Analysis

  • max time kernel
    144s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2023 01:51

General

  • Target

    87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe

  • Size

    692KB

  • MD5

    cb28c211ca8292894f3eef43ce5a6cd4

  • SHA1

    70e0bc5fce5534e6dbe5200d9c965c925b596ee3

  • SHA256

    87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d

  • SHA512

    b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd

  • SSDEEP

    3072:UkmGgnjAYn2Fj5ohpzBovjtALLXOixtjOQ0hV09ZIR5YkHk7wELOhr1DwTTRpAe:g6mLD1OQW094YkHk7wsO7wPXAe

Malware Config

Extracted

Path

C:\PerfLogs\_RECoVERY_+hvbkb.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BE3D20CD9E77937F 2. http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BE3D20CD9E77937F 3. http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BE3D20CD9E77937F If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/BE3D20CD9E77937F 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BE3D20CD9E77937F http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BE3D20CD9E77937F http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BE3D20CD9E77937F *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/BE3D20CD9E77937F
URLs

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BE3D20CD9E77937F

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BE3D20CD9E77937F

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BE3D20CD9E77937F

http://xlowfznrg4wf7dli.ONION/BE3D20CD9E77937F

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+hvbkb.html

Ransom Note
NOT YOUR LANGUAGE? USE Google Translate What happened to your files? of your files were protected by a strong encryption with AES More information about the encryption AES can be found https://en.wikipedia.org/wiki/AES at does this mean? his means that the structure and data within your files have been irrevocably changed, you will not be able work with them, read them or see them, it is the same thing as losing them forever, but with our help, you can restore them How did this happen? Especially for you, on our SERVER was generated the secret key All your files were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of YOUR FILES is only possible with the help of the private key and decrypt program which is on our Secret Server!!! at do I do? do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed If you really need your data, then we suggest you do not waste valuable time searching for other solutions becausen they do not exist. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BE3D20CD9E77937F 2 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BE3D20CD9E77937F 3 - http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BE3D20CD9E77937F If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser and wait for initialization. 3 - Type in the tor-browser address bar: xlowfznrg4wf7dli.onion/BE3D20CD9E77937F 4 - Follow the instructions on the site. !!! IMPORTANT INFORMATION: Your Personal PAGES : http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BE3D20CD9E77937F http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BE3D20CD9E77937F http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BE3D20CD9E77937F Your Personal TOR-Browser page : xlowfznrg4wf7dli.onion/BE3D20CD9E77937F Your personal ID (if you open the site directly):
URLs

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/BE3D20CD9E77937F

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/BE3D20CD9E77937F

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/BE3D20CD9E77937F

http://xlowfznrg4wf7dli.onion/BE3D20CD9E77937F

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 3 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe
    "C:\Users\Admin\AppData\Local\Temp\87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Windows\lokwwqbuydkp.exe
      C:\Windows\lokwwqbuydkp.exe
      2⤵
      • Modifies extensions of user files
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4176
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3224
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:3228
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4144
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ffd1fc646f8,0x7ffd1fc64708,0x7ffd1fc64718
          4⤵
            PID:3632
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 /prefetch:2
            4⤵
              PID:112
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
              4⤵
                PID:32
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:8
                4⤵
                  PID:752
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                  4⤵
                    PID:1812
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                    4⤵
                      PID:2576
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:1
                      4⤵
                        PID:464
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:1
                        4⤵
                          PID:2828
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:8
                          4⤵
                            PID:1640
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                            4⤵
                              PID:2496
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff621085460,0x7ff621085470,0x7ff621085480
                                5⤵
                                  PID:3712
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:8
                                4⤵
                                  PID:2456
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:1
                                  4⤵
                                    PID:1788
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11757493517311800568,114809448539489132,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                                    4⤵
                                      PID:1080
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                    3⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4236
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\LOKWWQ~1.EXE
                                    3⤵
                                      PID:1776
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\87FECA~1.EXE
                                    2⤵
                                      PID:4232
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2000
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:1020

