Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2024 11:19

General

  • Target

    VirusShare_41c9cf8f98d9cf11e0b101562876d404.exe

  • Size

    424KB

  • MD5

    41c9cf8f98d9cf11e0b101562876d404

  • SHA1

    88a88e498b8e4b73e8585e7994ed519b9ace9610

  • SHA256

    bedd09abc5eb323220f26eadbe1ede76373ebd6d8a84fd2884429760b0cd197a

  • SHA512

    78c028c126351716c5460f391d810d5925f9ad36eb3a506b0e3d015bcef9b2a0ed9c3fbec9c3f81a5dc362edf64de5eb377da070712ac720d9ea6350da5af113

  • SSDEEP

    12288:wL2WjWgDhrhjxaRaDz7z4HMLzskGWoXblCJxfS6:wDXpVx7f7dLoMorOR1

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_RECoVERY_+kfrxg.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://yyre45dbvn2nhbefbmh.begumvelic.at/5ABE4B4889768AE0 2. http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/5ABE4B4889768AE0 3. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5ABE4B4889768AE0 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/5ABE4B4889768AE0 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://yyre45dbvn2nhbefbmh.begumvelic.at/5ABE4B4889768AE0 http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/5ABE4B4889768AE0 http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5ABE4B4889768AE0 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/5ABE4B4889768AE0
URLs

http://yyre45dbvn2nhbefbmh.begumvelic.at/5ABE4B4889768AE0

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/5ABE4B4889768AE0

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/5ABE4B4889768AE0

http://xlowfznrg4wf7dli.ONION/5ABE4B4889768AE0

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (877) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_41c9cf8f98d9cf11e0b101562876d404.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_41c9cf8f98d9cf11e0b101562876d404.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Windows\ylpolcebiefk.exe
      C:\Windows\ylpolcebiefk.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3932
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3540
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:4076
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff980c046f8,0x7ff980c04708,0x7ff980c04718
          4⤵
            PID:3868
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
            4⤵
              PID:3544
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
              4⤵
                PID:280
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:8
                4⤵
                  PID:440
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1
                  4⤵
                    PID:2500
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                    4⤵
                      PID:4780
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:8
                      4⤵
                        PID:2412
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:8
                        4⤵
                          PID:2868
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:1
                          4⤵
                            PID:920
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:1
                            4⤵
                              PID:404
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
                              4⤵
                                PID:3176
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,4895169023562454269,26931008080490724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                                4⤵
                                  PID:4988
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3568
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\YLPOLC~1.EXE
                                3⤵
                                  PID:1796
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
                                2⤵
                                  PID:856
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5016
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3660
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4876

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files\7-Zip\Lang\_RECoVERY_+kfrxg.html

                                    Filesize

                                    11KB

                                    MD5

                                    56492073e9d082486c3e5cddc2de095c

                                    SHA1

                                    47b4831fb17c80ead23fbc8c6a6b0e2f6cef45f7

                                    SHA256

                                    3545cd8948ad74bd263045f3ab235e02b9c668b363bdd28f10a2cf785337f054

                                    SHA512

                                    629c06b3381103fdb659ffb11fe6f4e0dd64c751020f3bc048a59e141d82208e46902bde7a2b234d39cf0dedaecaa43f30ef4ab9c17f18b64031a9ea2bcd3f85

                                  • C:\Program Files\7-Zip\Lang\_RECoVERY_+kfrxg.png

                                    Filesize

                                    63KB

                                    MD5

                                    e3930f39912552d5932314734e0e8090

                                    SHA1

                                    0829a4cd8b973f55be348afd06efeeb54962489b

                                    SHA256

                                    c935494fdc9edfc3ed1d1e1c84dcd061dc84df268c374205d5d4c207ab7079ea

                                    SHA512

                                    79c02a4c77bd244d880ed3b861149c38ca7d9fa6d4402cb54920cf283cdbe9e218cd9a9393ed85b78096fcb02b5bfb31e5d009407f2e7bc7ce6047e1b561be2d

