Analysis

  • max time kernel
    81s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 06:38

General

  • Target

    JaffaCakes118_02b3f6e2f7d3900f9415c7ae1780390c.exe

  • Size

    964KB

  • MD5

    02b3f6e2f7d3900f9415c7ae1780390c

  • SHA1

    73f425ca50ed5beac51114fc79b4007c9db6fe52

  • SHA256

    ab87d4f3a0397b7e30c2e6636ba0a59571a5f7c2b787e8c28af32684e66fcfc0

  • SHA512

    d5dbd0c36ba12e32c2443ea11c86548c894f036b8c8cefd6703cd5f5bb1c6016151531f3c254d5be4f04b3354feffbaf4310ee099390f9298a0bfe2366c896bb

  • SSDEEP

    24576:0NDtgSt8ux/FI5QhM5BtON/X5aP/SdqJyybYfxk/5GFaidS0:ijImitOWXSdSrbjz

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 4 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 53 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 22 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_02b3f6e2f7d3900f9415c7ae1780390c.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_02b3f6e2f7d3900f9415c7ae1780390c.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\u2AzQ8M2.exe
      C:\Users\Admin\u2AzQ8M2.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Users\Admin\jiabeuf.exe
        "C:\Users\Admin\jiabeuf.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1388
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del u2AzQ8M2.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:208
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2868
    • C:\Users\Admin\2eod.exe
      C:\Users\Admin\2eod.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2980
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1120
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • Suspicious behavior: EnumeratesProcesses
        PID:548
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2140
      • C:\Users\Admin\2eod.exe
        "C:\Users\Admin\2eod.exe"
        3⤵
        • Executes dropped EXE
        PID:460
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 80
          4⤵
          • Program crash
          PID:3024
    • C:\Users\Admin\3eod.exe
      C:\Users\Admin\3eod.exe
      2⤵
      • Modifies security service
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1736
      • C:\Users\Admin\3eod.exe
        C:\Users\Admin\3eod.exe startC:\Users\Admin\AppData\Roaming\2A66D\6D852.exe%C:\Users\Admin\AppData\Roaming\2A66D
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2792
      • C:\Users\Admin\3eod.exe
        C:\Users\Admin\3eod.exe startC:\Program Files (x86)\6DB97\lvvm.exe%C:\Program Files (x86)\6DB97
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1604
      • C:\Program Files (x86)\LP\5282\6349.tmp
        "C:\Program Files (x86)\LP\5282\6349.tmp"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4036
    • C:\Users\Admin\4eod.exe
      C:\Users\Admin\4eod.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Users\Admin\AppData\Local\d342fc5b\X
        *0*bc*a4462e37*31.193.3.240:53
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          4⤵
            PID:1376
      • C:\Users\Admin\5eod.exe
        C:\Users\Admin\5eod.exe
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:1892
        • C:\Users\Admin\AppData\Roaming\xhjara12gicqjssho2sdkac1ft1fzyep2\svcnost.exe
          "C:\Users\Admin\AppData\Roaming\xhjara12gicqjssho2sdkac1ft1fzyep2\svcnost.exe"
          3⤵
          • Modifies firewall policy service
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops desktop.ini file(s)
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:2084
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del JaffaCakes118_02b3f6e2f7d3900f9415c7ae1780390c.exe
        2⤵
        • System Location Discovery: System Language Discovery
        PID:928
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4212
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 460 -ip 460
      1⤵
        PID:4128
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3548
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4928
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:436
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1428
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1476
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2544
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3924
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4676
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:4872
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:536
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4876
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:836
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4664
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4576
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:1448
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3632
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4560
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:4708
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4128
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2668
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3584
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4764
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2920
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:1556
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1164
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2788
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4692
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2460
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:432
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4284
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1408
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4180
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:1680
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:644
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4140
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:520
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:1760
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:1864
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:4268
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:4360
                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                  1⤵
                    PID:600
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:3616
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:2252
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:232
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:4076
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:4240
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:5016
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:2788
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:3368
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:4436
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:3772
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:1548
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:2868
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:1552
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:5076
                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:1640
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                    PID:3516
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                      PID:1232
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:4856
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:432
                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                          1⤵
                                                            PID:4388
                                                          • C:\Windows\explorer.exe
                                                            explorer.exe
                                                            1⤵
                                                              PID:1376
                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                              1⤵
                                                                PID:4104
                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                1⤵
                                                                  PID:2876
                                                                • C:\Windows\explorer.exe
                                                                  explorer.exe
                                                                  1⤵
                                                                    PID:4852
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                    1⤵
                                                                      PID:2424
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                      1⤵
                                                                        PID:3804
                                                                      • C:\Windows\explorer.exe
                                                                        explorer.exe
                                                                        1⤵
                                                                          PID:3444
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                            PID:4860
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                            1⤵
                                                                              PID:988
                                                                            • C:\Windows\explorer.exe
                                                                              explorer.exe
                                                                              1⤵
                                                                                PID:4692
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                1⤵
                                                                                  PID:3836
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                  1⤵
                                                                                    PID:3440
                                                                                  • C:\Windows\explorer.exe
                                                                                    explorer.exe
                                                                                    1⤵
                                                                                      PID:3664
                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                      1⤵
                                                                                        PID:3128
                                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                        1⤵
                                                                                          PID:4856