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\PerfLogs\_RECoVERY_+hvbkb.html

                                      Filesize

                                      11KB

                                      MD5

                                      d734bd290b93aa24b7d99cf58c6c7a91

                                      SHA1

                                      dad56c2bd2f10ff8e36d554b1d6a8be2ce46391a

                                      SHA256

                                      e4ecda6e14fed9c33dd89c920553ef40e51fa66118d360b5b362ddf02d8b769d

                                      SHA512

                                      f72b219a59b20ed28014d5d3ed8677e3f05fac2b28cb64216d35e5a8071b9190c21e04c8803feac0fb4511e7eda1a1dca4185d1c34876bbf037b3b080160ecf9

                                    • C:\PerfLogs\_RECoVERY_+hvbkb.png

                                      Filesize

                                      64KB

                                      MD5

                                      b6ce1945835d40c501c7cc030c61970e

                                      SHA1

                                      3521ec91de600d24c8accb538b0b39e383cc09af

                                      SHA256

                                      faf5cbd73a51b340901424917050f3496b20a9c07f0db1d7713a1c226b2afe3b

                                      SHA512

                                      8e404f5ea7c7307c2fe9aa703f0eaca1bb03feaad69792b0f8c5974d0aeb336d22c101eaf44bdf1d8928486137090ac77c4a0b7f8f5ab93989c706bc678a7236

                                    • C:\PerfLogs\_RECoVERY_+hvbkb.txt

                                      Filesize

                                      1KB

                                      MD5

                                      5a37fc036d0a6b10377e3656a6587e59

                                      SHA1

                                      4ca670dfea3d3a36ef5061e8ff32db3ed40551e5

                                      SHA256

                                      cf41f0b5f854716e1148a0ef6bf244e8dbe875d06672f4463cd2a8eff8adaac0

                                      SHA512

                                      8e4545ec8c464570e78680d5b5c109f15b11207e4cb0a8f620392af7775e92c601099bafd7145154738e9c943c4e0cabe4348bd923bb0eb722ddb046bb80addc

                                    • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

                                      Filesize

                                      11KB

                                      MD5

                                      90d6d689508712b1af00c0dc3c0863a9

                                      SHA1

                                      9549f14829254fbed9d3e0751bc4b71154c58631

                                      SHA256

                                      e1c6ce92c78b58836cada326fb6fe0278f2dcc3a04bccd68816acfcce49b2794

                                      SHA512

                                      6817a3e0c5114a3ccf81308e6af0185a65a84dd94b4744ed3a08d2420b2ab9b8ea29d635dd4168c1f17947218120b7790223b4739c3e6e095ea0f281dbe4fcc0

                                    • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                      Filesize

                                      107KB

                                      MD5

                                      0f58546c4a18a4805350ddde792bd355

                                      SHA1

                                      1fbedb6d8b021f677390b477318c7c0dd099706c

                                      SHA256

                                      7ccc5ac1e1a93c5d2cb7f8b3d3080cf55835c40a62ecd9cd3692c29a88ff97c3

                                      SHA512

                                      d39a4d78313282886b9d8112e31fcce1722f388f4efc21ce2b684a01bd323de86ab3d1c4211e8a20bf21c0b52e13af664af2ff0d92246ced9daed3de41c97b8f

                                    • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt

                                      Filesize

                                      173KB

                                      MD5

                                      c2800f97e582988c5e1a3c43a5e4566b

                                      SHA1

                                      6f447845a9ab86288f92f5fb533e98dfdb56144d

                                      SHA256

                                      e612a76fc6759691e4798e82298087e41612fbcbaa986101c99a9725c69cc87b

                                      SHA512

                                      251d75fd4fab59cfbbec96e767314a1b2a7e9fd0e79323a14da269c97c19b5f9a5ba5e3335f6054921232b13be27a0c92e464c2df2aee625331f52073da1cfe6

