Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    99s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 12:40

General

  • Target

    088fb015b5add247137b27e402d61441_JaffaCakes118.exe

  • Size

    250KB

  • MD5

    088fb015b5add247137b27e402d61441

  • SHA1

    3536172939a18651a1f85ac6e1dc42638f0136d0

  • SHA256

    99d8b77ef4a32159a8581cb99b234b2952f9e7d0f6ea2018524b4ca47a2c8d4d

  • SHA512

    e2a15131e4aaf8251852d9dfddc71918702f15ae4d320182be122f5ac2dad2a9f239db93a588cfc95dfe2dcc073932c5020bce27f37fb4460b4d018e2ef9b49c

  • SSDEEP

    6144:ghieuJDr5T8b2ufqBLjSB/MS7irtIa6cwoD8ZroSfjGFA:heKrJJuf86AYcwoaoSbr

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 13 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 26 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 2 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\088fb015b5add247137b27e402d61441_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\088fb015b5add247137b27e402d61441_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5088
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files\WinRAR\winrar.jse"
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.go2000.com/?g8
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1184
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3660
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ping -n 4 127.1>nul &del /q "C:\Users\Admin\AppData\Local\Temp\088fb015b5add247137b27e402d61441_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 4 127.1
        3⤵
        • Runs ping.exe
        PID:3656
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1376
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
    1⤵
      PID:2016
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4652
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3804
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4920
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
      1⤵
        PID:2584
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3424
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2688
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1856
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:1080
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4052
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2036
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:632
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4440
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4488
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:4192
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4644
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3228
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3736
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1840
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:2880
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3860
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4984
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2720
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4260
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3452
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2036
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4580
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1608
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2628
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:1704
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4496
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:2140
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:4664
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3676
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:3884
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:4000
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:1568
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:3644
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:4204
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:4016
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:1196
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:2332
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:1976
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:2304
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:3556
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:4392
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:3200
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:1408
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:3720
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:4452

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Program Files\WinRAR\winrar.jse

                                            Filesize

                                            11KB

                                            MD5

                                            9208c38b58c7c7114f3149591580b980

                                            SHA1

                                            8154bdee622a386894636b7db046744724c3fc2b

                                            SHA256

                                            cb1b908e509020904b05dc6e4ec17d877d394eb60f6ec0d993ceba5839913a0c

                                            SHA512

                                            a421c6afa6d25185ec52a8218bddf84537407fd2f6cabe38c1be814d97920cfff693a48b4f48eb30c98437cbbb8ad30ccd28c3b4b7c24379ef36ac361ddfdbf1

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                            Filesize

                                            2KB

                                            MD5

                                            77af9982e9572df9511be90c4ee80d70

                                            SHA1

                                            e15739b79273f9e36a2c5e8c611ba7ddbfa34475

                                            SHA256

                                            bfc1ce97fc7010b72f187495b2d051bbfffe6a51958f081da82b0969c9b24b76

                                            SHA512

                                            644d67e0df1e838f824ee8f9be239ed46ef027a17ca262baa2ed2d586dd1a8c0f1984c55b8a3394938b1344fb4478d72d5b4ccfe45306e4d61d13120d4d9efe4

                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133637064624524733.txt

                                            Filesize

                                            75KB

                                            MD5

                                            79ea60e4feeffe4483ba2d0ea61852fb

                                            SHA1

                                            7d5921a1b6240cc717ad4f4478bbcfc42f3af8e8

                                            SHA256

                                            1e85f6cd486b20682b1a6af9f34e7993a558f3b5dccd1e80a55178847e794923

                                            SHA512

                                            4d0866c2b63af9570fa20bca628a6e67b3704d7ab5a8a1311fb614f38b54444cc6630390092282f075751cae38000a17e4bf1cb992a8900b0c72965c0b24dbf4

                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\WUYU8Y5R\microsoft.windows[1].xml

                                            Filesize

                                            97B

                                            MD5

                                            1b4430f8816838751064e481b2671dca

                                            SHA1

                                            bf5bb7eb34faac1bac77262c8a7f3662981deea7

                                            SHA256

                                            1b12191f1bd84731c07f1493d0553255d66f7095a8cd896aec920cc2213db6c4

                                            SHA512

                                            bdd215c6eee00376623f2e0fafef0b7e58682352f0f0a63b854ddf25a5ad02703d306fb4acd352a7d2dee5d1f311e930f19d7a67bd36f451e101ce9d6f660bba

