Analysis

  • max time kernel
    130s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 02:04

General

  • Target

    18669652b47dc9bbacea0b790bc47e1c_JaffaCakes118.exe

  • Size

    875KB

  • MD5

    18669652b47dc9bbacea0b790bc47e1c

  • SHA1

    6b852f8c039052bfd7f5c94b486c4e7c040a8077

  • SHA256

    76081536605f54e193127ce89901ec20dcb94782cc4c28a8c2cfb58521b23bf4

  • SHA512

    d1023c4c071240b1ca01da705eeb83f7b4bd17adfa658982326cc293ee80f1a088b5c1adab7fbce4f24ce5189443e3901df98c786abd7cf2f0427ecc278f60ec

  • SSDEEP

    24576:B5T0kUJQCdHVFQlyOW8oooiAhYJWtA7q:B53UVHVFQAp5iAOgtAG

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • ModiLoader Second Stage 9 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 51 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\18669652b47dc9bbacea0b790bc47e1c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\18669652b47dc9bbacea0b790bc47e1c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\18669652b47dc9bbacea0b790bc47e1c_JaffaCakes118.exe
      18669652b47dc9bbacea0b790bc47e1c_JaffaCakes118.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Users\Admin\Ww9OoYLk.exe
        C:\Users\Admin\Ww9OoYLk.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3436
        • C:\Users\Admin\kexel.exe
          "C:\Users\Admin\kexel.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4908
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del Ww9OoYLk.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3748
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2420
      • C:\Users\Admin\athost.exe
        C:\Users\Admin\athost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Users\Admin\athost.exe
          athost.exe
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2892
      • C:\Users\Admin\bthost.exe
        C:\Users\Admin\bthost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Users\Admin\bthost.exe
          bthost.exe
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          PID:3532
      • C:\Users\Admin\cthost.exe
        C:\Users\Admin\cthost.exe
        3⤵
        • Modifies security service
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4236
        • C:\Users\Admin\cthost.exe
          C:\Users\Admin\cthost.exe startC:\Users\Admin\AppData\Roaming\3A0B4\91DE0.exe%C:\Users\Admin\AppData\Roaming\3A0B4
          4⤵
          • Executes dropped EXE
          PID:4032
        • C:\Users\Admin\cthost.exe
          C:\Users\Admin\cthost.exe startC:\Program Files (x86)\B4AB1\lvvm.exe%C:\Program Files (x86)\B4AB1
          4⤵
          • Executes dropped EXE
          PID:1680
        • C:\Program Files (x86)\LP\E063\DA04.tmp
          "C:\Program Files (x86)\LP\E063\DA04.tmp"
          4⤵
          • Executes dropped EXE
          PID:3020
      • C:\Users\Admin\dthost.exe
        C:\Users\Admin\dthost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
            PID:4820
        • C:\Users\Admin\ethost.exe
          C:\Users\Admin\ethost.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3108
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del 18669652b47dc9bbacea0b790bc47e1c_JaffaCakes118.exe
          3⤵
            PID:1952
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              4⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:3048
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3172
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:436
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1256
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1740
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3888
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4840
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SendNotifyMessage
        PID:4396
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3580
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:3296
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:860
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:5108
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:1916
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:4748
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4576
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:728
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:448
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4064
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2368
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:948
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4616
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3684
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        PID:384
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2660
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:876
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3640
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1280
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:3868
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3484
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:548
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1592
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4064
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:4804
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:1992
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:4316
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3484
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:3968
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:3868

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Persistence

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Boot or Logon Autostart Execution

                  2
                  T1547

                  Registry Run Keys / Startup Folder

                  1
                  T1547.001

                  Active Setup

                  1
                  T1547.014

                  Privilege Escalation

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Boot or Logon Autostart Execution

                  2
                  T1547

                  Registry Run Keys / Startup Folder

                  1
                  T1547.001

                  Active Setup

                  1
                  T1547.014

                  Defense Evasion

                  Modify Registry

                  6
                  T1112

                  Hide Artifacts

                  1
                  T1564

                  Hidden Files and Directories

                  1
                  T1564.001

                  Credential Access

                  Unsecured Credentials

                  2
                  T1552

                  Credentials In Files

                  2
                  T1552.001

                  Discovery

                  Query Registry

                  6
                  T1012

                  System Information Discovery

                  5
                  T1082

                  Peripheral Device Discovery

                  3
                  T1120

                  Process Discovery

                  1
                  T1057

                  Collection

                  Data from Local System

                  2
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\LP\E063\DA04.tmp
                    Filesize