                                    • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                      Filesize

                                      416B

                                      MD5

                                      df20559c217a8050b562f1adb719df64

                                      SHA1

                                      00450e66274a512b6333c56f1b88a4d6e02c14f3

                                      SHA256

                                      5bed8104727ef6e94ab7b2da95d679cc8775ca98514fb4946e6d26ac724af468

                                      SHA512

                                      26838b8a9413f3fcbd14ea1d37e9a8fa95203cad6e70e99b6d58ed4359ce09fb2e20a708c545f0b927cbc8bf86d932ceeb08ddc61ea8eee7a5fa25d7b945bc2e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\_RECoVERY_+hvbkb.html

                                      Filesize

                                      11KB

                                      MD5

                                      d734bd290b93aa24b7d99cf58c6c7a91

                                      SHA1

                                      dad56c2bd2f10ff8e36d554b1d6a8be2ce46391a

                                      SHA256

                                      e4ecda6e14fed9c33dd89c920553ef40e51fa66118d360b5b362ddf02d8b769d

                                      SHA512

                                      f72b219a59b20ed28014d5d3ed8677e3f05fac2b28cb64216d35e5a8071b9190c21e04c8803feac0fb4511e7eda1a1dca4185d1c34876bbf037b3b080160ecf9

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\_RECoVERY_+hvbkb.png

                                      Filesize

                                      64KB

                                      MD5

                                      b6ce1945835d40c501c7cc030c61970e

                                      SHA1

                                      3521ec91de600d24c8accb538b0b39e383cc09af

                                      SHA256

                                      faf5cbd73a51b340901424917050f3496b20a9c07f0db1d7713a1c226b2afe3b

                                      SHA512

                                      8e404f5ea7c7307c2fe9aa703f0eaca1bb03feaad69792b0f8c5974d0aeb336d22c101eaf44bdf1d8928486137090ac77c4a0b7f8f5ab93989c706bc678a7236

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics\_RECoVERY_+hvbkb.txt

                                      Filesize

                                      1KB

                                      MD5

                                      5a37fc036d0a6b10377e3656a6587e59

                                      SHA1

                                      4ca670dfea3d3a36ef5061e8ff32db3ed40551e5

                                      SHA256

                                      cf41f0b5f854716e1148a0ef6bf244e8dbe875d06672f4463cd2a8eff8adaac0

                                      SHA512

                                      8e4545ec8c464570e78680d5b5c109f15b11207e4cb0a8f620392af7775e92c601099bafd7145154738e9c943c4e0cabe4348bd923bb0eb722ddb046bb80addc

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      5a10efe23009825eadc90c37a38d9401

                                      SHA1

                                      fd98f2ca011408d4b43ed4dfd5b6906fbc7b87c0

                                      SHA256

                                      05e135dee0260b4f601a0486401b64ff8653875d74bf259c2da232550dbfb4f5

                                      SHA512

                                      89416a3f5bf50cd4a432ac72cd0a7fb79d5aeb10bdcc468c55bbfa79b9f43fab17141305d44cb1fe980ec76cc6575c27e2bcfcbad5ccd886d45b9de03fb9d6d7

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      c1a3c45dc07f766430f7feaa3000fb18

                                      SHA1

                                      698a0485bcf0ab2a9283d4ebd31ade980b0661d1

                                      SHA256

                                      adaba08026551b1b8f6c120143686da79f916d02adbef4a8d1c184e32a19fd48

                                      SHA512

                                      9fc93f01ab4b14f555791d757ffe881787cc697102547c61847552e597e206e70c6d35fedff559c72a0a67d1b95e769095ecb0a8a7d4f07cf58a7a0d57d3e9f4

