Analysis
-
max time kernel
90s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe
-
Size
496KB
-
MD5
fce6714ae7c53eee2354c0b477d26d62
-
SHA1
0a2ea1fed8387ec2bb074e0ebb88052a8396ad56
-
SHA256
199b81b4be4313d12a38102b5572728eb63c4a13fec35e1192bd7f92ec5828bc
-
SHA512
00c68e8a84bac416fca7aebaa49e4458a30dc409dc19e48c4e32cf69b63adb1332b08bad4a00b85dd7e1edbbaab52b75feb545f11439109558e4e9ca74a6d896
-
SSDEEP
12288:zDCPENnBV5jaHBoFvZstQW012B04Ngjw5qu8jxTQlDrLOM:zEEZBV5jCoFvZsSWG2BdN+w2+O
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
Processes:
3men.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "3" 3men.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
j29oAE.exewauavu.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" j29oAE.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wauavu.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
j29oAE.exefce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation j29oAE.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe -
Executes dropped EXE 12 IoCs
Processes:
j29oAE.exe2men.exe2men.exe2men.exewauavu.exe2men.exe2men.exe2men.exe3men.exe3men.exeFA49.tmp3men.exepid process 2100 j29oAE.exe 656 2men.exe 5104 2men.exe 2520 2men.exe 2372 wauavu.exe 3512 2men.exe 1688 2men.exe 2040 2men.exe 1092 3men.exe 1916 3men.exe 1604 FA49.tmp 5344 3men.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/5104-42-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/2520-45-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/5104-46-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/2520-50-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/5104-49-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/2520-52-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2520-53-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3512-61-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/3512-65-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/1688-64-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/3512-69-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/1688-70-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/1688-71-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/5104-76-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/1092-87-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3512-90-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/1688-91-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral2/memory/1092-92-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1092-114-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1092-115-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1916-169-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/1092-308-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/5344-313-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 45 IoCs
Processes:
wauavu.exe3men.exej29oAE.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /g" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /P" wauavu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\969.exe = "C:\\Program Files (x86)\\LP\\4836\\969.exe" 3men.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /S" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /p" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /g" j29oAE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /G" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /R" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /Y" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /Q" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /b" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /a" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /V" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /E" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /e" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /n" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /U" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /h" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /W" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /l" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /I" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /i" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /c" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /K" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /D" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /T" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /o" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /j" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /O" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /B" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /t" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /q" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /s" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /L" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /X" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /A" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /v" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /y" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /k" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /w" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /M" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /x" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /Z" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /C" wauavu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wauavu = "C:\\Users\\Admin\\wauavu.exe /N" wauavu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