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\Program Files (x86)\LP\5282\6349.tmp

                                                                                          Filesize

                                                                                          100KB

                                                                                          MD5

                                                                                          340f18faddf54d738f6e56fe3d8b1d54

                                                                                          SHA1

                                                                                          bb247a2f8db305906d558c0c665cc7fd7f86ff67

                                                                                          SHA256

                                                                                          4613dcf13e53312b483bfebb7866b9e1111c434beabd1b19a03721ab7a2ec572

                                                                                          SHA512

                                                                                          e47e375ec6c8cd07411da44cec52c35c1c28e3fce9d09acf390371ea6b1c456e1d43f87d7b5de6f8ba9b233d11caf25cfd5b4890f356b510688286322d7cab74

                                                                                        • C:\Users\Admin\2eod.exe

                                                                                          Filesize

                                                                                          136KB

                                                                                          MD5

                                                                                          449cf714ddba0f68cb17bc7f9698949b

                                                                                          SHA1

                                                                                          3639bfa3d1563f9a4e2caad9a21074e87b3bfa73

                                                                                          SHA256

                                                                                          3c3c398934492f2073aa3a725bff53909ef1bd1a7df82a7467a66d712df12010

                                                                                          SHA512

                                                                                          8a08aef0b537395f2503790c7eee4c28986c4fd76670d05018004b3c77011fa4b9d8d3d791ec65ccf6a638f47f007666ea708957776772d5ab6f6d5cae64c81f

                                                                                        • C:\Users\Admin\3eod.exe

                                                                                          Filesize

                                                                                          282KB

                                                                                          MD5

                                                                                          2c24a5f9f31ac5a0d3830187617cf6dc

                                                                                          SHA1

                                                                                          e71116ab32e0dfa7495f0562c86f232df7202991

                                                                                          SHA256

                                                                                          007e9c74a2ee70d46460c91a3c36aa08602bb51a792e89f2d89a358ecbac94c6

                                                                                          SHA512

                                                                                          f59a98a728c0d923443d10b2419b6a9bb5ac613949f26fa923240cc2162c93bc462e65f46f46000a1120065bf344b32ddba0f674cfc8007dd1d7591f4cb19b04

                                                                                        • C:\Users\Admin\4eod.exe

                                                                                          Filesize

                                                                                          277KB

                                                                                          MD5

                                                                                          00b72668c42555c6d9e3cee383730fc0

                                                                                          SHA1

                                                                                          509a7c39baf2b9a46813c641cca687b37e244d5a

                                                                                          SHA256

                                                                                          baaacce5c3f18154d4925ec6568ccf66f4ab9ee5477bd0faf44f08d9397641dd

                                                                                          SHA512

                                                                                          1bfa5cd6081a5e8556b452cf4741831da829fcc9e2b51c77c92a4fdacfa1b934d14bc049f8185be09b1447664f55956f69e7fd16a868c9655eb32f9b9ef02e78

                                                                                        • C:\Users\Admin\5eod.exe

                                                                                          Filesize

                                                                                          120KB

                                                                                          MD5

                                                                                          3fe209cb336f44a0719e53e3b9354aa8

                                                                                          SHA1

                                                                                          c37a59ba00521c78d81f0e7cf2713b41593e12a3

                                                                                          SHA256

                                                                                          19102a9ce99b067f69ec9b53844aa2e29fbed3d53efbb06e24501ee70af60db1

                                                                                          SHA512

                                                                                          6e872ee319e1900fa8ab9b257ec3ee62cc2578476bfc2770090255706f5ea685a5034a1c7b857a088547e130c5cc2b35d65aed54df6965a5274e019293065c09