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\_RECoVERY_+hvbkb.html

                                      Filesize

                                      11KB

                                      MD5

                                      d734bd290b93aa24b7d99cf58c6c7a91

                                      SHA1

                                      dad56c2bd2f10ff8e36d554b1d6a8be2ce46391a

                                      SHA256

                                      e4ecda6e14fed9c33dd89c920553ef40e51fa66118d360b5b362ddf02d8b769d

                                      SHA512

                                      f72b219a59b20ed28014d5d3ed8677e3f05fac2b28cb64216d35e5a8071b9190c21e04c8803feac0fb4511e7eda1a1dca4185d1c34876bbf037b3b080160ecf9

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\_RECoVERY_+hvbkb.png

                                      Filesize

                                      64KB

                                      MD5

                                      b6ce1945835d40c501c7cc030c61970e

                                      SHA1

                                      3521ec91de600d24c8accb538b0b39e383cc09af

                                      SHA256

                                      faf5cbd73a51b340901424917050f3496b20a9c07f0db1d7713a1c226b2afe3b

                                      SHA512

                                      8e404f5ea7c7307c2fe9aa703f0eaca1bb03feaad69792b0f8c5974d0aeb336d22c101eaf44bdf1d8928486137090ac77c4a0b7f8f5ab93989c706bc678a7236

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\_RECoVERY_+hvbkb.txt

                                      Filesize

                                      1KB

                                      MD5

                                      5a37fc036d0a6b10377e3656a6587e59

                                      SHA1

                                      4ca670dfea3d3a36ef5061e8ff32db3ed40551e5

                                      SHA256

                                      cf41f0b5f854716e1148a0ef6bf244e8dbe875d06672f4463cd2a8eff8adaac0

                                      SHA512

                                      8e4545ec8c464570e78680d5b5c109f15b11207e4cb0a8f620392af7775e92c601099bafd7145154738e9c943c4e0cabe4348bd923bb0eb722ddb046bb80addc

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                      Filesize

                                      70KB

                                      MD5

                                      e5e3377341056643b0494b6842c0b544

                                      SHA1

                                      d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                      SHA256

                                      e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                      SHA512

                                      83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnk

                                      Filesize

                                      2KB

                                      MD5

                                      67c0394b134356271ba8ce23be9c7938

                                      SHA1

                                      8dea6cc13a5cd2caee68c165d476ef910a74b791

                                      SHA256

                                      c3b79e48d4a4ce32cf3fef29a3bc37d3798485ec65158a1f413279d8d34ad531

                                      SHA512

                                      8872839a9cb0507e9651ecc67da80180a3639c9b8916e3f9d66328d84083c403988f5788d91fae2c34b419a04b886faa2b157b7fe07dfd290ad671fdb47781e1

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      111B

                                      MD5

                                      285252a2f6327d41eab203dc2f402c67

                                      SHA1

                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                      SHA256

                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                      SHA512

                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      abb83e002f6dcad5013384f7e50b6501

                                      SHA1

                                      5f699f052fd03e4cb84d7a000d1ebdfb1e4034db

                                      SHA256

                                      57fef46d3189d45ee699d483c7ea75cd126acbb4e0cac42d76d1beec1ae80aac

                                      SHA512

                                      2a44838c041adff9fc342e7f5b866a83af7b58d97ec05ad0eab57967698c5fbdf1f051369b74674c6c0939ad186672ea0e05bb3ac2db774608ead5ef6ef9e4c6

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      4KB

                                      MD5

                                      ff2c18acaff2dcdde6c02b7c51ab192b

                                      SHA1

                                      954fc77377b22f66f77907f4344264fb3c41baf7

                                      SHA256

                                      85294fd357725174387bef2b33b242b6285d509acacdfc3f0ae665fc6ac9149b

                                      SHA512

                                      8c39ddf62c41b2ea29048fba1d50eb57b3e5277bcb204edcb467e76a6727fec0c9041247aecb26b65b067a430fed9b9784d754aa37536d9c16c3f6a8032b035e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                      Filesize