explorer.exeexplorer.exeexplorer.exedescription ioc process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
2men.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2men.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2men.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
2men.exedescription pid process target process PID 656 set thread context of 5104 656 2men.exe 2men.exe PID 656 set thread context of 2520 656 2men.exe 2men.exe PID 656 set thread context of 3512 656 2men.exe 2men.exe PID 656 set thread context of 1688 656 2men.exe 2men.exe PID 656 set thread context of 2040 656 2men.exe 2men.exe -
Drops file in Program Files directory 3 IoCs
Processes:
3men.exedescription ioc process File created C:\Program Files (x86)\LP\4836\969.exe 3men.exe File opened for modification C:\Program Files (x86)\LP\4836\FA49.tmp 3men.exe File opened for modification C:\Program Files (x86)\LP\4836\969.exe 3men.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4944 2040 WerFault.exe 2men.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
explorer.exeexplorer.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 3668 tasklist.exe 5020 tasklist.exe -
Modifies registry class 33 IoCs
Processes:
explorer.exeStartMenuExperienceHost.exeexplorer.exeexplorer.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{48FB56D1-A571-4B05-92AA-58B84D063101} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{BD9FB16D-17F4-48C1-8D40-99F412B9245D} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{AD2E708C-C2EB-4D40-BB2B-1B42A3ADCB40} explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
j29oAE.exe2men.exe2men.exewauavu.exe3men.exepid process 2100 j29oAE.exe 2100 j29oAE.exe 2100 j29oAE.exe 2100 j29oAE.exe 2520 2men.exe 2520 2men.exe 3512 2men.exe 3512 2men.exe 2372 wauavu.exe 2372 wauavu.exe 2520 2men.exe 2520 2men.exe 2372 wauavu.exe 2372 wauavu.exe 3512 2men.exe 3512 2men.exe 2372 wauavu.exe 2372 wauavu.exe 2372 wauavu.exe 2372 wauavu.exe 2520 2men.exe 2520 2men.exe 2372 wauavu.exe 2372 wauavu.exe 2520 2men.exe 2520 2men.exe 2520 2men.exe 2520 2men.exe 2372 wauavu.exe 2372 wauavu.exe 2372 wauavu.exe 2372 wauavu.exe 2372 wauavu.exe 2372 wauavu.exe 2520 2men.exe 2520 2men.exe 2372 wauavu.exe 2372 wauavu.exe 2520 2men.exe 2520 2men.exe 2372 wauavu.exe 2372 wauavu.exe 2520 2men.exe 2520 2men.exe 2372 wauavu.exe 2372 wauavu.exe 2372 wauavu.exe 2372 wauavu.exe 2520 2men.exe 2520 2men.exe 2372 wauavu.exe 2372 wauavu.exe 2520 2men.exe 2520 2men.exe 1092 3men.exe 1092 3men.exe 1092 3men.exe 1092 3men.exe 1092 3men.exe 1092 3men.exe 1092 3men.exe 1092 3men.exe 1092 3men.exe 1092 3men.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
tasklist.exetasklist.exemsiexec.exeexplorer.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3668 tasklist.exe Token: SeDebugPrivilege 5020 tasklist.exe Token: SeSecurityPrivilege 2200 msiexec.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4676 explorer.exe Token: SeCreatePagefilePrivilege 4676 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe Token: SeCreatePagefilePrivilege 4980 explorer.exe Token: SeShutdownPrivilege 4980 explorer.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exepid process 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe -
Suspicious use of SendNotifyMessage 33 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exepid process 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4676 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 4980 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe 5668 explorer.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exej29oAE.exe2men.exe2men.exewauavu.exe2men.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exeStartMenuExperienceHost.exepid process 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2100 j29oAE.exe 656 2men.exe 5104 2men.exe 2372 wauavu.exe 1688 2men.exe 3668 StartMenuExperienceHost.exe 5312 StartMenuExperienceHost.exe 5996 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe2men.exej29oAE.execmd.exewauavu.exedescription pid process target process PID 2828 wrote to memory of 2100 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe j29oAE.exe PID 2828 wrote to memory of 2100 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe j29oAE.exe PID 2828 wrote to memory of 2100 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe j29oAE.exe PID 2828 wrote to memory of 656 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2men.exe PID 2828 wrote to memory of 656 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2men.exe PID 2828 wrote to memory of 656 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 