                    95KB

                    MD5

                    a1d80ed250788260ffd66258555a4876

                    SHA1

                    10b81c2cdc4a7d645f9058c220587fac79281351

                    SHA256

                    d4d9a7028cda13828d7a6796dd12369ab1d4af80946776aa5b5c0369dd322fb3

                    SHA512

                    fee72d46425a0c1f755de2e34ad742ff579a86b2a3bff3485a15ddcbcf55d60c6297bb588650a9a673aa0a5e8f35f1ae0bc1a454154d26848c49cab700d7e5d8

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
                    Filesize

                    2KB

                    MD5

                    512e33475a78dbcce6dd45cd038dc645

                    SHA1

                    f6d0d2335bfaa3749b853b258e2ae3779683492d

                    SHA256

                    fa535bf7d07fbfbc74ec9bf8c50fc54315e8c00f11482cbb16d324b6d8fcd912

                    SHA512

                    5429f449ffa03aad94191f143b1eda5a69aa6f138b773f8f3a2b19e087afa86bbf244187550be7bd33a71a50b83a71a86db0143d4280cbfddd251556999db66b

                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133640139503193660.txt
                    Filesize

                    75KB

                    MD5

                    ce88a108043a3d69e5325754ba9c7181

                    SHA1

                    c64f06b8081f5ec0ae7c0e1fe7b0f248aa6550c4

                    SHA256

                    b2552766ebb3469549cea5b6b609077fa6e38c000eba6befadfd275e11a8095e

                    SHA512

                    cb5e53fb1520b68178ad465cde801ed779521b843de44f894fc8fdbd071f33f663a60f570b134ff0996bf407ef9ecee72810b16dd9276469e6b0efb5d5c85829

                  • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\92G8RFY9\microsoft.windows[1].xml
                    Filesize

                    97B

                    MD5

                    154014c190bcc3ee57ed7e94a2f5d4b9

                    SHA1

                    20848fea26d00af1a18c235031228444530ec9d4

                    SHA256

                    bcd046aa48862e2cc160ed1dc72283cfeeffce82c66d4aae555664ae3043ac53

                    SHA512

                    91c232d6bb42bebe9f998bae5e1a08d9ea0a8ed86ead98ab733fcf8170ecb100f3294ba378ac4b07ed7b8023760a20324145fcd3884d8848334de81a718d8be5

                  • C:\Users\Admin\AppData\Roaming\3A0B4\4AB1.A0B
                    Filesize

                    600B

                    MD5

                    b1b0655da0fa6289f42eee2cb06cda05

                    SHA1

                    4fb4b7261b2b2d00be5f1cf95b02bfc5596638fc

                    SHA256

                    787e7db8d97235d0fcf3edbcbdc4c4478dc29a28fd44220fa4adfb52d137d706

                    SHA512

                    b568182a81b71bb14bb59545caa2244c844fa9d63e4ce990fcf34f8c3b5d8b9745a36f47d73a2591edcd8f725e86151962a755c25a3ab172b394f0339780c08f

                  • C:\Users\Admin\AppData\Roaming\3A0B4\4AB1.A0B
                    Filesize

                    1KB

                    MD5

                    e388e18178772503f80b3c5f1c3245cf

                    SHA1

                    7734a08e2646ddc878a79f1417b5a8cab2a49d77

                    SHA256

                    fabbde31eff136cfa9bc441044617c80fa836d605451dcaaaa983521fc356ae5

                    SHA512

                    339efce180de0875de8d8d9f2066ce1c3965b0c07f96fcecfed01754d2082f2b9d465bda56ea63fb77847cb812d50e85a96e1d91da43e385733d08465ad73736

                  • C:\Users\Admin\AppData\Roaming\3A0B4\4AB1.A0B
                    Filesize

                    1KB

                    MD5

                    6a74b97a46db577898577217ca272479

                    SHA1

                    6195d9f4a84cf76bee7106c1404be8676c7729fe

                    SHA256

                    ec6884d0eb7cdcdb969b1c6e4fdb3760247aa86805075de678c969a9c538dcbc

                    SHA512

                    4f6a3c2f4b84bb10db492db8d72c8733111ae8b6a5ef29534d895ca040308238f0eabe6528c16aa6644201e7ac60e3202d9d346e026aec169e5b66bab60272ff

