01cb32e5f51f213b3

    SHA1

    cc41cadbbd6ba6ed0bfdd17798b4c9f94d7955e0

    SHA256

    d7146999ff94b3ae092f3213ddf0217615f1d38798393b66778d11aae2b68eaf

    SHA512

    ac88795b2e8260ace9eb57d2a3fdc4aadb18e2cb0afd780459f51d25f83b34f7033425dc712655e423eba4e011fd2776f53463042f2c2d9dd427554c04cc840e

  • \Users\Admin\AppData\Local\Temp\nsoF4CB.tmp\md5dll.dll

    Filesize

    6KB

    MD5

    0745ff646f5af1f1cdd784c06f40fce9

    SHA1

    bf7eba06020d7154ce4e35f696bec6e6c966287f

    SHA256

    fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70

    SHA512

    8d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da

  • \Users\Admin\AppData\Local\Temp\nsuF3B3.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsuF3B3.tmp\Time.dll

    Filesize

    10KB

    MD5

    38977533750fe69979b2c2ac801f96e6

    SHA1

    74643c30cda909e649722ed0c7f267903558e92a

    SHA256

    b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35

    SHA512

    e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53

  • \Users\Admin\AppData\Local\Temp\nsuF3B3.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • \Users\Admin\AppData\Local\Temp\nsuF3B3.tmp\chrmPref.dll

    Filesize

    208KB

    MD5

    241d60c30189b740c9086e34ff259e66

    SHA1

    7be0132de11c34018b6326d1de20fe9f20dea790

    SHA256

    8b3d8f239f11b53bc28f645546696441446e9a593be59cbf604fcc28a7e6d474

    SHA512

    ad342cea73ba3f7e7afc57828abc7320c0c5e39e20f5b06637c565a2b4579f05d81540e02b094776abbb17b021712a0f28e5f62637d8cea04b832e79252dd5fc

  • \Users\Admin\AppData\Local\Temp\nsuF3B3.tmp\nsisos.dll

    Filesize

    5KB

    MD5

    69806691d649ef1c8703fd9e29231d44

    SHA1

    e2193fcf5b4863605eec2a5eb17bf84c7ac00166

    SHA256

    ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6

    SHA512

    5e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb

  • memory/1200-1455-0x0000000002DF0000-0x0000000002E02000-memory.dmp

    Filesize

    72KB

  • memory/1552-1191-0x0000000000360000-0x0000000000369000-memory.dmp

    Filesize

    36KB

  • memory/2852-41-0x00000000001D0000-0x00000000001D2000-memory.dmp

    Filesize

    8KB