2men.exe PID 656 wrote to memory of 5104 656 2men.exe 2men.exe PID 656 wrote to memory of 5104 656 2men.exe 2men.exe PID 656 wrote to memory of 5104 656 2men.exe 2men.exe PID 656 wrote to memory of 5104 656 2men.exe 2men.exe PID 656 wrote to memory of 5104 656 2men.exe 2men.exe PID 656 wrote to memory of 5104 656 2men.exe 2men.exe PID 656 wrote to memory of 5104 656 2men.exe 2men.exe PID 656 wrote to memory of 5104 656 2men.exe 2men.exe PID 656 wrote to memory of 2520 656 2men.exe 2men.exe PID 656 wrote to memory of 2520 656 2men.exe 2men.exe PID 656 wrote to memory of 2520 656 2men.exe 2men.exe PID 656 wrote to memory of 2520 656 2men.exe 2men.exe PID 656 wrote to memory of 2520 656 2men.exe 2men.exe PID 656 wrote to memory of 2520 656 2men.exe 2men.exe PID 656 wrote to memory of 2520 656 2men.exe 2men.exe PID 656 wrote to memory of 2520 656 2men.exe 2men.exe PID 2100 wrote to memory of 2372 2100 j29oAE.exe wauavu.exe PID 2100 wrote to memory of 2372 2100 j29oAE.exe wauavu.exe PID 2100 wrote to memory of 2372 2100 j29oAE.exe wauavu.exe PID 656 wrote to memory of 3512 656 2men.exe 2men.exe PID 656 wrote to memory of 3512 656 2men.exe 2men.exe PID 656 wrote to memory of 3512 656 2men.exe 2men.exe PID 656 wrote to memory of 3512 656 2men.exe 2men.exe PID 656 wrote to memory of 3512 656 2men.exe 2men.exe PID 656 wrote to memory of 3512 656 2men.exe 2men.exe PID 656 wrote to memory of 3512 656 2men.exe 2men.exe PID 656 wrote to memory of 3512 656 2men.exe 2men.exe PID 656 wrote to memory of 1688 656 2men.exe 2men.exe PID 656 wrote to memory of 1688 656 2men.exe 2men.exe PID 656 wrote to memory of 1688 656 2men.exe 2men.exe PID 656 wrote to memory of 1688 656 2men.exe 2men.exe PID 656 wrote to memory of 1688 656 2men.exe 2men.exe PID 656 wrote to memory of 1688 656 2men.exe 2men.exe PID 656 wrote to memory of 1688 656 2men.exe 2men.exe PID 2100 wrote to memory of 1240 2100 j29oAE.exe cmd.exe PID 2100 wrote to memory of 1240 2100 j29oAE.exe cmd.exe PID 2100 wrote to memory of 1240 2100 j29oAE.exe cmd.exe PID 656 wrote to memory of 1688 656 2men.exe 2men.exe PID 656 wrote to memory of 2040 656 2men.exe 2men.exe PID 656 wrote to memory of 2040 656 2men.exe 2men.exe PID 656 wrote to memory of 2040 656 2men.exe 2men.exe PID 656 wrote to memory of 2040 656 2men.exe 2men.exe PID 1240 wrote to memory of 3668 1240 cmd.exe tasklist.exe PID 1240 wrote to memory of 3668 1240 cmd.exe tasklist.exe PID 1240 wrote to memory of 3668 1240 cmd.exe tasklist.exe PID 2372 wrote to memory of 3668 2372 wauavu.exe tasklist.exe PID 2372 wrote to memory of 3668 2372 wauavu.exe tasklist.exe PID 2372 wrote to memory of 3668 2372 wauavu.exe tasklist.exe PID 2372 wrote to memory of 3668 2372 wauavu.exe tasklist.exe PID 2828 wrote to memory of 1092 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 3men.exe PID 2828 wrote to memory of 1092 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 3men.exe PID 2828 wrote to memory of 1092 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe 3men.exe PID 2372 wrote to memory of 3668 2372 wauavu.exe tasklist.exe PID 2372 wrote to memory of 3668 2372 wauavu.exe tasklist.exe PID 2372 wrote to memory of 3668 2372 wauavu.exe tasklist.exe PID 2372 wrote to memory of 3668 2372 wauavu.exe tasklist.exe PID 2828 wrote to memory of 2744 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe cmd.exe PID 2828 wrote to memory of 2744 2828 fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe cmd.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
3men.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3men.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 3men.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\j29oAE.exeC:\Users\Admin\j29oAE.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\wauavu.exe"C:\Users\Admin\wauavu.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del j29oAE.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
-
-
C:\Users\Admin\2men.exeC:\Users\Admin\2men.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
C:\Users\Admin\2men.exe"C:\Users\Admin\2men.exe"3⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 804⤵
- Program crash
PID:4944
-
-
-
-
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe2⤵
- Modifies security service
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1092 -
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe startC:\Users\Admin\AppData\Roaming\64329\38648.exe%C:\Users\Admin\AppData\Roaming\643293⤵
- Executes dropped EXE
PID:1916
-
-
C:\Program Files (x86)\LP\4836\FA49.tmp"C:\Program Files (x86)\LP\4836\FA49.tmp"3⤵
- Executes dropped EXE
PID:1604
-
-
C:\Users\Admin\3men.exeC:\Users\Admin\3men.exe startC:\Program Files (x86)\2929F\lvvm.exe%C:\Program Files (x86)\2929F3⤵
- Executes dropped EXE
PID:5344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del fce6714ae7c53eee2354c0b477d26d62_JaffaCakes118.exe2⤵PID:2744
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2040 -ip 20401⤵PID:4472
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3932 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:2232