                                      24KB

                                      MD5

                                      5edab6d3ffbeee247ccb4423f929a323

                                      SHA1

                                      a4ad201d149d59392a2a3163bd86ee900e20f3d9

                                      SHA256

                                      460cddb95ea1d9bc8d95d295dd051b49a1436437a91ddec5f131235b2d516933

                                      SHA512

                                      263fa99f03ea1ef381ca19f10fbe0362c1f9c129502dc6b730b076cafcf34b40a70ee8a0ee9446ec9c89c3a2d9855450609ec0f8cf9d0a1b2aebdd12be58d38c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                                      Filesize

                                      41B

                                      MD5

                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                      SHA1

                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                      SHA256

                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                      SHA512

                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      206702161f94c5cd39fadd03f4014d98

                                      SHA1

                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                      SHA256

                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                      SHA512

                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      12KB

                                      MD5

                                      696460d12ae8ca4c231aa87537707f72

                                      SHA1

                                      01a4068aee6781bc9c4dad648a1ebee32628239c

                                      SHA256

                                      9b4e84357cfb6a000c87562476aa03c10f45b363929b6beeef74b58725b98ff4

                                      SHA512

                                      967a6847af33d918e0843e16ba8c106e1b132e241caf50c2902b76c80100d66dda7010b12991409ed669453ce3b2236d250d4be42980640671b9a5b54416a1e3

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      b408c407b9e980bd11c9ba7417b3514f

                                      SHA1

                                      68566244659383d68e4eec16f3b6b6ce982897ca

                                      SHA256

                                      6d5789bdbc9fe1cf203abd3d6ae26ee3d7a9ea5117c5527ec85a1fa50a7c6a1d

                                      SHA512

                                      1d3a46637f4bc24af6c8753cfbe0f13e424e25843c5baa85a094daf818fe5db0b3907a0fc59482ef7743b9e1246eded37aadb754b94913818d32ea7ff54f5818

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133214215747236848.txt

                                      Filesize

                                      77KB

                                      MD5

                                      35c7bd13a66dd3c5128127a77ba2a97e

                                      SHA1

                                      ef06c963a7fe758749bfc6fa9c82a9cabd58a4f5

                                      SHA256

                                      15fbcdc2562d947ec3194aeb0fb666d2a631ec75a8428d188294ecb209e35916

                                      SHA512

                                      5909b9f56348223fa26fcf1a4082a71eb44e5cea86cb6e4a3f86c748dac50d79c252ff9d23cd0bbe6ef2b99db58f3a199382a6c475091ab903ff0f223abff81b

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133214227220684585.txt

                                      Filesize

                                      75KB

                                      MD5

                                      a3e751ae125fb06148fe00359d03a662

                                      SHA1

                                      be5205c097d97dfdfbc5d00b5d054a2c0b081eed

                                      SHA256

                                      a30e56dcf88c81e6862e0d848e538d5c9a119b612a1373c0780ca251b4d3d7ff

                                      SHA512

                                      8c500384a838b338ed5e90a80361c8655bd820d2f5cbb39bc2211910c0ead90ccefbcd47a173d425d79264d430d956e66d65467fd187b2c81b0b1adb8e66c0eb

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECoVERY_+hvbkb.html

                                      Filesize

                                      11KB

                                      MD5

                                      d734bd290b93aa24b7d99cf58c6c7a91

                                      SHA1

                                      dad56c2bd2f10ff8e36d554b1d6a8be2ce46391a

                                      SHA256

                                      e4ecda6e14fed9c33dd89c920553ef40e51fa66118d360b5b362ddf02d8b769d

                                      SHA512

                                      f72b219a59b20ed28014d5d3ed8677e3f05fac2b28cb64216d35e5a8071b9190c21e04c8803feac0fb4511e7eda1a1dca4185d1c34876bbf037b3b080160ecf9