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                          Filesize

                                                                                          471B

                                                                                          MD5

                                                                                          20e64b00088a9559c728a14e4531ffa3

                                                                                          SHA1

                                                                                          c9d7ab909a2ffb7dc79ae5090895b861c0de3196

                                                                                          SHA256

                                                                                          8432920aae7dd6cdc1a0faf4aae7cffc8042da0df9b634e06ab8c0651921630d

                                                                                          SHA512

                                                                                          c50b86cb7aa4198424e9420e18e511a8cec1de1b4380efa0dd6e147cb60b2fe59b5698ea27374a213d1ecbe579982b0ef7d53d121f370df874d073f4e71704b2

                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                          Filesize

                                                                                          412B

                                                                                          MD5

                                                                                          f34c0cdcdc8911ff896d4084449ad846

                                                                                          SHA1

                                                                                          036ab25d8ce6366fe7f1b0f9c939a2054f9bec55

                                                                                          SHA256

                                                                                          c8657527d9f531cc1b907f80357bc3c97f02cfae4da61e9feba0ddf00647d66e

                                                                                          SHA512

                                                                                          8385c833857275765d19356f0f53ff45f499f91a00c8476fd053da1527440b54dde4b8812e00e12fbf194bb1e17e1af41c50d37f00d785ea3263d097f7a7b34b

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                          Filesize

                                                                                          2KB

                                                                                          MD5

                                                                                          af4c91d2f9ca1707cffb86297e727687

                                                                                          SHA1

                                                                                          fe0420bc4c9ea918b43f58aaab00e8a44600b6d8

                                                                                          SHA256

                                                                                          f618000d12cac23996f5071190b2b6230c321a6ea7351efb24fae31572c16f22

                                                                                          SHA512

                                                                                          f672fb8d6ef98eea1a73ff2218efdc676f589d7cbeb015f22c3fdecb23abb72065e97f24012552a6af38b4c865236ea9ee24bc6d61fe978eb27a6d70912f20b1

                                                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\80AM9X7C\microsoft.windows[1].xml

                                                                                          Filesize

                                                                                          96B

                                                                                          MD5

                                                                                          c839a1973d3feaead377ea2dad131fe6

                                                                                          SHA1

                                                                                          252758616792b9b2f10bc460c84b1c1eba75ea04

                                                                                          SHA256

                                                                                          efecd8d483398a6cb569af17e66cb0ba1ca4b9c65f4a697fc7642cc007fc3ccd

                                                                                          SHA512

                                                                                          fee6ca3d2ae272b0f1f291e98830215f2ac138747651be78325ab7c1ba3f01f72cbfed4c886853caba45f16c59c78543a87a5f872b2c1f85bffa3a4e11bf50e1

                                                                                        • C:\Users\Admin\AppData\Local\d342fc5b\X

                                                                                          Filesize

                                                                                          38KB

                                                                                          MD5

                                                                                          72de2dadaf875e2fd7614e100419033c

                                                                                          SHA1

                                                                                          5f17c5330e91a42daa9ff24c4aa602bd1a72bf6e

                                                                                          SHA256

                                                                                          c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381

                                                                                          SHA512

                                                                                          e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3

                                                                                        • C:\Users\Admin\AppData\Roaming\2A66D\DB97.A66

                                                                                          Filesize

                                                                                          600B

                                                                                          MD5

                                                                                          070ffa9dc4b00afa937d649f94052ba8

                                                                                          SHA1

                                                                                          9ba0402fb3e43d2fe6427f1ca1cfb202e9b60963

                                                                                          SHA256

                                                                                          7571769799204fef2fd9f6817866b601c98e170ccde2c983a180fdd7b60a072a

                                                                                          SHA512

                                                                                          22b4bf6b2522cd83b001a13481060701a62fcc3e5468c9719bbbb3c32d3d45eef5c2c62bad339c3a87f13184f4ceed35bdac903725483062378fd714314ea2da

                                                                                        • C:\Users\Admin\AppData\Roaming\2A66D\DB97.A66

                                                                                          Filesize

                                                                                          996B

                                                                                          MD5

                                                                                          c4f727a1098dd06f5e52130aa88a240e

                                                                                          SHA1

                                                                                          4570ad33cbee90531c1fae2aabb845c94b10cade

                                                                                          SHA256

                                                                                          ebfa641214e87a84b3e596c3e6a28ed79b7ed1e2950d514a6560de327d8bb4ef

                                                                                          SHA512

                                                                                          f26c7142b2aa3f42188dcda59617012aa8669674b4221910d8a52fe9f23121b6171d5c54edaad10e484c500ecc822101e3ae83ac5f36bf359755e2c794b4f0eb

