Analysis

  • max time kernel
    55s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 13:35

General

  • Target

    a23b11d6d67d11e67b501ce879f635b5_JaffaCakes118.exe

  • Size

    273KB

  • MD5

    a23b11d6d67d11e67b501ce879f635b5

  • SHA1

    a9b50e4ba864f857c0d56b5b8fe58aab0a6e2c39

  • SHA256

    342869e56a5f0734ec6c62bf4c210f25ae5778af5ff5240f5d9c6aac557a8efc

  • SHA512

    8cca2ea4da6cb46889a7a5afee1f9c0e59ddfbedc82c62b5e27185349a190289b487c18f6261a13eadcc2a341751ae3d26fc8219e99772dbbb18ef2dcca118a5

  • SSDEEP

    6144:LhDcz4kXPGYi4lPL+mHnqri2KmfzhvKZs7UwQ:LhMOYlJqri2K4BX7

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 14 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a23b11d6d67d11e67b501ce879f635b5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a23b11d6d67d11e67b501ce879f635b5_JaffaCakes118.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2096
    • C:\Users\Admin\AppData\Local\Temp\a23b11d6d67d11e67b501ce879f635b5_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\a23b11d6d67d11e67b501ce879f635b5_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\E52F7\DD159.exe%C:\Users\Admin\AppData\Roaming\E52F7
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4412
    • C:\Program Files (x86)\LP\599E\3582.tmp
      "C:\Program Files (x86)\LP\599E\3582.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1528
    • C:\Users\Admin\AppData\Local\Temp\a23b11d6d67d11e67b501ce879f635b5_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\a23b11d6d67d11e67b501ce879f635b5_JaffaCakes118.exe startC:\Program Files (x86)\F7261\lvvm.exe%C:\Program Files (x86)\F7261
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1724
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2520
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1128
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2336
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3560
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3788
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1824
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2284
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2984
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:3116
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4616
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4936
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1256
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2712
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3828
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:1308
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3896
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3648
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    PID:4116
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
      PID:4204
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
        PID:3252
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:3404
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:2472
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:1432
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:3492
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:368
                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                  1⤵
                    PID:3500
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:4516
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3936
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:3964
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:2392
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:3164
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:3824
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:2956
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:4008
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:3648
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:3748
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:1488
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:4876
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:3520
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:3188
                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:676
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                    PID:3884
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                      PID:1712
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:3624
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:4516
                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                          1⤵
                                                            PID:4404
                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                            1⤵
                                                              PID:460
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:2864
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:4544
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:4260
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:3076
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                      1⤵
                                                                        PID:3784
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                        1⤵
                                                                          PID:340

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Program Files (x86)\LP\599E\3582.tmp

                                                                          Filesize

                                                                          96KB

                                                                          MD5

                                                                          d8bb0e5c476b7dc08477a9bc400cb63d

                                                                          SHA1

                                                                          5a93bc2964fc9468dfa4133bfc06c7e9b420a3e8

                                                                          SHA256

                                                                          ca246fbb09c97b0b90028f10a86f2428836e4d4efdc2465517167869952831f8

                                                                          SHA512

                                                                          f3d0436c61f4dc0b1f201d6f3902ca49b195e10789e855e3cab4c2dfeea2b1a7028b7263ae85fdffb69c855c1f01b96d85fd534ce234a1c3c064f1c940375b98

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                          Filesize

                                                                          471B

                                                                          MD5

                                                                          c11f57a10a32cfbfe1d3eceedf9fb723

                                                                          SHA1

                                                                          3ecad942dec46fab6204e7e5c9ed317c02597354

                                                                          SHA256

                                                                          df5b2289bc0e9f694918b68bf03a51e283e092b6a262821fe125d620ecf2d2f5

                                                                          SHA512

                                                                          2073dc57542661d7df6c8f2b4102024754898d779cd263c79ea67f37f53e3351f5d651eddba795eeeea8004508969ce7463a9574a46509767e5472e0484a5a4c

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                          Filesize

                                                                          412B

                                                                          MD5

                                                                          8a58de560030dedeae8ad84f9fe1a74a

                                                                          SHA1

                                                                          5f5e271c26f43395fe618e9607f58bc7e9b948e3

                                                                          SHA256

                                                                          f3d7430c0fc4f27ef827b61b884b48017e7e06a8155910a2a5972cddac2619d1

                                                                          SHA512

                                                                          aacaa586a15c16b72b4d435bca0d780145abb3e38a3d05fae19e84d8838e6246269ab5a340a19c98f83860e52831233e5d8dbd70c6509ffa47b953f92208d1c4

