Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 15:08

General

  • Target

    725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe

  • Size

    488KB

  • MD5

    725ddfb95fd1c510ccb21871cd9836bd

  • SHA1

    3beb5264a7a162896f749f572bb8a967b095c2a9

  • SHA256

    24cac290ff15530f6566eb99ca8eef135bd198f1e7f481a59f3c231b0d7e3b5b

  • SHA512

    69029d4dfc236f8a5392ee47da08fa1b7401a3b8b97eb688671d06aba401c4817705734c79fcc21642a52172ad02592513c127c98defed873aacdfd85050cef2

  • SSDEEP

    12288:dUU7RCmpby4PIrzRxFTuqQ8qZceNsiMkyhU:d19CmCrNxFTuqQhZvi6d

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_ReCoVeRy_+jcmco.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So , there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/5BF6ADFE4BCEBAAA 2 - http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/5BF6ADFE4BCEBAAA 3 - http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/5BF6ADFE4BCEBAAA If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/5BF6ADFE4BCEBAAA 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/5BF6ADFE4BCEBAAA http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/5BF6ADFE4BCEBAAA http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/5BF6ADFE4BCEBAAA Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/5BF6ADFE4BCEBAAA
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/5BF6ADFE4BCEBAAA

http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/5BF6ADFE4BCEBAAA

http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/5BF6ADFE4BCEBAAA

http://xlowfznrg4wf7dli.ONION/5BF6ADFE4BCEBAAA

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (876) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\725ddfb95fd1c510ccb21871cd9836bd_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\klghvwblfxmo.exe
      C:\Windows\klghvwblfxmo.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1624
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:64
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2568
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3972
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff8014146f8,0x7ff801414708,0x7ff801414718
          4⤵
            PID:3036
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
            4⤵
              PID:4704
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
              4⤵
                PID:4104
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8
                4⤵
                  PID:4092
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                  4⤵
                    PID:4612
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
                    4⤵
                      PID:4804
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:8
                      4⤵
                        PID:2292
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:8
                        4⤵
                          PID:1216
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                          4⤵
                            PID:868
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                            4⤵
                              PID:3976
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                              4⤵
                                PID:3564
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11555450505012968245,12450642781335142628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:1
                                4⤵
                                  PID:1692
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1952
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\KLGHVW~1.EXE
                                3⤵
                                  PID:4572
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\725DDF~1.EXE
                                2⤵
                                  PID:4672
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3492
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4708
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:2368

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+jcmco.html

                                    Filesize

                                    11KB

                                    MD5

                                    c3d382314a0d22180e50873032d2cc58

                                    SHA1

                                    b4d0e27d3298bb248e41e5bb8983f5a1209f5019

                                    SHA256

                                    9d064ba9c3754ba9d6b74203c55f493c27cb7ebf026e25143ae38ee993a7cdac

                                    SHA512

                                    13a0e38fd1193e91e385e2aee6f102e88249485c02b1384a1a9115b2e1db20164b3ae58390afb9808eb5ffec2a6c5c32927de43339b59d7cd842407f0bcbae07

                                  • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+jcmco.png

                                    Filesize

                                    64KB

                                    MD5

                                    58889052f58593dae23dfca23b4240bd

                                    SHA1

                                    656a9982f171e62997172ca1fb996f4c753b3679

                                    SHA256

                                    f8286cb320f93ec199834ec07faa97b9c78289bd27cac3fe723998fa85bece58

                                    SHA512

                                    165265a47b8e2c1881ce07e932121af15ad8632cb11bfddd0890345b8d871c56fe3c9c27c0c11417de20cfa787f58f57368c0a2ee47e7a0e2ae7d646ffbd4efd

                                  • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+jcmco.txt

                                    Filesize

                                    1KB

                                    MD5

                                    5826d5cd006678a89b1c15804deec350

                                    SHA1

                                    bd5f0b6b06846cf9f6e96730a7735417d9cc8d86

                                    SHA256

                                    a62cbc923fe721a9dc856279a154194c294fc1aba5dd930facf45cbf38301387

                                    SHA512

                                    2c769cf439e3e86852fcc7c4d1a72b7f471239c4931f2970d6d55814c9d959715283794fcc064f02ccee85b0d3a36872d37d5c1c021d6b24ae8723263cfc9d17

                                  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                    Filesize

                                    560B

                                    MD5

                                    b988170c798a86c347e5e64e7a302dde

                                    SHA1

                                    2cf2250b57e56fd5c2c90b7a134fd4242a6777a1

                                    SHA256

                                    b5452a8475f131bcc6e993db397cb41fb19aa56d0ec54864338f4338fa9f308d

                                    SHA512

                                    670a94562029fade39142b57bc92ee562f4a49d9abc604be50bbc33b5b9a0c8e9c1740f8694d073aff64ee23f871d95dfd54b258603ba530d15d0aeb8739a059

                                  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                    Filesize