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.mmc

                                            Filesize

                                            255B

                                            MD5

                                            a0c4d2f989198272c1e2593e65c9c6cb

                                            SHA1

                                            0fa5cf2c05483bb89b611e0de9db674e9d53389c

                                            SHA256

                                            f3170aeec265cc49ff0f5dcb7ed7897371b0f7d1321f823f53b9b0e3a30e1d23

                                            SHA512

                                            209798b5b153283bea29974c1433fe8b6c14f2a54e57237d021ecc1013b8dc6931dedcc2fe173d121c719901045fdf2215177ba164c05d703f2e88a196252ec4

                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.mmc

                                            Filesize

                                            149B

                                            MD5

                                            b0ad7e59754e8d953129437b08846b5f

                                            SHA1

                                            9ed0ae9bc497b3aa65aed2130d068c4c1c70d87a

                                            SHA256

                                            cf80455e97e3fede569ea275fa701c0f185eeba64f695286647afe56d29e2c37

                                            SHA512

                                            53e6ce64ad4e9f5696de92a32f65d06dbd459fd12256481706d7e6d677a14c15238e5351f97d2eb7bfb129a0d39f2603c4d14305a86821ed56e9face0bc252b6

                                          • C:\Users\Admin\Desktop\MICROSOFT EDGE.mmc

                                            Filesize

                                            252B

                                            MD5

                                            0b7d6914496973c48637995715d6f0d4

                                            SHA1

                                            9ac88bd5741ea9825e77511ddd35ad454f05bb99

                                            SHA256

                                            9d008d6bf529b562faba50a822eba33df5162e98265362cd23fdf5edfa65a5c8

                                            SHA512

                                            ed15ee3776c0eccc4020e006413ecdcdb13ee796376775e2a7fe9d0d7238b6e7633c665f4a78fa3427d9d6bf4309b35876297db2872c26ba0a945dcfc3faf85a

                                          • C:\Users\Public\Desktop\ACROBAT READER DC.mmc

                                            Filesize

                                            268B

                                            MD5

                                            57b00ccb3a351d6e45df0c5865020169

                                            SHA1

                                            c932af20d06642b4f2f0cb839cded241a90ace3d

                                            SHA256

                                            44771198c83ab0ed544795e6d1141330bc8f62129296e13218ef8422a9eab0d5

                                            SHA512

                                            334bf991e5d942a9e7f428948a93863fcacf1280518e5d1992ce36de0e2b3805195e6eadb1fbb70b6c45b371be9a7245c844231eff7c93a8f9b06b0e30d0f529

                                          • C:\Users\Public\Desktop\FIREFOX.mmc

                                            Filesize

                                            212B

                                            MD5

                                            e738deb26be0ae6ee9ea74b117af48dc

                                            SHA1

                                            44905d91300e06cc6b293dcc5bd6688d9243495b

                                            SHA256

                                            363989f254555ef8fb96df9010ca31c6e2035b10af004aeec341fc2ec26d117d

                                            SHA512

                                            12ee06669dddb6bf1f2da6f4be7beb93e17bd9e8480c119cab1ff4c011ee97680d4de7bd8bef68a0426948b2ffb421c32445387c5ed60f1d140e9ff66f96e867

                                          • C:\Users\Public\Desktop\GOOGLE CHROME.mmc

                                            Filesize

                                            250B

                                            MD5

                                            7dde836318d7cdbeef35f3d06a6d7b6d

                                            SHA1

                                            b26b884a2bd94a432a6e1da3acc5a99dc06c1d42

                                            SHA256

                                            951ba6b01bca3f14eabf9a657497bd172a073984e5a07a6bb39fe4ec8622aaa8

                                            SHA512

                                            74e3154552e693338f587e77a1f01762762406f8a782438ca9041888fb529dec7682692636f1dbd5255cd0922149a3b47c1cad0b3cd782f7f38497526fd945e6

                                          • C:\Users\Public\Desktop\Internet Explorer.mmc

                                            Filesize

                                            218B

                                            MD5

                                            4b9f175d36f729bc91274a478a80f85c

                                            SHA1

                                            7bd79be7dc7fcbe207f16c2aa3fab022a70e7809

                                            SHA256

                                            6533906583c1f768d716d7e9b101d35d1198d9c32a06d882aa626b2e4a51ee02

                                            SHA512

                                            e6ae4ff1cf1ab92cd649ceeda9c59794d8bfd1ca4500f672425d4a74aa48a0e938120d2444a2250513437da04767ff5883e81c7fa5dfa7e71b97bb967c0d5874

