Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 14:19

General

  • Target

    af8f1ed7971134be7e98c6640e6b63ff_JaffaCakes118.exe

  • Size

    148KB

  • MD5

    af8f1ed7971134be7e98c6640e6b63ff

  • SHA1

    76dcd79694d924bc1c3b580059326cfa098f15af

  • SHA256

    613364d7d06754a835b6f034b7a3bf20a8a805dfd55e1542ef66de72cf4414a5

  • SHA512

    c0f2c889352fa61891c97673dfd2119f0d54ccadede7869bdb3fa98b2a418137ee081252eb9ed899346b9175a4ab4cee078c3eb709287d50c980739d3beaa035

  • SSDEEP

    3072:yziUjE5x5q4QmiqKxXn/Yg1MxpQAStrvGfmdV:yziUjE32/YgKKntzGU

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 62 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs .reg file with regedit 8 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af8f1ed7971134be7e98c6640e6b63ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\af8f1ed7971134be7e98c6640e6b63ff_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\52r8bcO52Stn52y.exe.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:208
      • C:\Users\Admin\AppData\Local\Temp\52r8bcO52Stn52y.exe
        "C:\Users\Admin\AppData\Local\Temp\52r8bcO52Stn52y.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4444
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Windows\20240820\52r8bcO52Stn52yp\script\script.exe.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4704
          • C:\Windows\20240820\52r8bcO52Stn52yp\script\script.exe
            "C:\Windows\20240820\52r8bcO52Stn52yp\script\script.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1544
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Windows\20240820\52r8bcO52Stn52yp\script\Script.vbs.bat" "
              6⤵
              • Checks computer location settings
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1860
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Windows\20240820\52r8bcO52Stn52yp\script\script.vbs"
                7⤵
                • Checks computer location settings
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1876
                • C:\Windows\SysWOW64\attrib.exe
                  "C:\Windows\System32\attrib.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" +r +s
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Views/modifies file attributes
                  PID:4644
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r Administrators
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1324
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c Administrators:CI
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1020
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r Administrator
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3868
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r users
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3900
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r system
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3788
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r everyone
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4976
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r user
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4592
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r "Power Users"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4648
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\Internet Explorer.tt" /e /c /r "Admin"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1796
                • C:\Windows\SysWOW64\attrib.exe
                  "C:\Windows\System32\attrib.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" +r +s
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Views/modifies file attributes
                  PID:4720
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r Administrators
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1160
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c Administrators:CI
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4312
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r Administrator
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:968
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r users
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1588
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r system
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2516
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r everyone
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4740
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r user
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:440
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r "Power Users"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1540
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Explorer.css" /e /c /r "Admin"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3396
                • C:\Windows\SysWOW64\attrib.exe
                  "C:\Windows\System32\attrib.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" +r +s
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Views/modifies file attributes
                  PID:3948
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r Administrators
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4056
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c Administrators:CI
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2888
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r Administrator
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2696
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r users
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4332
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r system
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4880
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r everyone
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4520
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r user
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3648
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r "Power Users"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3588
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.css" /e /c /r "Admin"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3124
                • C:\Windows\SysWOW64\attrib.exe
                  "C:\Windows\System32\attrib.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" +r +s
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Views/modifies file attributes
                  PID:4320
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c /r Administrators
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3636
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c Administrators:CI
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1840
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c /r Administrator
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1652
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c /r users
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3540
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c /r system
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3236
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c /r everyone
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4328
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c /r user
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4840
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c /r "Power Users"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4404
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" "C:\Users\Public\Desktop\ÌØÉ«¹ºÎï.bt" /e /c /r "Admin"
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:4304
                • C:\Windows\SysWOW64\regedit.exe
                  "C:\Windows\System32\regedit.exe" /s C:\Windows\SetWindowsIndex.reg
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Modifies Internet Explorer start page
                  • Runs .reg file with regedit
                  PID:3716
                • C:\Windows\SysWOW64\regedit.exe
                  "C:\Windows\System32\regedit.exe" /s C:\Windows\MYShowIeLinkIe6.reg
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Runs .reg file with regedit
                  PID:1772
                • C:\Windows\SysWOW64\regedit.exe
                  "C:\Windows\System32\regedit.exe" /s C:\Windows\MyShowIeLinkIe7.reg
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Runs .reg file with regedit
                  PID:948
                • C:\Windows\SysWOW64\regedit.exe
                  "C:\Windows\System32\regedit.exe" /s C:\Windows\search.reg
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Runs .reg file with regedit
                  PID:2376
                • C:\Windows\SysWOW64\regedit.exe
                  "C:\Windows\System32\regedit.exe" /s C:\Windows\.reg
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Runs .reg file with regedit
                  PID:2040
                • C:\Windows\SysWOW64\regedit.exe
                  "C:\Windows\System32\regedit.exe" /s C:\Windows\AddRight.reg
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Runs .reg file with regedit
                  PID:1684
                • C:\Windows\SysWOW64\regedit.exe
                  "C:\Windows\System32\regedit.exe" /s C:\Windows\SetWindowsIndex.reg
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Modifies Internet Explorer start page
                  • Runs .reg file with regedit
                  PID:2312
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Windows\20240820\52r8bcO52Stn52yp\script\reg.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1680
              • C:\Windows\SysWOW64\xcopy.exe
                xcopy /c /q /y /i XlKankan.dll C:\Windows\system32
                7⤵
                • Drops file in System32 directory
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Enumerates system info in registry
                PID:3528
              • C:\Windows\SysWOW64\regedit.exe
                regedit /s regBHO.reg
                7⤵
                • Installs/modifies Browser Helper Object
                • System Location Discovery: System Language Discovery
                • Runs .reg file with regedit
                PID:4072
              • C:\Windows\SysWOW64\regsvr32.exe
                regsvr32 /s XlKankan.dll
                7⤵
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                PID:2932
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Windows\20240820\cg5t5ENH5DS8ejeL\smss.exe.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4408
          • C:\Windows\20240820\cg5t5ENH5DS8ejeL\smss.exe
            "C:\Windows\20240820\cg5t5ENH5DS8ejeL\smss.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:4828
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\52r8bcO52Stn52y.exe.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:428
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\af8f1ed7971134be7e98c6640e6b63ff_JaffaCakes118.exe.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:116
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe d3a6a43e9d3e65e07792d7217bbd45d0 DK5BnI690kuxO/ZChllkvQ.0.1.0.0.0
    1⤵
      PID:3948