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECoVERY_+hvbkb.png

                                      Filesize

                                      64KB

                                      MD5

                                      b6ce1945835d40c501c7cc030c61970e

                                      SHA1

                                      3521ec91de600d24c8accb538b0b39e383cc09af

                                      SHA256

                                      faf5cbd73a51b340901424917050f3496b20a9c07f0db1d7713a1c226b2afe3b

                                      SHA512

                                      8e404f5ea7c7307c2fe9aa703f0eaca1bb03feaad69792b0f8c5974d0aeb336d22c101eaf44bdf1d8928486137090ac77c4a0b7f8f5ab93989c706bc678a7236

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\_RECoVERY_+hvbkb.txt

                                      Filesize

                                      1KB

                                      MD5

                                      5a37fc036d0a6b10377e3656a6587e59

                                      SHA1

                                      4ca670dfea3d3a36ef5061e8ff32db3ed40551e5

                                      SHA256

                                      cf41f0b5f854716e1148a0ef6bf244e8dbe875d06672f4463cd2a8eff8adaac0

                                      SHA512

                                      8e4545ec8c464570e78680d5b5c109f15b11207e4cb0a8f620392af7775e92c601099bafd7145154738e9c943c4e0cabe4348bd923bb0eb722ddb046bb80addc

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+hvbkb.html

                                      Filesize

                                      11KB

                                      MD5

                                      d734bd290b93aa24b7d99cf58c6c7a91

                                      SHA1

                                      dad56c2bd2f10ff8e36d554b1d6a8be2ce46391a

                                      SHA256

                                      e4ecda6e14fed9c33dd89c920553ef40e51fa66118d360b5b362ddf02d8b769d

                                      SHA512

                                      f72b219a59b20ed28014d5d3ed8677e3f05fac2b28cb64216d35e5a8071b9190c21e04c8803feac0fb4511e7eda1a1dca4185d1c34876bbf037b3b080160ecf9

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+hvbkb.png

                                      Filesize

                                      64KB

                                      MD5

                                      b6ce1945835d40c501c7cc030c61970e

                                      SHA1

                                      3521ec91de600d24c8accb538b0b39e383cc09af

                                      SHA256

                                      faf5cbd73a51b340901424917050f3496b20a9c07f0db1d7713a1c226b2afe3b

                                      SHA512

                                      8e404f5ea7c7307c2fe9aa703f0eaca1bb03feaad69792b0f8c5974d0aeb336d22c101eaf44bdf1d8928486137090ac77c4a0b7f8f5ab93989c706bc678a7236

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\_RECoVERY_+hvbkb.txt

                                      Filesize

                                      1KB

                                      MD5

                                      5a37fc036d0a6b10377e3656a6587e59

                                      SHA1

                                      4ca670dfea3d3a36ef5061e8ff32db3ed40551e5

                                      SHA256

                                      cf41f0b5f854716e1148a0ef6bf244e8dbe875d06672f4463cd2a8eff8adaac0

                                      SHA512

                                      8e4545ec8c464570e78680d5b5c109f15b11207e4cb0a8f620392af7775e92c601099bafd7145154738e9c943c4e0cabe4348bd923bb0eb722ddb046bb80addc

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECoVERY_+hvbkb.html

                                      Filesize

                                      11KB

                                      MD5

                                      d734bd290b93aa24b7d99cf58c6c7a91

                                      SHA1

                                      dad56c2bd2f10ff8e36d554b1d6a8be2ce46391a

                                      SHA256

                                      e4ecda6e14fed9c33dd89c920553ef40e51fa66118d360b5b362ddf02d8b769d

                                      SHA512

                                      f72b219a59b20ed28014d5d3ed8677e3f05fac2b28cb64216d35e5a8071b9190c21e04c8803feac0fb4511e7eda1a1dca4185d1c34876bbf037b3b080160ecf9

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECoVERY_+hvbkb.png

                                      Filesize

                                      64KB

                                      MD5

                                      b6ce1945835d40c501c7cc030c61970e

                                      SHA1

                                      3521ec91de600d24c8accb538b0b39e383cc09af

                                      SHA256

                                      faf5cbd73a51b340901424917050f3496b20a9c07f0db1d7713a1c226b2afe3b

                                      SHA512

                                      8e404f5ea7c7307c2fe9aa703f0eaca1bb03feaad69792b0f8c5974d0aeb336d22c101eaf44bdf1d8928486137090ac77c4a0b7f8f5ab93989c706bc678a7236