                                                                                        • C:\Users\Admin\AppData\Roaming\2A66D\DB97.A66

                                                                                          Filesize

                                                                                          1KB

                                                                                          MD5

                                                                                          3fb259f3602b07ee868ede07da2d79a8

                                                                                          SHA1

                                                                                          7691f66c0ac7e5792d491b83aa10144d955aed23

                                                                                          SHA256

                                                                                          3fb4c4aac7956d35fd09a58b3401a71c99a517beaa50c04190a7fd05a062b473

                                                                                          SHA512

                                                                                          61b8db5ebb6f6cde8025ba7463482a071e695a545445abc8b251cedfc356beedb9ab0f627717a451b9ad7f6c5885b584e4015ee39b6164e1bbc1c6a489450347

                                                                                        • C:\Users\Admin\AppData\Roaming\desktop.ini

                                                                                          Filesize

                                                                                          9KB

                                                                                          MD5

                                                                                          4a27242b307c6a836993353035fafc16

                                                                                          SHA1

                                                                                          5fea7a41b8f9071848108015d8a952e6f944eea0

                                                                                          SHA256

                                                                                          02fd93f64bda51e1e2991184cac13f077d509712e462c9e44be9cf8e22c06de1

                                                                                          SHA512

                                                                                          35e9c87642b82df2bf0a9312bb0e9abfb98282db1e34032a4d0150d82c5e2f2e13150ddc896f1e954f02288a1e696a4306ee595b94b1e404c6ec17bac64c44be

                                                                                        • C:\Users\Admin\AppData\Roaming\ntuser.dat

                                                                                          Filesize

                                                                                          54KB

                                                                                          MD5

                                                                                          7e8e966927e04a35aec644602b8a9e05

                                                                                          SHA1

                                                                                          d201b0b41e8701818d60ddbf9f334332a512c4da

                                                                                          SHA256

                                                                                          46f18d9fbf63f378d86962cbf24f5ce57ce257555acd4effdcc41c1e2f1adf5c

                                                                                          SHA512

                                                                                          246777c79129a5076b71ca5d3f7e59b06d344f6b5e771892ae8ee68c0b5af9207cd1868b1336b49e6a84665309ad379a33ec6c8e72d7ce41de72153637921a51

                                                                                        • C:\Users\Admin\jiabeuf.exe

                                                                                          Filesize

                                                                                          320KB

                                                                                          MD5

                                                                                          8cae73ada09c6eddd5e228ee792819cf

                                                                                          SHA1

                                                                                          131cc2e8c22fad4405595d03b100c866bcafd098

                                                                                          SHA256

                                                                                          dec8b8b24393e1a266e51c283e85337a8fd7fd1e6dc75729c492e3b7c0578e42

                                                                                          SHA512

                                                                                          69a277c85b5e1177fa97e5b1c4b69b5186605792fdc2a6c09b38116aeda54b9f6f0dce80de8ac41de6a3bbe1abd2802073abf0f9622f7adff8ad6240c3ee3f56

                                                                                        • C:\Users\Admin\u2AzQ8M2.exe

                                                                                          Filesize

                                                                                          320KB

                                                                                          MD5

                                                                                          ca2acc28a24d14c7e282bd1c689229d0

                                                                                          SHA1

                                                                                          c253b9ce5fa1db5bd8a02a49af44a751331e624c

                                                                                          SHA256

                                                                                          bd67e3974c9108c7f2bd1cb266f6c3aad420fc63860fd653d0198e26927e2c25

                                                                                          SHA512

                                                                                          007c6df499080b538deeffa552d09e0cddba64c6494fe98d6eaf883bd39180d4d9fba0bf08f7d650b256bd54fa52deafc415865dd69b00426452470a173ab2d2

                                                                                        • memory/548-60-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                          Filesize

                                                                                          156KB

                                                                                        • memory/548-63-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                          Filesize

                                                                                          156KB

                                                                                        • memory/548-64-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                          Filesize

                                                                                          156KB

                                                                                        • memory/548-62-0x0000000000400000-0x0000000000427000-memory.dmp

                                                                                          Filesize

                                                                                          156KB

                                                                                        • memory/836-730-0x0000000004870000-0x0000000004871000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/1120-54-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                          Filesize