                                          • C:\Users\Public\Desktop\VLC MEDIA PLAYER.mmc

                                            Filesize

                                            198B

                                            MD5

                                            05a9ce26830a5d720143fff0263529be

                                            SHA1

                                            1b726387ca0cd48235aa0c72b95a56ba9d43c85e

                                            SHA256

                                            d15d32a3cc4c32b19be8951fd62ccf2fd9e8d40691dee12899a715f0aff298f2

                                            SHA512

                                            89c4fea31b80b5b3e413136c20d3edf81c9c6ecb3725c6025fa3bf7ce505aeec9bb3d269179942db5574dd152808e1d36c58604b093ed74a25049f1b4d98f58f

                                          • memory/632-377-0x0000000004710000-0x0000000004711000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1080-229-0x0000000004510000-0x0000000004511000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1568-1126-0x0000000004440000-0x0000000004441000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1840-541-0x000001C376130000-0x000001C376150000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/1840-554-0x000001C376940000-0x000001C376960000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/1840-532-0x000001C376170000-0x000001C376190000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/1840-528-0x000001C375420000-0x000001C375520000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/1840-527-0x000001C375420000-0x000001C375520000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2036-236-0x00000277E2670000-0x00000277E2690000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2036-248-0x00000277E2630000-0x00000277E2650000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2036-260-0x00000277E2C40000-0x00000277E2C60000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2036-231-0x00000277E1720000-0x00000277E1820000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2140-974-0x00000000046A0000-0x00000000046A1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2304-1295-0x0000022993880000-0x00000229938A0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2304-1308-0x0000022993EA0000-0x0000022993EC0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2304-1282-0x00000229938C0000-0x00000229938E0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2304-1277-0x0000022992960000-0x0000022992A60000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2332-1276-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2628-825-0x0000017F4E100000-0x0000017F4E200000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/2628-830-0x0000017F4F3D0000-0x0000017F4F3F0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2628-841-0x0000017F4F390000-0x0000017F4F3B0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2628-862-0x0000017F4F7A0000-0x0000017F4F7C0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/2688-66-0x0000000004C50000-0x0000000004C51000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3200-1426-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3228-526-0x0000000004D80000-0x0000000004D81000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3676-976-0x000001C0A7400000-0x000001C0A7500000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/3676-993-0x000001C0A8500000-0x000001C0A8520000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/3676-1005-0x000001C0A8900000-0x000001C0A8920000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/3676-978-0x000001C0A7400000-0x000001C0A7500000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/3676-981-0x000001C0A8540000-0x000001C0A8560000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/3676-977-0x000001C0A7400000-0x000001C0A7500000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/3720-1428-0x000001449C420000-0x000001449C520000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/3720-1429-0x000001449C420000-0x000001449C520000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/4204-1128-0x000001B24B900000-0x000001B24BA00000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/4204-1151-0x000001B24CDE0000-0x000001B24CE00000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4204-1132-0x000001B24CA20000-0x000001B24CA40000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4204-1140-0x000001B24C5D0000-0x000001B24C5F0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4260-674-0x0000025C16700000-0x0000025C16800000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/4260-691-0x0000025C17800000-0x0000025C17820000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4260-702-0x0000025C17C00000-0x0000025C17C20000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4260-679-0x0000025C17840000-0x0000025C17860000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4488-381-0x0000021135B00000-0x0000021135C00000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/4488-379-0x0000021135B00000-0x0000021135C00000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/4488-416-0x0000021136FF0000-0x0000021137010000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4488-393-0x00000211369E0000-0x0000021136A00000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4488-384-0x0000021136C20000-0x0000021136C40000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4488-380-0x0000021135B00000-0x0000021135C00000-memory.dmp

                                            Filesize

                                            1024KB

                                          • memory/4580-824-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4652-86-0x000001F629B50000-0x000001F629B70000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4652-72-0x000001F629B90000-0x000001F629BB0000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4652-103-0x000001F629F60000-0x000001F629F80000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/4984-673-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5088-38-0x0000000000400000-0x00000000004B1000-memory.dmp

                                            Filesize

                                            708KB

                                          • memory/5088-0-0x0000000000400000-0x00000000004B1000-memory.dmp

                                            Filesize

                                            708KB