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECoVERY_+hvbkb.txt

                                      Filesize

                                      1KB

                                      MD5

                                      5a37fc036d0a6b10377e3656a6587e59

                                      SHA1

                                      4ca670dfea3d3a36ef5061e8ff32db3ed40551e5

                                      SHA256

                                      cf41f0b5f854716e1148a0ef6bf244e8dbe875d06672f4463cd2a8eff8adaac0

                                      SHA512

                                      8e4545ec8c464570e78680d5b5c109f15b11207e4cb0a8f620392af7775e92c601099bafd7145154738e9c943c4e0cabe4348bd923bb0eb722ddb046bb80addc

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                      Filesize

                                      3KB

                                      MD5

                                      76d02132f3e20ce0810cbbab07a39902

                                      SHA1

                                      60b69ad05501ec47ae24caa7d8294cc94b6b3f09

                                      SHA256

                                      af4b7f74abaf3cfc3a1a641c950906bfa1ad408c312fbb432955f60a8f46ed5e

                                      SHA512

                                      51ad4b677e1a6d1e628285555e7085ee8a7a9b5a2dac548d47626ba89d931b1cd6364dc6fa370e2fdf51c960a5b58e254cfb90c30095b1ca186a4185f29dc563

                                    • C:\Users\Admin\Desktop\RECOVERY.HTM

                                      Filesize

                                      11KB

                                      MD5

                                      d734bd290b93aa24b7d99cf58c6c7a91

                                      SHA1

                                      dad56c2bd2f10ff8e36d554b1d6a8be2ce46391a

                                      SHA256

                                      e4ecda6e14fed9c33dd89c920553ef40e51fa66118d360b5b362ddf02d8b769d

                                      SHA512

                                      f72b219a59b20ed28014d5d3ed8677e3f05fac2b28cb64216d35e5a8071b9190c21e04c8803feac0fb4511e7eda1a1dca4185d1c34876bbf037b3b080160ecf9

                                    • C:\Users\Admin\Desktop\RECOVERY.TXT

                                      Filesize

                                      1KB

                                      MD5

                                      5a37fc036d0a6b10377e3656a6587e59

                                      SHA1

                                      4ca670dfea3d3a36ef5061e8ff32db3ed40551e5

                                      SHA256

                                      cf41f0b5f854716e1148a0ef6bf244e8dbe875d06672f4463cd2a8eff8adaac0

                                      SHA512

                                      8e4545ec8c464570e78680d5b5c109f15b11207e4cb0a8f620392af7775e92c601099bafd7145154738e9c943c4e0cabe4348bd923bb0eb722ddb046bb80addc

                                    • C:\Windows\lokwwqbuydkp.exe

                                      Filesize

                                      692KB

                                      MD5

                                      cb28c211ca8292894f3eef43ce5a6cd4

                                      SHA1

                                      70e0bc5fce5534e6dbe5200d9c965c925b596ee3

                                      SHA256

                                      87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d

                                      SHA512

                                      b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd

                                    • C:\Windows\lokwwqbuydkp.exe

                                      Filesize

                                      692KB

                                      MD5

                                      cb28c211ca8292894f3eef43ce5a6cd4

                                      SHA1

                                      70e0bc5fce5534e6dbe5200d9c965c925b596ee3

                                      SHA256

                                      87feca94fc02b098be787060da09fc6f6473221ddf4aaa2f19321db3de256c0d

                                      SHA512

                                      b56c612e389f7b58218a2e66a66bddea55425ed5f99a22921e2a16b2a65ca415f0dc39fbe7c88fffe082ab4bc27923dcea652396cc922d06fd82baea76b356bd