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\52r8bcO52Stn52y.exe

            Filesize

            112KB

            MD5

            ea30f91149efa0bafdf3824e8909e1a6

            SHA1

            91bf1e48dd4a71d0ee7fb55584594d3f90eb86b6

            SHA256

            b90d8c4189c0d7d19981fc56b7981b813098a067ee29829653001af8dc93385f

            SHA512

            f6fec138773bd83867bf2c328bf9bb27be7d054fe4ab77f566c9fdede39f0257ccb15b6671ddda2ed80120a8021e87546c33dc1a96933c88631bb86aa81bfcf9

          • C:\Users\Admin\AppData\Local\Temp\52r8bcO52Stn52y.exe.bat

            Filesize

            207B

            MD5

            998aabbe1650cfa45b6138c13da1e032

            SHA1

            e01849298f6bbebf00c047b25b66d2c70f161f96

            SHA256

            157388ae5e9f5c22efb18bd059b1a22c6513238b32d504ebf7cba3eed9f5f487

            SHA512

            c9e915875f998bcca3ace768d4ee624fb39eebee24f02acba48b976d50ade306c3b59e379666da9e8b19dc258202b5480e26bb5eaf567230042e74f1502d0323

          • C:\Users\Admin\AppData\Local\Temp\52r8bcO52Stn52y.exe.bat

            Filesize

            329B

            MD5

            389d13287d7bd671668a7464be62c2d8

            SHA1

            65f5c1348965e5cb6587a5097318e27c679b9d71

            SHA256

            ee77126db5c60101d07d76e92e861be2ffc0432215d865177a7e5b3bf9d8b192

            SHA512

            e6de58e2ebff9c92327e23f4a1c9df7259711a8aba95894b9fa1a5bf528f3380dc788d5d447540e201ba4eba4ba037282b9ca0f6f93b732b4af42733ec418961

          • C:\Users\Admin\AppData\Local\Temp\af8f1ed7971134be7e98c6640e6b63ff_JaffaCakes118.exe.bat