                                                                                          56KB

                                                                                        • memory/1120-57-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                          Filesize

                                                                                          56KB

                                                                                        • memory/1120-59-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                          Filesize

                                                                                          56KB

                                                                                        • memory/1120-56-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                          Filesize

                                                                                          56KB

                                                                                        • memory/1604-233-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                          Filesize

                                                                                          428KB

                                                                                        • memory/1736-112-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                          Filesize

                                                                                          428KB

                                                                                        • memory/1736-231-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                          Filesize

                                                                                          428KB

                                                                                        • memory/1892-108-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                                          Filesize

                                                                                          7.1MB

                                                                                        • memory/1892-120-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                                          Filesize

                                                                                          7.1MB

                                                                                        • memory/2084-235-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                                          Filesize

                                                                                          7.1MB

                                                                                        • memory/2084-117-0x0000000000400000-0x0000000000B19000-memory.dmp

                                                                                          Filesize

                                                                                          7.1MB

                                                                                        • memory/2084-121-0x0000000000CD0000-0x0000000000CED000-memory.dmp

                                                                                          Filesize

                                                                                          116KB

                                                                                        • memory/2084-122-0x0000000000CD0000-0x0000000000CED000-memory.dmp

                                                                                          Filesize

                                                                                          116KB

                                                                                        • memory/2140-69-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                          Filesize

                                                                                          28KB

                                                                                        • memory/2140-106-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                          Filesize

                                                                                          28KB

                                                                                        • memory/2140-65-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                          Filesize

                                                                                          28KB

                                                                                        • memory/2140-67-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                          Filesize

                                                                                          28KB

                                                                                        • memory/2544-410-0x0000000002F80000-0x0000000002F81000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/2544-92-0x0000000030670000-0x00000000306C3000-memory.dmp

                                                                                          Filesize

                                                                                          332KB

                                                                                        • memory/2792-115-0x0000000000400000-0x000000000046B000-memory.dmp

                                                                                          Filesize

                                                                                          428KB

                                                                                        • memory/2980-74-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                          Filesize

                                                                                          28KB

                                                                                        • memory/2980-51-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                          Filesize

                                                                                          28KB

                                                                                        • memory/2980-47-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                          Filesize

                                                                                          28KB

                                                                                        • memory/2980-49-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                          Filesize

                                                                                          28KB

                                                                                        • memory/4036-728-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                          Filesize

                                                                                          112KB

                                                                                        • memory/4576-732-0x000001CA39D00000-0x000001CA39E00000-memory.dmp

                                                                                          Filesize

                                                                                          1024KB

                                                                                        • memory/4676-414-0x00000233AC900000-0x00000233ACA00000-memory.dmp

                                                                                          Filesize

                                                                                          1024KB

                                                                                        • memory/4676-417-0x00000233AD8D0000-0x00000233AD8F0000-memory.dmp

                                                                                          Filesize

                                                                                          128KB

                                                                                        • memory/4676-428-0x00000233AD890000-0x00000233AD8B0000-memory.dmp

                                                                                          Filesize

                                                                                          128KB

                                                                                        • memory/4676-448-0x00000233ADCA0000-0x00000233ADCC0000-memory.dmp

                                                                                          Filesize

                                                                                          128KB

                                                                                        • memory/4676-412-0x00000233AC900000-0x00000233ACA00000-memory.dmp

                                                                                          Filesize

                                                                                          1024KB

                                                                                        • memory/4872-571-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/4876-599-0x0000019EB90E0000-0x0000019EB9100000-memory.dmp

                                                                                          Filesize

                                                                                          128KB

                                                                                        • memory/4876-591-0x0000019EB8AC0000-0x0000019EB8AE0000-memory.dmp

                                                                                          Filesize

                                                                                          128KB

                                                                                        • memory/4876-574-0x0000019EB7C00000-0x0000019EB7D00000-memory.dmp

                                                                                          Filesize

                                                                                          1024KB

                                                                                        • memory/4876-578-0x0000019EB8B00000-0x0000019EB8B20000-memory.dmp

                                                                                          Filesize

                                                                                          128KB

                                                                                        • memory/4876-573-0x0000019EB7C00000-0x0000019EB7D00000-memory.dmp

                                                                                          Filesize

                                                                                          1024KB

                                                                                        • memory/4876-575-0x0000019EB7C00000-0x0000019EB7D00000-memory.dmp

                                                                                          Filesize

                                                                                          1024KB