                                  • C:\Program Files\7-Zip\Lang\_RECoVERY_+kfrxg.txt

                                    Filesize

                                    1KB

                                    MD5

                                    2edf22db25bebdd7369c060a6606e0eb

                                    SHA1

                                    c948a18352b7dd4c6119509e4729605fb218c83a

                                    SHA256

                                    479bca2b5f45dfb8c32563ee5157a5fae0340dbf28ec0a9f2eabd503947096fd

                                    SHA512

                                    8173a435cf043c7a467ddd54f0a638597d19e5dc2375271749e7de12b5e0fe28e9204211d704357b9f8a83e27e7fb783a0a25e7cc904799b9d0e73d19aea93a6

                                  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                    Filesize

                                    560B

                                    MD5

                                    e0aeb7951226b055ff46bc651708734c

                                    SHA1

                                    67747a0db31a726cbf09b6c6e4e348cfbe376bd3

                                    SHA256

                                    cc27e996f8544dfa3d04974930123a16d471c4cea82554acd66a0151c5030039

                                    SHA512

                                    7f484e7ed2b30965f1d613730b42efcd8804471a8ee00d6a34444fc23b89add5f8fc9f25554da057ccf1904d1b0cc3c749e34b5159c1f539cd75f25a13ef8f00

                                  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                    Filesize

                                    560B

                                    MD5

                                    09f06e698dc05e03b28f8af10d61004f

                                    SHA1

                                    c42ef3a95f18b73e8be2b008ffc3bf5297a07278

                                    SHA256

                                    7508df670ba16f1b384365e33b5dd2284c4cabc75b9a7637bb5930f7d376fe3d

                                    SHA512

                                    ad44e03afae42f402fee2b6e9904f4844889fccf58cd6967e30ea539278feb1ca8865f45eaca81eea3427c3e6daa6d65557c9e3752b3fb9157d7124b2a56ef36

                                  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                    Filesize

                                    416B

                                    MD5

                                    ca41bf87a55a9cd109e647e183e95e89

                                    SHA1

                                    c69535cccbffc17ba279cc4f1f7c14d6a1e7ec8c

                                    SHA256

                                    848c8c3fbcb00890b2e7083a61b9025557068b71d987dcf776e0061eb8414392

                                    SHA512

                                    7daddb79116d7a2f87e8ed42f2ba68201d7102239024a496ff75379ca7b9538c730633aab711838be0a8e87a01eebb235cf2dca0dfaea43788af00af8b0b1331

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    612a6c4247ef652299b376221c984213

                                    SHA1

                                    d306f3b16bde39708aa862aee372345feb559750

                                    SHA256

                                    9d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a

                                    SHA512

                                    34a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    56641592f6e69f5f5fb06f2319384490

                                    SHA1

                                    6a86be42e2c6d26b7830ad9f4e2627995fd91069

                                    SHA256

                                    02d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455

                                    SHA512

                                    c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    b7ccce9195ae8c464bcd4dd42333ffa1

                                    SHA1

                                    90a79813c7b28dc393414a3e272634595c16afff

                                    SHA256

                                    ab673d6e9d47b842d922314723f4f284c5326536e07a6e279f249de03f39d598

                                    SHA512

                                    bd76adb8b6104f29dff30a57dce8eaec575b301e3c9fbb8ed63b75b412bb513f37b8f7f71792136e051cbc6645f3a688c54ebec0ff0abec40a6cbcfe7e1a5ea9

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    60ad570251eb8b825beffc6a0912f2bc

                                    SHA1

                                    8ef4d17f6d76374ad704ff80c83eac47ada87ce7

                                    SHA256

                                    27b41cda6c5507cdb392cf847505e3536c4267959ed588cc260bf3768d5f53a6

                                    SHA512

                                    c164d4ad9201c6557f90e56f1af35f67509d4b5edfe39d63d4eb47393c0ba6056dedd55dc3d7e3aedd2421b4d269106e708f226ec972b6c3098151ac81dfdc16