                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          0516d072b559288e33ce16c7be5b1ff9

                                                                          SHA1

                                                                          5cfcef43f6c6dfb337336e2e9a411215006f52b1

                                                                          SHA256

                                                                          f99c27c2d59f99761bd2a5ee6667da19bcd2eb537467da769583cae84fa66ad8

                                                                          SHA512

                                                                          7bacad64b1fac99f9bc86825dfba4f6ae1a9ef0031af3db04f753c0231af6d2507f4bb4a1e670885d4a2d75f9be7960fa091fa09d6673416d6efd09aeff9ef60

                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133771018488704626.txt

                                                                          Filesize

                                                                          75KB

                                                                          MD5

                                                                          947fbcf2061ecb288e6c96750251ca96

                                                                          SHA1

                                                                          0a8fc5180b7df65dc86164eba5c9cecebc59e3f3

                                                                          SHA256

                                                                          6511351664dd4667ab5ef103bbb81fac8adb45fdd4b1aeac24f86f193e30639a

                                                                          SHA512

                                                                          77921a117706cfcafa8e62cf5394537fd2a4b53e6943eecdf62b9b7e7f8a30980782d327c20d508269aec013199c6734caf4dd6a096590adc73634e531a1d55b

                                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\LLDJA3WI\microsoft.windows[1].xml

                                                                          Filesize

                                                                          97B

                                                                          MD5

                                                                          372706547a804b876522fe741dbfc040

                                                                          SHA1

                                                                          9bca733d6804f24c6841ef02b52e8ade1b45d7e4

                                                                          SHA256

                                                                          09fe1eb66c953d75dc66ff6df9237cde5f419fb25fab6327de9cde6676219651

                                                                          SHA512

                                                                          cc8057de048bf5646e41bed6f01111328bceae9abb4282a4ee1be635d086b6b3647cb5cc17cc3564980e5e31342a767dc639e536edbd3720df6b35ac7ebce34a

                                                                        • C:\Users\Admin\AppData\Roaming\E52F7\7261.52F

                                                                          Filesize

                                                                          600B

                                                                          MD5

                                                                          7ec5882cd80e4d8294d96237152a2f30

                                                                          SHA1

                                                                          e4627762d3d1391f49f54089f21e654f9ed56bc2

                                                                          SHA256

                                                                          8d922dc13df1347c18d3a576f441a4ff4c7b7052114b706330d5aff32ef9fffb

                                                                          SHA512

                                                                          d97b8e220a01adf623eb07575e9087660e9a6b1b5075be8d4b4560615037e9cbfcb4d372fdcfc0b153148ed9f3d7dbd1ebcba32e43b90db257a3cf895234d3e6

                                                                        • C:\Users\Admin\AppData\Roaming\E52F7\7261.52F

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          562f7e9c1c20c7d169aea4baa6b034b8

                                                                          SHA1

                                                                          dfa3e029730f16bd63132ae12a2dbe4b8b08d38c

                                                                          SHA256

                                                                          3ca05c835bf57268b4397091313b1fd0e1b59f05ed88f94f3b8389a8671902cf

                                                                          SHA512

                                                                          239577d6daab9e894c1526e876301ef2dad2891a621dc3890e26e3e121bf483d7580c7f364859f6e7c9fa523327bb351f1cee834da6075c069b59e7314c6c829

                                                                        • C:\Users\Admin\AppData\Roaming\E52F7\7261.52F

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          cc20d03760b4a7bdd04f4450cffacc08

                                                                          SHA1

                                                                          871fa59de880e8d7941789f3f20331ecd9210794

                                                                          SHA256

                                                                          07fcd995fabdc97cfd69cfc6aa363eee7e71d40a0093b890eadc7fbd9a868384

                                                                          SHA512

                                                                          acfacd9c4f25dad100bec907cdfabc08dc708cfca95c022940f80d244e32d1a83637e88431d6e59eca977b9fca0794b564ba28586bd087e00257013b99f207d4

                                                                        • memory/1256-497-0x00000000028B0000-0x00000000028B1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/1308-769-0x00000000041B0000-0x00000000041B1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/1432-1069-0x0000023084C00000-0x0000023084D00000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/1432-1087-0x0000023085990000-0x00000230859B0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/1432-1103-0x0000023085FA0000-0x0000023085FC0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/1432-1073-0x00000230859D0000-0x00000230859F0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/1432-1068-0x0000023084C00000-0x0000023084D00000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/1528-457-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                          Filesize