                                    560B

                                    MD5

                                    0c1f490520cd16e4e373d5867b4d0759

                                    SHA1

                                    4690151cf09950c8fffc5107787da6d6b865d180

                                    SHA256

                                    faa76e3c122fe1f5119b1e375cdcecfeaf7af8f6f74ad51f6fc6539fb3799ef3

                                    SHA512

                                    af1aeb0a3c5263952cbca93051faa22d4476c6e5f72f0b521a6858ca39eaa54059b36016bbfe15a823256d1a46d6a9a35c6d625811bbd7beb34cd0761a1839e4

                                  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                    Filesize

                                    416B

                                    MD5

                                    e0e18c256634e15b27233bc231084522

                                    SHA1

                                    af107157c6bae2f3cfc99b3a166a2a036f2d6341

                                    SHA256

                                    2a35dd9f739daad8acd152ad97e81204d8c48a87d8d0b8c9ca8b94bd435cd5b8

                                    SHA512

                                    461456a496efc7b8930198160b9a7b732a0748072496768463e788838fce4e2079e2e48cccd453d1d1f42012724493131e934075af59b7cc47517939519af112

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    439b5e04ca18c7fb02cf406e6eb24167

                                    SHA1

                                    e0c5bb6216903934726e3570b7d63295b9d28987

                                    SHA256

                                    247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654

                                    SHA512

                                    d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    a8e767fd33edd97d306efb6905f93252

                                    SHA1

                                    a6f80ace2b57599f64b0ae3c7381f34e9456f9d3

                                    SHA256

                                    c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb

                                    SHA512

                                    07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    654c133474af84d380ec6a2172b81b7d

                                    SHA1

                                    afa7a851123119f2fac165666c37a914c3dd7550

                                    SHA256

                                    8006814c40d4b79e16bb4f99d863168db0022bac3db89532b66ec3b40a95fced

                                    SHA512

                                    5dc04f61e2424cc4fc2da316a4bf1c3da83a05a0b3299154defa6b5158db96a1de72a527fbb9cd0ab14da9c4816245cd25021d87b25ee0d12325360dc02e65f8

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    e8340b60153903ed3488105d6f59bdae

                                    SHA1

                                    ba21110be413d69ebd2b08ce8c031baa20098c5c

                                    SHA256

                                    464b6679f7fd913d78ca10951c282fa0e48b0fc6578e87e8fddc260f263ae51d

                                    SHA512

                                    9cd7177574e375830bea657ce6bd12e5f86815e80d433c0ed1243685430f568714e398d81f486ca3d828ba47f7ad20cd723a7f780320664ba23833a1354a542e

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    206702161f94c5cd39fadd03f4014d98

                                    SHA1

                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                    SHA256

                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                    SHA512

                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    1de57857e8cec9de825d431f3482a913

                                    SHA1

                                    02c16bd603549706701fa9494b3d3f30a3f4494c

                                    SHA256

                                    356123dc9c2fa2bf191ab7ae5e6b18affa807e2fcbed6329ae33310d4809267b

                                    SHA512

                                    bc4ee20970fbbf5a47f6abd364d89d6556ee76831d7d2b493ef35463910a385a65e0133b7bb3f71a104b212161ca94017d38ec607a1fa9b7bf3dec26493c648a

                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596449526171674.txt

                                    Filesize

                                    75KB

                                    MD5

                                    9aad5d6bc5d90091b994b151ba4b1f2a

                                    SHA1

                                    89775f2177d4c41904eebc4669f405ebc24df296

                                    SHA256

                                    60f20a384aad833b8b030c79f97eb3602f2526de73dbc0be2a54aefc8a2e2e8d

                                    SHA512

                                    e91450bfbdbeeb45d355aa33a0059df47930fea57b4153cce33e1b4b1aa65265f9632fb4666c5a37e406488852b125704e6d6379282268d2028ece6ed9dbc1c1

                                  • C:\Windows\klghvwblfxmo.exe

                                    Filesize

                                    488KB

                                    MD5

                                    725ddfb95fd1c510ccb21871cd9836bd

                                    SHA1

                                    3beb5264a7a162896f749f572bb8a967b095c2a9

                                    SHA256

                                    24cac290ff15530f6566eb99ca8eef135bd198f1e7f481a59f3c231b0d7e3b5b

                                    SHA512

                                    69029d4dfc236f8a5392ee47da08fa1b7401a3b8b97eb688671d06aba401c4817705734c79fcc21642a52172ad02592513c127c98defed873aacdfd85050cef2

                                  • \??\pipe\LOCAL\crashpad_3972_CSINSTZETCWHQNFV

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/1572-9-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/1572-10-0x0000000000980000-0x0000000000A06000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/1572-0-0x0000000000980000-0x0000000000A06000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/1572-1-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/1624-10359-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/1624-14-0x0000000002150000-0x00000000021D6000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/1624-9739-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/1624-10403-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/1624-6733-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/1624-4377-0x0000000002150000-0x00000000021D6000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/1624-3827-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB

                                  • memory/1624-1486-0x0000000000400000-0x00000000004CC000-memory.dmp

                                    Filesize

                                    816KB