                  • C:\Users\Admin\Ww9OoYLk.exe
                    Filesize

                    256KB

                    MD5

                    77e425fe955cbc4b6245cf8a3ed645b3

                    SHA1

                    921dad95a28283f2138e8c36d4cbf295572d33ac

                    SHA256

                    86b35dd61f186218356ecced37723e647b612cb8c44ef904917f4c783e424809

                    SHA512

                    ee0a6ac25c021baf6974a23afd999bcdd519da465ee849ebd52d99ff437812165650fe8f05e5ff72f6eadf8d5a44d5c7c73853e4d5e00f8fbab45444fd56a44b

                  • C:\Users\Admin\athost.exe
                    Filesize

                    263KB

                    MD5

                    6b7d559166467ef651497836feef65e3

                    SHA1

                    9edda6cd07a1960ba52abe17fc7402ff93d44ce6

                    SHA256

                    6151ab998d7821e147551b5ff24b11d3194c207c3ff8322fe2e2860a8b978bb0

                    SHA512

                    d58ddfe8ce3b9f4092d554713502065c351a46251ff0ce126dd05528771cd727bf636f15a4c76224d8db22117234d39b1a2bf8030b55aadcf98087a5a1814356

                  • C:\Users\Admin\bthost.exe
                    Filesize

                    153KB

                    MD5

                    f28e94ce33674d8cf13f31bb5f20f745

                    SHA1

                    e79332b18af7b31caa195956c23303d35c2808c8

                    SHA256

                    42f40ac82f47f4eb009dbd11d7233ed2e67f80392dd4fa770faa68dd973ded2f

                    SHA512

                    8bcb1311302bbf1b6cfbbb863cffa95d5934c9bfc613cd2dc2abd425fe39ad2ec9cae7dca1e5b60d2acec4c9d422a35aeb5ab7b0433f25c01202ab3b4ca96112

                  • C:\Users\Admin\cthost.exe
                    Filesize

                    278KB

                    MD5

                    d0bf4ea3b6fc02afd2c6ed5f4b0d142e

                    SHA1

                    2187968df184c18f945497dd410f90f4b6ff186d

                    SHA256

                    3c7ee6117b9c2e39593f452e163f16334ab1b9196b5b5616c9ff7496bb4676a0

                    SHA512

                    e0efb8672a81a8aa6c11a0f1f871033b10c6a5c6b28d30eab4f8ef7509fca8710c417b9cbbbf7844888f02858295304c23bf217e41d157e2bed594a39c2641f4

                  • C:\Users\Admin\dthost.exe
                    Filesize

                    227KB

                    MD5

                    d39d17b38909180b0c65cb4081154100

                    SHA1

                    b7a11d389d940273b91dd9ddb11137404eedceea

                    SHA256

                    590aaa3add5efffd271c2b9cfc10fc304faf6caf83f2f9dd494a40a35b1053d3

                    SHA512

                    5a0ccc785b15e92d38bf1436522dbe81645d2b16093f20f09dfd81602e9f496693a6b27a62f88e50cdf027147b89a21db1e15532d0d4e7c2fd65710ee2071fa6

                  • C:\Users\Admin\ethost.exe
                    Filesize

                    24KB

                    MD5

                    b38b2a8c25efb39b245dbfa6c1ccc29b

                    SHA1

                    62fda766006bfbccbfaade649ceb29764c216ea4

                    SHA256

                    1fee129dadbd67f7fab68c8fa285b5da0141785100b35bc7b66d55b10d24364d

                    SHA512

                    8cdbb4e9404783ad4a2665a05a1e64e8ab393689c2425834e854933f58904910e248dfebc57c717313abbc62105d76875ebafd206ada15417beedd58bbd7e22d

                  • C:\Users\Admin\kexel.exe
                    Filesize

                    256KB

                    MD5

                    fe7a17f81a471dae2fddc92a3204bf9f

                    SHA1

                    19c7d6f5436bb3566e87294929c64ba93eda9fa0

                    SHA256

                    09485b694b103a5beb79b0cf00dd60991db29a8052ec0fb846609d5b844c2080

                    SHA512

                    0d0562dde9caded37e211f0249fac99b08cc0074a27831fcaa7582aa6602db601b81b50b6a1d1ed4a48d036b808a9ec80731494cdf977d5b0e1851fa69f3174d