                                                                          108KB

                                                                        • memory/1528-350-0x0000000074D20000-0x0000000074D59000-memory.dmp

                                                                          Filesize

                                                                          228KB

                                                                        • memory/1528-458-0x0000000074D20000-0x0000000074D59000-memory.dmp

                                                                          Filesize

                                                                          228KB

                                                                        • memory/1724-492-0x0000000074D20000-0x0000000074D59000-memory.dmp

                                                                          Filesize

                                                                          228KB

                                                                        • memory/1724-494-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                          Filesize

                                                                          424KB

                                                                        • memory/1724-495-0x0000000074D20000-0x0000000074D59000-memory.dmp

                                                                          Filesize

                                                                          228KB

                                                                        • memory/1824-186-0x00000000040F0000-0x00000000040F1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2096-0-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                          Filesize

                                                                          424KB

                                                                        • memory/2096-1362-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                          Filesize

                                                                          424KB

                                                                        • memory/2096-1614-0x0000000074D20000-0x0000000074D59000-memory.dmp

                                                                          Filesize

                                                                          228KB

                                                                        • memory/2096-15-0x0000000000400000-0x0000000000467000-memory.dmp

                                                                          Filesize

                                                                          412KB

                                                                        • memory/2096-14-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                          Filesize

                                                                          424KB

                                                                        • memory/2096-4-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                          Filesize

                                                                          424KB

                                                                        • memory/2096-466-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                          Filesize

                                                                          424KB

                                                                        • memory/2096-3-0x0000000000400000-0x0000000000467000-memory.dmp

                                                                          Filesize

                                                                          412KB

                                                                        • memory/2096-1-0x0000000074D20000-0x0000000074D59000-memory.dmp

                                                                          Filesize

                                                                          228KB

                                                                        • memory/2392-1511-0x0000000004990000-0x0000000004991000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2984-223-0x000001A2515A0000-0x000001A2515C0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/2984-192-0x000001A2511D0000-0x000001A2511F0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/2984-187-0x000001A2501B0000-0x000001A2502B0000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/2984-222-0x000001A251190000-0x000001A2511B0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3116-348-0x00000000042E0000-0x00000000042E1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3252-918-0x0000020F68100000-0x0000020F68200000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/3252-946-0x0000020F69810000-0x0000020F69830000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3252-919-0x0000020F68100000-0x0000020F68200000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/3252-931-0x0000020F69400000-0x0000020F69420000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3252-923-0x0000020F69440000-0x0000020F69460000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3252-920-0x0000020F68100000-0x0000020F68200000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/3404-1066-0x0000000004A80000-0x0000000004A81000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3492-1215-0x0000000001410000-0x0000000001411000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3500-1248-0x000001A6BDAC0000-0x000001A6BDAE0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3500-1235-0x000001A6BD4B0000-0x000001A6BD4D0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3500-1222-0x000001A6BD4F0000-0x000001A6BD510000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3648-807-0x00000276E7080000-0x00000276E70A0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3648-788-0x00000276E6A60000-0x00000276E6A80000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3648-776-0x00000276E6AA0000-0x00000276E6AC0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3828-517-0x000002ED89090000-0x000002ED890B0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3828-504-0x000002ED890D0000-0x000002ED890F0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3828-499-0x000002ED88170000-0x000002ED88270000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/3828-536-0x000002ED896A0000-0x000002ED896C0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3964-1371-0x00000238CA640000-0x00000238CA660000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3964-1403-0x00000238CAA00000-0x00000238CAA20000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3964-1387-0x00000238CA600000-0x00000238CA620000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3964-1366-0x00000238C9500000-0x00000238C9600000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/4116-916-0x00000000043F0000-0x00000000043F1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4412-16-0x0000000074D20000-0x0000000074D59000-memory.dmp

                                                                          Filesize

                                                                          228KB

                                                                        • memory/4412-18-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                          Filesize

                                                                          424KB

                                                                        • memory/4412-19-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                          Filesize

                                                                          424KB

                                                                        • memory/4412-20-0x0000000074D20000-0x0000000074D59000-memory.dmp

                                                                          Filesize

                                                                          228KB

                                                                        • memory/4516-1364-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4936-353-0x0000020B87B00000-0x0000020B87C00000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/4936-352-0x0000020B87B00000-0x0000020B87C00000-memory.dmp

                                                                          Filesize

                                                                          1024KB

                                                                        • memory/4936-371-0x0000020B88BC0000-0x0000020B88BE0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4936-357-0x0000020B88C00000-0x0000020B88C20000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4936-386-0x0000020B88FD0000-0x0000020B88FF0000-memory.dmp

                                                                          Filesize

                                                                          128KB