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4676
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3668
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4980
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5312
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5668
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5996
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:548
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4756
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1260
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1344
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:4656
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:2168
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:824
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5268
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5380
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:5820
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3396
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3104
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:6036
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:5456
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56b9ed8570a1857126c8bf99e0663926c
SHA194e08d8a0be09be35f37a9b17ec2130febfa2074
SHA256888e4e571a6f78ee81d94ab56bd033d413f9160f1089073176b03c91878aae2d
SHA51223211a1b71f1d05ad7f003231da826220ac4940e48071135cc3fba14708123fa0292e2e71c294a8086d8dc5f90dd32c4da3b41e6857c56f38cb325d78cb14880
-
Filesize
132KB
MD5945a713b037b50442ec5d18d3dc0d55e
SHA12c8881b327a79fafcce27479b78f05487d93c802
SHA2562da470571a64bcdeb56f62c916ee2bffa87ccc6c028b7c8cb0132d09bceedd2f
SHA5120eab4bb5d04725cc20e463ae6959f71064674602f8ee7b3c9b2db75e928b9a0b1bdc94233dc261f6277d02e54a443b42a59b12aaebb8bbf243f0940344fbf385
-
Filesize
271KB
MD50d668203e24463de2bf228f00443b7bc
SHA1eacff981d71f6648f6315e508bfd75e11683dba8
SHA256509d530e99839d7dbc8fccac163420d9dc455fb478fa57fdec1b7a2ef629d7bc
SHA5123251bb1341bd466e71468d72723bd5cf545dbd232327f343b44c51daae8755ed3caa02f74adbb0304912769346fa90dfa4c7036c211836e5650bdb06993ba803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize471B
MD5f3945b57f0f3c105bd40af2901e4822a
SHA193dabbe9a560f3d59ad8ce8d5dc941909fe21ec1
SHA25660ede5fc5d4e90f27afe2e8c8a14ebb0cf75df70ad29f8524f4b748a04203d39
SHA512212a88efd8a79e9b20aa86c83cb3f05e093a9233e4eb7e2d1064c599c8bbb5085b8ef45433d4d6266f80604af3d1e0a29dbbfbe124c5e18710ddb76b1ad2de0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
Filesize412B
MD55ab2d8bd8460ccf6e0de17d31b5822c6
SHA177586c084f96435f630a3b0bb142eeadb2986920
SHA25637cb519a1891e7eded77ea2ada0158043389ac2a9bb042f4f331d47873d7e53f
SHA512f6ca8b11314cd30fa3579a56cc2f1cd7c7268cbe7b1beaf94babed0629b84176ab2b944536c89957b742e964b9064d55eca7fca223867933746c10a3dc11f129
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
Filesize2KB
MD558e51525c8fb5997f07c58cf062c2e09
SHA1c30ba7e3e24aadee5b24bb85ddfdbcdb4d411ca0
SHA2563124909f18c9af5e802a6da11b71a67aaac1df292529c952dd02b89df9fd92d4
SHA512a0e93c6c7dd862adafd6538ef38550b5e9012e415c6750ef90ac6a8d5901ca0cc01e04bbf1572605cb9c7310214f19df01c5967d62707a674a819ebe0900ebf9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\5MIHM5LV\microsoft.windows[1].xml
Filesize96B
MD584209e171da10686915fe7efcd51552d
SHA16bf96e86a533a68eba4d703833de374e18ce6113
SHA25604d6050009ea3c99cc718ad1c07c5d15268b459fcfb63fcb990bc9761738907b
SHA51248d2524000911cfb68ef866dedac78ee430d79aa3f4b68399f645dc2066841e6962e11a3362cbcec46680357dcd3e58cfef9994450fed1d8af04df44f76b0dfd
-
Filesize
600B
MD5c6893113ea26c917461e80d17d7804ec
SHA1b7aef5690d8bc45af212e70bddfd604160cf486c
SHA2561d9ed71befd416a827d144f899f846af7c51c4b17cde92c0e98b6095fbde5439
SHA512a208cb3de2186e99dd954b5d6415b6bc7eb3dffed4ff3688312d785fd3a61753243d9c54537a9c48853087f494aeb7d984fe855097e598960de18e6bcd0489ae
-
Filesize
1KB
MD551c1655c4996ebad4d170f1c00a7339e
SHA17aa3dc8fff9b41ead6398979191eb608bdd637cf
SHA2560aaa670a5ed1f7cee3237472af43e3d30a49bd663f1df09b29a9acb62f89b7b6
SHA512a938cbe069855d778cfbe316b18336da70a3f474d953a56caad31c585f279f05d1e02c47afc20b9ea1689ee8dfefe9afc58d4c57619099dddefe48725a37f6d3
-
Filesize
1KB
MD5e4965163de90b0f912eb41497430cf0b
SHA11232bba8312c698b9e77585213d58064567451da
SHA256927f91ee5f9c200da964b686b5c020caf4c7ec380342ae4728fe6efa09032e6b
SHA512f00851549e23364420a215df9b340f0893a9856cd1ac8712c5bd52477b7e1e0e19f5cdb00a38e77f98acbfe1a87526375d355189bfccde7b3fad4a9ea10c1cb1
-
Filesize
176KB
MD5c4a634088e095eab98183984bb7252d8
SHA1c205f2c1f8040c9205c6c06accd75c0396c59781
SHA256db345985313397a39cc2817134315c8db71ab4c48680e62c0358db406b0eff6a
SHA512b6a30f6d5cc30bee9b9d483629f16c80c5338360cec629f9ee2a3307b73b9743fd71396e408ac72008b84f4b8fded26002c910421853253b52b8b4d530df7a8e
-
Filesize
176KB
MD5ea16870bdf94f89cfddd2ec17ffcd338
SHA1577142c9f0012f0ea2a9e2b93d7ebea4d3a60f20
SHA2568bfcf0164375ab80e6689297ad42ec591b6b1557a89a512d7399520d0239ca8f
SHA51269f7ebf81136985573a0338ae1de309995d0eb9dd3637176038c2e16c25e5e8fbed42ca35bd813b54157f54bc12db7ea92db7575ad1220aeb14147c86f01a2da