            Filesize

            453B

            MD5

            4dcf723a02f172181e64ad6c1350c703

            SHA1

            edc3818956eaa556ed38d83dd93bb2119ce977bb

            SHA256

            1216b6e4bddc182954fae866ea0c4123f8bb50e88aac7220ef905c5baaae73ae

            SHA512

            fe7f3357d32d5b576429139d0a061b909ef34eb8e3ce184495b0b52099ecb31d12022706c994d0ce19d718290b08c37704e7a5c8ad276fc9c1f02c9285943e44

          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk

            Filesize

            2KB

            MD5

            0c1db04cd492b561d39dd4c92b9d15db

            SHA1

            937b1bb0495b7853579aa7c2a41290e3d2827fe7

            SHA256

            77ed0bf0f0f4ff2a2e42dcc6eba4cc41c46afc07cf3626db8eb33bd6afc6c3ea

            SHA512

            1bfda82014b2af40d19e342b00e46996fdc69616cea20b2fec9079ff8f7c5892be463b29c86fc82f35354f073af7a20e9bd9131d28510dfcf9462a613cff671d

          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk

            Filesize

            2KB

            MD5

            d32bd11ce0af30f490681949f89834ab

            SHA1

            048ac3f5f07a0aff7d27d5b9da077d0071923a58

            SHA256

            2da43dcd3c5161f1498fe79199e4e7d62c5128d89c9d7464fac807fd2cf42e76

            SHA512

            d57fb419b7967e17fa752fe09799f66551f8608fc4a26277b1e1feebb4d630ec48afae9d37dc2467839ca037dec204ec942d1fb050e3412280cf95147dd84946

          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Shows Desktop.lnk

            Filesize

            418B

            MD5

            8f48c6d76826e72128aacc7d20f41671

            SHA1

            a0e7d1c87de71916e5b7d3d07f0090d9dd82319e

            SHA256

            1738ed05ed5db19eda56e6fa9905a183310b42c0c628f7eddc94854291ce3be7

            SHA512

            82469d37093b96ced5aa6d42eef20d5736df0a2f15be4825c8e25b1a8f67b7f1c78875a1a10d4a06e6ae298eaf36f28da36da07c19b9fee4d277f066c3456898

          • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk

            Filesize

            400B

            MD5

            7d794977e64d0b35fc1efd56eab87b44

            SHA1

            eda0a4475c89743ad07118c12f6cf2c286537b84

            SHA256

            8ebaf28ec13b784392dfde40be32d87b5fa9ac86a94d7ecf8ed45ed26653b204

            SHA512

            2be588c5b9267b315c0f8a51bdd26d2dabb385ac1863125b8e454934a944b41764a56f84ab61a317c1899b0cec63b3c38ac4cf5b102b6cb7af4e09bcde4ddf63

          • C:\Users\Public\Desktop\Internet Explorer.tt

            Filesize

            8B

            MD5

            e51f9cdcf7efb98e0859c9f85ce367e2

            SHA1

            02a5a939959597a5bbadc703fddff668aa98360d

            SHA256

            044775cb0f1e2b9162c192dcaea0ff0fa1be84bf7bb0e388c8190e237e861a33

            SHA512

            0f0028bb11ec79b02424d81891421eae8989faad76a82e8ac7a90bc2522ea97cc3ed163495827d0a4e80f0a0e97b0d7aacc877e070c7a921a948d8b9995ea026

          • C:\Windows\.reg

            Filesize

            1KB

            MD5

            75721cb2a7848c3df7b00faf4401b9c9

            SHA1

            cb4ad243b92b38739b970b98ef31d37ce3d0923d

            SHA256

            1fbdaf7773a0ad8e371f2ed40768c2e2e9b3f63436ac1e9f0066b5177913c84a

            SHA512

            4f1d9c2197be1bd4830cbd942293b614b8ba18956a9af749ac905fc9f17456dcb2962f6c93fa0fdf8209a56443e5799bbf96a491e4d6974cbaee018926045206

          • C:\Windows\20240820\52r8bcO52Stn52yp\script\Script.vbs.bat

            Filesize

            214B

            MD5

            49c56a29dffb206f3baad3ea6da9adaf

            SHA1

            211c5326bffbf4edd247246868829939b88f47b4

            SHA256

            b15e1d650a22ed68b873ab8f27c84fed4a5e616e1b4a8828de19eeda2229481f

            SHA512

            2e3b1c7367e20177986a477222cd6a16a8fee0b849eb1d483f25d0baf19ec0629e5fe892485bbff34466cfb31bfc052e5a80dc9fdb0d5216effa270d9994aa4f

