Date: 2025-08-07
Difficulty:Unknown|Easy| Medium |Hard
Reference: https://tryhackme.com/room/registry4n6
Jasmine owns a famous New York coffee shop Coffely which is famous city-wide for its unique taste. Only Jasmine keeps the original copy of the recipe, and she only keeps it on her work laptop. Last week, James from the IT department was consulted to fix Jasmine's laptop. But it is suspected he may have copied the secret recipes from Jasmine's machine and is keeping them on his machine. Image showing a Laptop with a magnifying glass
His machine has been confiscated and examined, but no traces could be found. The security department has pulled some important registry artifacts from his device and has tasked you to examine these artifacts and determine the presence of secret files on his machine.
Registry Explorer
Load the SYSTEM Hive
ROOT\ControlSet001\Control\ComputerName\ComputerName

JAMES
Registry Explorer
Load the SAM Hive
ROOT\SAM\Domains\Users

2021-03-17 14:58:48
ROOT\SAM\Domains\Users

500
ROOT\SAM\Domains\Users

7
ROOT\SAM\Domains\Users

bdoor
After a quick research on where to look for network connections, I found it in the following registry hive:
Load the SOFTWARE Hive
ROOT\Microsoft\Windows NT\CurrentVersion\NetworkList
I found one network indicating a VPN connection:

ProtonVPN
Same hive as in the previous question.

2022-10-12 19:52:36
According to the Microsoft documentation, shared folders are listed in SYSTEM\CurrentControlSet\Services\LanmanServer\Shares


C:\RESTRICTED FILES
In the SYSTEM Hive, I found under
ROOT\ControlSet001\Services\Tcpip\Parameters\Interfaces three different interfaces that had assigned IPs:

It was a bit unsatisfying because the correct answer is 172.31.2.197, even though the last write for this interface was before the interface with the assigned IP 10.10.210.64. I couldn't figure out why it was this network interface. But according to the THM hint and the possible answer format, it had to be 172.31.2.197.
172.31.2.197
For the recent activities, I loaded the NTUSER.DAT into Registry Explorer.
The location of recent files is ROOT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs:

secret-recipe.pdf
The evidence is found in the NTUSER.DAT as well:
\ROOT\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU

pnputil /enum-interfaces
The evidence is found in the NTUSER.DAT as well:
\ROOT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery

netcat
Recent files are stored in ROOT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\.txt of the NTUSER.DAT hive:

secret-code.txt
I checked the NTUSER.DAT hive in Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist and clicked through all the subkeys. In the key {CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\count, I found the different programs that were executed with a counter. I filtered for "powershell" and found the answer:

3
In the same key as in question 14, I searched through the program names, set the filter for "Run Count" in Registry Explorer to >= 1, and noticed Wireshark, which is a network monitoring tool:

wireshark
In the same key as both questions before, you can see the "Focus Time". I filtered for "proton" in the program name and the focus time was 5 minutes and 43 seconds (343 seconds):

343

C:\Users\Administrator\Downloads\tools\Everything\Everything.exe