Analysis

  • max time kernel
    145s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 18:10

General

  • Target

    6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    6bcc066e2a81f34c7e052895001f44c6

  • SHA1

    6f892ec0287ace1c4c7c86e3945b44de6c9d3ba8

  • SHA256

    39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc

  • SHA512

    b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c

  • SSDEEP

    6144:2//b5dx5w2hahQGvPmZ8n0SylbvO+MeTHLlj9HhRbr3ET4b7ODRJT0luqig:SddvwdhHvPmZiyIXgLl3ZoMq4wO

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+kuwtt.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A69347F012CFB5 2. http://tes543berda73i48fsdfsd.keratadze.at/A69347F012CFB5 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/A69347F012CFB5 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/A69347F012CFB5 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A69347F012CFB5 http://tes543berda73i48fsdfsd.keratadze.at/A69347F012CFB5 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/A69347F012CFB5 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/A69347F012CFB5
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/A69347F012CFB5

http://tes543berda73i48fsdfsd.keratadze.at/A69347F012CFB5

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/A69347F012CFB5

http://xlowfznrg4wf7dli.ONION/A69347F012CFB5

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (863) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\6bcc066e2a81f34c7e052895001f44c6_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\xitgaiimrhva.exe
        C:\Windows\xitgaiimrhva.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Windows\xitgaiimrhva.exe
          C:\Windows\xitgaiimrhva.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4500
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1968
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:1444
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1064
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff816b546f8,0x7ff816b54708,0x7ff816b54718
              6⤵
                PID:3520
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
                6⤵
                  PID:3724
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
                  6⤵
                    PID:1920
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:8
                    6⤵
                      PID:5088
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:1
                      6⤵
                        PID:2788
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:1
                        6⤵
                          PID:4508
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                          6⤵
                            PID:296
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                            6⤵
                              PID:1032
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:1
                              6⤵
                                PID:232
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:1
                                6⤵
                                  PID:3092
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:1
                                  6⤵
                                    PID:880
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5480480925696023464,1337722658137936728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3780 /prefetch:1
                                    6⤵
                                      PID:4248
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:916
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\XITGAI~1.EXE
                                    5⤵
                                      PID:2124
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\6BCC06~1.EXE
                                  3⤵
                                    PID:4508
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1876
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4800
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:952

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files\7-Zip\Lang\Recovery+kuwtt.html
                                    Filesize

                                    11KB

                                    MD5

                                    0f739cf0aecfbdf234026fbe1e432633

                                    SHA1

                                    41e72bb741e767ff1b541bc0919278a7581e7f95

                                    SHA256

                                    b05b7da23b59d9acbbf0f3b015cd7b6097a501415bbe072fce97e01d5568ae4a

                                    SHA512

                                    2ec00ac91bbf2cb8a8e38ba758866a1f5d2c4066c55925c9f52c1e36a4029506bf17d50d278e89a35baf6bf038617a9949e4f8a6a5b4b3cf796f789a38b9daeb

                                  • C:\Program Files\7-Zip\Lang\Recovery+kuwtt.png
                                    Filesize

                                    62KB

                                    MD5

                                    518f64a3d24b330d0c5d6cb623073386

                                    SHA1

                                    36936a6a1ba25e89a2fb494c86874695114b5e1a

                                    SHA256

                                    884b92362ea3d19794add913ef292f43ea7f3ab31ab04daf7649fde89ba204f3

                                    SHA512

                                    54835fab9deec46d3d22e6ed437f9841cee5b528155b4369780e91dfaa837847136085effcc646c9236105af3d734ba9f357da8938e6ec1484d4e8986585517a

                                  • C:\Program Files\7-Zip\Lang\Recovery+kuwtt.txt
                                    Filesize

                                    1KB

                                    MD5

                                    e9f157dc48117a3e35954e744feab141

                                    SHA1

                                    9e4c023f618e3502a06ecd2a620b1fe3d39be13a

                                    SHA256

                                    3c5032abd24db6325e5da655749cc1b795c82cdff2ab855c2361a0c3cb8dae4d

                                    SHA512

                                    8bedc2c45451de3d4f21d543340c50bbcf6f932fb541b3a128c4fb7e1f1a7cda3bfd26c45f61854244413d13c4384ad1b94469f5e29d02e43e427de74e4b5cd2

                                  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt
                                    Filesize

                                    560B

                                    MD5

                                    6bcefc67621593b50518d28e4cdddf04

                                    SHA1

                                    1a2aea6f8b522acaa98bbea4a05e27608243673e

                                    SHA256

                                    30690c05275a9606b30b3343f0edec5eb2a799f8801f2812e7295001dded9a82

                                    SHA512

                                    61165e6360b0d4c8358563807b7cd4b2d2e370f5a24cc3cde56edd747ed4aa31ab386169a9a8418ff2872d8b721fee0bcd3c5da136301cd5084a0410ab770788

                                  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt
                                    Filesize