          • C:\Windows\20240820\52r8bcO52Stn52yp\script\XlKankan.dll

            Filesize

            28KB

            MD5

            ce8f0033298014df0508a996b638b5eb

            SHA1

            610f52ba70f2053a9a4dba08d88a3f97243aa3d6

            SHA256

            9e9a8a9522ae2822ff0130a9d7736417d32a85c6c66c44048d8b2d2ec4677466

            SHA512

            216dcd79aa7bedd2e9c819978c2477787ce4b2a34f33c64881db21d1ebc96e0b44169d652c68bd4053bcb963a6b1c673d585e44feb6c30ef30121f0076ce3200

          • C:\Windows\20240820\52r8bcO52Stn52yp\script\reg.bat

            Filesize

            130B

            MD5

            d426a1646ddadd0e41ff5358eeceb3c4

            SHA1

            69e585d10ad1f4d03a4ceec7f4e336951e10406f

            SHA256

            86861d7856b53976d754875343237f55e63ca5580db3e57f6ffbbc86977ef573

            SHA512

            401c3aa8a1a426cb7c6fdfc0e0cd5da193abb8c44c17143996e57838060f22601c51fc3a3da915d0ac3a3f7a70a217fa9576c575bc9f5a30b542c9a5a206dd97

          • C:\Windows\20240820\52r8bcO52Stn52yp\script\regBHO.reg

            Filesize

            356B

            MD5

            b93db4ec7eba064cbd7336085953cce9

            SHA1

            79b458e4b5c974ce2361b103905a941eae0210b9

            SHA256

            2b6fb4f8615a821498deb27a55261d482fcf97a1dbe8143d233ee7d1b9b63dac

            SHA512

            420819a9aeeed54337aaabe2f4cf5f0f6b91cda6bacc5eae496320e2d22cc4eafccef7e38d4085d868ab28177889bcbf025f496c14b5df0384bc93ad14d591a6

          • C:\Windows\20240820\52r8bcO52Stn52yp\script\script.exe

            Filesize

            14KB

            MD5

            181b53fa7032009d1e571e60ce740cbb

            SHA1

            1c2958fd8d4894d1ce7ec23b97a45eeadb20722f

            SHA256

            37e91baf0e737219f49bb4beedead82572b7c9c0c1b3b1232b77e7a2e7c40da5

            SHA512

            c60b9a29df10f63e669fd90686ca104169c3a1318f22ff6148a9bb08a07c0b836c1dab92f6d7c2dc9edc50704f66f0bcd3de704a7a41e52c5ee566efcfb6dd62

          • C:\Windows\20240820\52r8bcO52Stn52yp\script\script.exe.bat

            Filesize

            210B

            MD5

            4f5328739c1b399b1f0c5d190169527b

            SHA1

            e2da1274eedad60a9c82891df5abbd63079ac2ee

            SHA256

            32871ddb28bdc36b5a9c680391109ca1606e3aeaf49aa263e2a4b60bea893e2b

            SHA512

            67fa54d8fb2ef4bbfa0c7f312f7354bdcf0db3113b7fd9c41ad7711c57936e02a67a81ab15cbbe342210d6ae4f649cc089f365f5908ec70464a05100948c83ff

          • C:\Windows\20240820\52r8bcO52Stn52yp\script\script.vbs

            Filesize

            74KB

            MD5

            9ecc1bef464dc50985e94bb61ea39481

            SHA1

            d322f77e54cc0e7111f4e894cb2bbe9e7afd0ff0

            SHA256

            b02a1d340606815f766afe59c6c7bd5e73b16954fa0c2f3489a00a49a5ab4f6a

            SHA512

            ae5bdd6aacb71e9b9b844d8a7fa01ac474c042d931d00cadfc6b51d1aa6346794a4fdb54aa844feed9b8024ac08de2958c7970f53d6bd816edf76c2916d5f2be

          • C:\Windows\20240820\cg5t5ENH5DS8ejeL\smss.exe

            Filesize

            16.1MB

            MD5

            c2311a7f7aefb4fda570e551ba425234

            SHA1

            012cec73b85afe127418a3f7b41b8a2a0e4f48cd

            SHA256

            9767a80808b593f6a4fae80af642247497b61ef079b86d093f1881b7f433a048

            SHA512

            3cb24f7d202f168cf7642c134288396f18e50c9f5ac9baf365511f144cd6e0a8de0968ec81a4102dfb934526c1cbe741eedb119ff2d575fe7934c2d28b156028