                  • memory/1256-302-0x000002D2A91B0000-0x000002D2A91D0000-memory.dmp
                    Filesize

                    128KB

                  • memory/1256-290-0x000002D2A8700000-0x000002D2A8800000-memory.dmp
                    Filesize

                    1024KB

                  • memory/1256-294-0x000002D2A91F0000-0x000002D2A9210000-memory.dmp
                    Filesize

                    128KB

                  • memory/1256-325-0x000002D2A95C0000-0x000002D2A95E0000-memory.dmp
                    Filesize

                    128KB

                  • memory/1668-85-0x0000000000400000-0x0000000000466000-memory.dmp
                    Filesize

                    408KB

                  • memory/1668-82-0x0000000000400000-0x0000000000466000-memory.dmp
                    Filesize

                    408KB

                  • memory/1680-185-0x0000000000400000-0x000000000046B000-memory.dmp
                    Filesize

                    428KB

                  • memory/2300-267-0x0000000000400000-0x0000000000535000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2300-5-0x0000000000400000-0x0000000000535000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2300-4-0x0000000000400000-0x0000000000535000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2300-0-0x0000000000400000-0x0000000000535000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2300-86-0x0000000000400000-0x0000000000535000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2300-1-0x0000000000400000-0x0000000000535000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2300-7-0x0000000000400000-0x0000000000535000-memory.dmp
                    Filesize

                    1.2MB

                  • memory/2800-70-0x0000000000400000-0x000000000041E000-memory.dmp
                    Filesize

                    120KB

                  • memory/2892-92-0x0000000000400000-0x0000000000437000-memory.dmp
                    Filesize

                    220KB

                  • memory/2892-59-0x0000000000400000-0x0000000000437000-memory.dmp
                    Filesize

                    220KB

                  • memory/2892-54-0x0000000000400000-0x0000000000437000-memory.dmp
                    Filesize

                    220KB

                  • memory/2892-55-0x0000000000400000-0x0000000000437000-memory.dmp
                    Filesize

                    220KB

                  • memory/2892-56-0x0000000000400000-0x0000000000437000-memory.dmp
                    Filesize

                    220KB

                  • memory/2892-57-0x0000000000400000-0x0000000000437000-memory.dmp
                    Filesize

                    220KB

                  • memory/3020-200-0x0000000000400000-0x000000000041B000-memory.dmp
                    Filesize

                    108KB

                  • memory/3296-447-0x0000000002D20000-0x0000000002D21000-memory.dmp
                    Filesize

                    4KB

                  • memory/3532-93-0x0000000000400000-0x0000000000427000-memory.dmp
                    Filesize

                    156KB

                  • memory/3532-66-0x0000000000400000-0x0000000000427000-memory.dmp
                    Filesize

                    156KB

                  • memory/3532-73-0x0000000000400000-0x0000000000427000-memory.dmp
                    Filesize

                    156KB

                  • memory/3532-65-0x0000000000400000-0x0000000000427000-memory.dmp
                    Filesize

                    156KB

                  • memory/3532-72-0x0000000000400000-0x0000000000427000-memory.dmp
                    Filesize

                    156KB

                  • memory/3888-287-0x0000000002BE0000-0x0000000002BE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4032-106-0x0000000000400000-0x000000000046B000-memory.dmp
                    Filesize

                    428KB

                  • memory/4076-8-0x0000000000400000-0x000000000041F000-memory.dmp
                    Filesize

                    124KB

                  • memory/4236-94-0x0000000000400000-0x000000000046B000-memory.dmp
                    Filesize

                    428KB

                  • memory/4236-201-0x0000000000400000-0x000000000046B000-memory.dmp
                    Filesize

                    428KB

                  • memory/4236-109-0x0000000000400000-0x000000000046B000-memory.dmp
                    Filesize

                    428KB

                  • memory/4576-61-0x0000000000400000-0x000000000041E000-memory.dmp
                    Filesize

                    120KB

                  • memory/5108-449-0x0000014468800000-0x0000014468900000-memory.dmp
                    Filesize

                    1024KB

                  • memory/5108-454-0x00000144696E0000-0x0000014469700000-memory.dmp
                    Filesize

                    128KB

                  • memory/5108-465-0x00000144696A0000-0x00000144696C0000-memory.dmp
                    Filesize

                    128KB

                  • memory/5108-486-0x0000014469CC0000-0x0000014469CE0000-memory.dmp
                    Filesize

                    128KB