                                    560B

                                    MD5

                                    4c48cfe4538f54c1116d50d3e07ad7f7

                                    SHA1

                                    3e8d059b429131691b1de262175de2e3b76d14f9

                                    SHA256

                                    5a57da2f3f56aa6f0ed4c04eb85f85b3b6f3bee7e9ad130f1d3e8ab42b672cdc

                                    SHA512

                                    e780020e5f66b93594af8af0fd74fd92ff9170aa66c012400bdef5dea61c27343fa891aa8c00ef676150f1a756a652863d978144476ed723bf826284b4e6f75a

                                  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt
                                    Filesize

                                    416B

                                    MD5

                                    3b764e5bca5c4c2a97ea2724b8b940e8

                                    SHA1

                                    d945cc80334756f18d760b24d1dc82a746af0a1a

                                    SHA256

                                    dc88969e284fac4e3b7ba4c043ac24b7b0a859a24068de1a7612a12f314ae171

                                    SHA512

                                    8c24eacde2a8c0d4a3d3e1abd67b2cdc80ef7c0efdef0ae83f2c1f9a8efca1fac63ebc72e08026d3b372f27bc21b703e596d1acff1f2517a27dfb7a4127b1089

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                    Filesize

                                    152B

                                    MD5

                                    439b5e04ca18c7fb02cf406e6eb24167

                                    SHA1

                                    e0c5bb6216903934726e3570b7d63295b9d28987

                                    SHA256

                                    247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654

                                    SHA512

                                    d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                    Filesize

                                    152B

                                    MD5

                                    a8e767fd33edd97d306efb6905f93252

                                    SHA1

                                    a6f80ace2b57599f64b0ae3c7381f34e9456f9d3

                                    SHA256

                                    c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb

                                    SHA512

                                    07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                    Filesize

                                    6KB

                                    MD5

                                    06d7a8fe09a2f792e8a155a254aef1ff

                                    SHA1

                                    3cd0913100fe315ecf8efa99ae3be5df07af53a2

                                    SHA256

                                    19c56f2dad57f2349b933a51a951c76a8b79415f81e0a5e744c5633a5443b27d

                                    SHA512

                                    1ec757f1a43575d9a9df5cd0319017013a9f287b3d6a84c29810294be20e44ec3dc05570622e1bfb1c5651f19b66ea4a63db85b99daeb7aec637c28306ed34b4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                    Filesize

                                    5KB

                                    MD5

                                    5fa9092f2a00d569159795ec3555773a

                                    SHA1

                                    5434158f6e9ad7a143998bcb2744e9e2a32e1b46

                                    SHA256

                                    59b3302993c577263f7cb71e199ba2a116d14b4682ffa511fa9bd991811af6db

                                    SHA512

                                    cf778f8d5408b1ae4e10ed297e23a3a849971ebd6b9ddd9822f8cc0550378cd96632f28d973689aa7d7e7c8313f884dc8ce3eaae25d33921e7ce0e811a454d38

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                    Filesize

                                    11KB

                                    MD5

                                    e4992d5fa5f57e8fee1c96880429ab26

                                    SHA1

                                    773cdb215cc8fa26512ba5bc4e4c40f177c49b40

                                    SHA256

                                    2883a8e900e88ff870cff6b28b096b00ec2b6cb46d21fb36920601dd094c1c74

                                    SHA512

                                    5efe947acd882f47b6738a23607fde2c5c0ead00de7c6654ccbf6d190ce73fdcb6e3dce9a655357ee8b572d830e20c83e0b53006cdebdda5b359560a0f997b7c

                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596449526171674.txt
                                    Filesize

                                    75KB

                                    MD5

                                    f8f8de237779256554331541b72f7fa4

                                    SHA1

                                    3eb5d3e9a5b4669b406f81f2bfce412879286a44

                                    SHA256

                                    0b064292fd8b16230066dde0b5fee861c227ab45de52cba22d923a61ac2ea044

                                    SHA512

                                    36bb7d31cb00ed81a92a248a8a88d47cc2d034de97c7bd9a1300fbeabd3544717965289460aa380e46cf8d2fbe9d0d7fa462f3824f30b0e19a0f522e0ee57c74

                                  • C:\Windows\xitgaiimrhva.exe
                                    Filesize

                                    340KB

                                    MD5

                                    6bcc066e2a81f34c7e052895001f44c6

                                    SHA1

                                    6f892ec0287ace1c4c7c86e3945b44de6c9d3ba8

                                    SHA256

                                    39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc

                                    SHA512

                                    b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c

                                  • \??\pipe\LOCAL\crashpad_1064_LNIDVOOYLKXPMKGJ
                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/1652-0-0x0000000002360000-0x0000000002363000-memory.dmp
                                    Filesize

                                    12KB

                                  • memory/1652-4-0x0000000002360000-0x0000000002363000-memory.dmp
                                    Filesize

                                    12KB

                                  • memory/1908-12-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/1908-5-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/1908-3-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/1908-2-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/1908-1-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4212-11-0x0000000000400000-0x0000000000578000-memory.dmp
                                    Filesize

                                    1.5MB

                                  • memory/4500-617-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-5025-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-8408-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-10359-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-10360-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-10368-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-10369-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-2406-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-23-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-22-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-19-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-16-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-18-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-17-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB

                                  • memory/4500-10448-0x0000000000400000-0x0000000000485000-memory.dmp
                                    Filesize

                                    532KB