          • C:\Windows\20240820\cg5t5ENH5DS8ejeL\smss.exe.bat

            Filesize

            183B

            MD5

            5ad2620a55540d85b924c3553f17cb76

            SHA1

            28e5663fe2009b449a834ff2b9b06bd917974c10

            SHA256

            eca778de9c1cc3170c10d03ae0f0051e142bebda37d9836c42c64bbc7f29800e

            SHA512

            22efeb40b5ae3499161d40ddc3e813a57466c9f2766a41a059014e0aba334476efba3f20d9d2c0b5ae5cad38c9427b7b0dce2f1258a1d02d1f908fc4dedb172f

          • C:\Windows\AddRight.reg

            Filesize

            592B

            MD5

            53d75aea40be26a09d46f220accfb528

            SHA1

            82e1a094df1d4137697dfeb9f6b77b877d77ef8a

            SHA256

            a86cc1150a07bef8f91c426568651eae78be6af0ba06fc067014d6a9fb2c52c2

            SHA512

            1151e563503ef2841c8a052f0166565238fb86359ac4ded9939e77438e1efccc8d43d767e4dd59502dad4e0b38bf1bda7616254acbeb2b1ac07b2d30b0df3736

          • C:\Windows\MYShowIeLinkIe6.reg

            Filesize

            7KB

            MD5

            4f69fa82c34c91514da21a5933644af8

            SHA1

            e131f57f41ce95b46195d460852718b83517579a

            SHA256

            7cd8b741bfaee5cd14779b69d71b362aac4c928097c6b4af8ce0ce16bde52a46

            SHA512

            276588f960d28023febd87873c7852f401ab6ebfb3d90bf8b21b1998949d8ab00badb42d1a05934587aa6b4ad0ab06a3d649dcdb70f384ca70339049243463c4

          • C:\Windows\MyShowIeLinkIe7.reg

            Filesize

            9KB

            MD5

            dbd46bf2e72f6dfbb21295f4e3066d47

            SHA1

            cdd6ca2f6455c1e528c40a520bcdb8669df8f548

            SHA256

            71927f4f034db038385346e34209ad069139f54d73bae34bfaf4f29b7010fc6b

            SHA512

            ad013387a0c7608375b7a3c5fdb27f0d9e79b051d84b1ee9221346499f386d30473b5e2727f6a4e8a8122cf8ac2d473a5ce5e368e62da09441ed48e5c088bd11

          • C:\Windows\SetWindowsIndex.reg

            Filesize

            150B

            MD5

            3f7aefcd5bf4a3945fd249d8bd39201a

            SHA1

            51d9e7b51b6032e5dcb5cd3f74b15585160902db

            SHA256

            2d13c41a8992321c6be0cec7e4da3fa8cd4711ffa5d5478a98c7e23abb1c7b4c

            SHA512

            a62020ed8fe2343860935f3367d658a7f2e9f5cc63bd7d4186a8a42337f49e979a24db678ca9711d73933a4c5413d1caeb247c68cffa01e4cf1bd2de83894628

          • C:\Windows\search.reg

            Filesize

            1KB

            MD5

            8e2ec860bfbd9aa37ea44e51d559ea9b

            SHA1

            f64e2891ec34d4909f28b2ae14c0a9f712a0e29c

            SHA256

            ff8d92c2bbe81ccfa1a6ac46ac66e7b42dc4fd18a27924c2e6511d2579f092df

            SHA512

            ad551272a90d79aef258d22680c07a5d81b0b31e1712dc2a60ac2c67f8af13f18c3a5f99f8408231bc5bb4f68882a5d75ed5c0e203059575eea5940d8b841dc1

          • C:\Windows\userid.txt

            Filesize

            4B

            MD5

            24146db4eb48c718b84cae0a0799dcfc

            SHA1

            183723726a927563ad46963f2138cc147d04cea0

            SHA256

            582c0168ba17eac49642bc85ae623204069e8d6ea06cf45af11e7de46ea31d18

            SHA512

            cf1c23aa0a43423bb6a89b1a5f9c4cf3109eae58749c527553b07f56446b51ee6cc24dd6020932a33b9e7c5b84c7480b2c890070fa6b75b93d08f38d0c472eb4