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    3e1c4fd81537142713c6de2225f4938c

                                    SHA1

                                    ae4ccec1a7f0fd508081e4e7b8e86e1f94c27fd9

                                    SHA256

                                    f70b2d96058d5b9bfaecd41178412a55b1253acf113253b4047fec51c3416afd

                                    SHA512

                                    7dbf16ebba382fb474c19e746b616d0ed567554ff6225da3413136ff83e9e4161db472654e6a64a35c950c03430e3c1298f96fd5acb5e3180067f5db0203662a

                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596440369039129.txt

                                    Filesize

                                    47KB

                                    MD5

                                    8a0724b4b03de5af34f788701010b674

                                    SHA1

                                    a02446863ec7b95e5a14990e16bef026ba68c470

                                    SHA256

                                    89c6e9a4ec23023b40d4980480e3873c0142844fd5f6ee6e331b9e0feaff23b8

                                    SHA512

                                    24bcfacc5b30f9ddb9c9024674933a8c85a18b350ec3f75689deb5f45fc931f876f8ea5091c3d37c25d74f96eaa3d1092d723d559090163fca4d60143cf2cf60

                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596449026566195.txt

                                    Filesize

                                    75KB

                                    MD5

                                    b6e9e74c7fb33fedeec7c9d2197e8084

                                    SHA1

                                    3af6ee61293769b91c61c459624bdbd2efd1bc25

                                    SHA256

                                    f7b20987136f145d92247a7048e831dfad8a72559cf063cf910a28491adeca97

                                    SHA512

                                    ef37666b3e5a97d896c69f59e917c815f5d9caa8111090bee13117e488f792aa11f91b07067c6a3ee210c16e4a5652250453826cf9c7047214ee5635c7353163

                                  • C:\Windows\ylpolcebiefk.exe

                                    Filesize

                                    424KB

                                    MD5

                                    41c9cf8f98d9cf11e0b101562876d404

                                    SHA1

                                    88a88e498b8e4b73e8585e7994ed519b9ace9610

                                    SHA256

                                    bedd09abc5eb323220f26eadbe1ede76373ebd6d8a84fd2884429760b0cd197a

                                    SHA512

                                    78c028c126351716c5460f391d810d5925f9ad36eb3a506b0e3d015bcef9b2a0ed9c3fbec9c3f81a5dc362edf64de5eb377da070712ac720d9ea6350da5af113

                                  • \??\pipe\LOCAL\crashpad_2692_LGFLKKXCUPYTLJLU

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/3932-1883-0x0000000000400000-0x00000000004AE000-memory.dmp

                                    Filesize

                                    696KB

                                  • memory/3932-9455-0x0000000000400000-0x00000000004AE000-memory.dmp

                                    Filesize

                                    696KB

                                  • memory/3932-10363-0x0000000000400000-0x00000000004AE000-memory.dmp

                                    Filesize

                                    696KB

                                  • memory/3932-6734-0x0000000002130000-0x00000000021B5000-memory.dmp

                                    Filesize

                                    532KB

                                  • memory/3932-5726-0x0000000000400000-0x00000000004AE000-memory.dmp

                                    Filesize

                                    696KB

                                  • memory/3932-11-0x0000000002130000-0x00000000021B5000-memory.dmp

                                    Filesize

                                    532KB

                                  • memory/3932-10409-0x0000000000400000-0x00000000004AE000-memory.dmp

                                    Filesize

                                    696KB

                                  • memory/4920-0-0x0000000002240000-0x00000000022C5000-memory.dmp

                                    Filesize

                                    532KB

                                  • memory/4920-9-0x0000000000400000-0x00000000004AE000-memory.dmp

                                    Filesize

                                    696KB

                                  • memory/4920-10-0x0000000002240000-0x00000000022C5000-memory.dmp

                                    Filesize

                                    532KB

                                  • memory/4920-1-0x0000000000400000-0x00000000004AE000-memory.dmp

                                    Filesize

                                    696KB