Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe
Resource
win10v2004-20240426-en
General
-
Target
VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe
-
Size
368KB
-
MD5
627ec4f42d9649bc8309d87f03d1c288
-
SHA1
6cd845e8de2c2197cbab48f94eea823f88b0efd9
-
SHA256
3503e011b2844b6eb3f18b3a7c0965ff07171ac6af2488fcf03c0e69d95cd066
-
SHA512
62899ac229fbfff6cd6ace9610b6d6dc027cc32ffe5b7b2c08fb3445815e134caec32047e0a5129118675f22b32aed516fc877b33c90da98261eb44f119a74bd
-
SSDEEP
6144:e680E92oeOE4G63VEuFwm+DDrhd3wbYqaUq/JyKSmi97Msg4piwbBS9lkw86C:e68PIHt6DObD5dmYqarImi9jB4SBylkN
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\_ReCoVeRy_+rrrku.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/727A811BF4B2B4DA
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/727A811BF4B2B4DA
http://yyre45dbvn2nhbefbmh.begumvelic.at/727A811BF4B2B4DA
http://xlowfznrg4wf7dli.ONION/727A811BF4B2B4DA
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (868) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ybbvnmxxrmwu.exeVirusShare_627ec4f42d9649bc8309d87f03d1c288.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation ybbvnmxxrmwu.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe -
Drops startup file 6 IoCs
Processes:
ybbvnmxxrmwu.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe -
Executes dropped EXE 2 IoCs
Processes:
ybbvnmxxrmwu.exeybbvnmxxrmwu.exepid process 4064 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ybbvnmxxrmwu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rkfwriy = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\ybbvnmxxrmwu.exe" ybbvnmxxrmwu.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
VirusShare_627ec4f42d9649bc8309d87f03d1c288.exeybbvnmxxrmwu.exedescription pid process target process PID 2392 set thread context of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 4064 set thread context of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ybbvnmxxrmwu.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EVRGREEN\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\BadgeLogo.scale-100.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Autogen\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pl\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\animations\OneNoteFirstRunCarousel_Animation1.mp4 ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeTile.scale-200_contrast-black.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-24_altform-unplated.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-64_contrast-white.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\meBoot.min.js ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fil-PH\View3d\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_scale-100.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageSmallTile.scale-200_contrast-black.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\StartScreen\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubMedTile.scale-100.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\VideoLAN\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-20_altform-lightunplated.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\images\NoConnection.scale-100.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\LayersControl\ThumbRoad.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-48.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\fr.pak ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Call_Reconnected_Loud.m4a ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Mutable\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailWideTile.scale-125.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarSplashLogo.scale-250.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogo.contrast-black_scale-100.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\is-IS\View3d\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-100.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Light.scale-250.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Toolkit\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\it\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteNewNoteMedTile.scale-125.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_Dtmf_7.m4a ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-125_contrast-white.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hu-HU\View3d\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-GoogleCloudCache.scale-100.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Java\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-white\LargeTile.scale-125.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SLATE\_ReCoVeRy_+rrrku.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\AppxMetadata\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATER\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Weather_LogoSmall.scale-200.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Content\SaturationGradient.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\_ReCoVeRy_+rrrku.html ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\OrientationControlConeHover.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\_ReCoVeRy_+rrrku.txt ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Weather_SplashScreen.scale-200.png ybbvnmxxrmwu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\Win10\SplashScreen.scale-200.png ybbvnmxxrmwu.exe -
Drops file in Windows directory 2 IoCs
Processes:
VirusShare_627ec4f42d9649bc8309d87f03d1c288.exedescription ioc process File created C:\Windows\ybbvnmxxrmwu.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe File opened for modification C:\Windows\ybbvnmxxrmwu.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
ybbvnmxxrmwu.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000_Classes\Local Settings ybbvnmxxrmwu.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4388 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ybbvnmxxrmwu.exepid process 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe 4480 ybbvnmxxrmwu.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
VirusShare_627ec4f42d9649bc8309d87f03d1c288.exeybbvnmxxrmwu.exeWMIC.exevssvc.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4912 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe Token: SeDebugPrivilege 4480 ybbvnmxxrmwu.exe Token: SeIncreaseQuotaPrivilege 1704 WMIC.exe Token: SeSecurityPrivilege 1704 WMIC.exe Token: SeTakeOwnershipPrivilege 1704 WMIC.exe Token: SeLoadDriverPrivilege 1704 WMIC.exe Token: SeSystemProfilePrivilege 1704 WMIC.exe Token: SeSystemtimePrivilege 1704 WMIC.exe Token: SeProfSingleProcessPrivilege 1704 WMIC.exe Token: SeIncBasePriorityPrivilege 1704 WMIC.exe Token: SeCreatePagefilePrivilege 1704 WMIC.exe Token: SeBackupPrivilege 1704 WMIC.exe Token: SeRestorePrivilege 1704 WMIC.exe Token: SeShutdownPrivilege 1704 WMIC.exe Token: SeDebugPrivilege 1704 WMIC.exe Token: SeSystemEnvironmentPrivilege 1704 WMIC.exe Token: SeRemoteShutdownPrivilege 1704 WMIC.exe Token: SeUndockPrivilege 1704 WMIC.exe Token: SeManageVolumePrivilege 1704 WMIC.exe Token: 33 1704 WMIC.exe Token: 34 1704 WMIC.exe Token: 35 1704 WMIC.exe Token: 36 1704 WMIC.exe Token: SeIncreaseQuotaPrivilege 1704 WMIC.exe Token: SeSecurityPrivilege 1704 WMIC.exe Token: SeTakeOwnershipPrivilege 1704 WMIC.exe Token: SeLoadDriverPrivilege 1704 WMIC.exe Token: SeSystemProfilePrivilege 1704 WMIC.exe Token: SeSystemtimePrivilege 1704 WMIC.exe Token: SeProfSingleProcessPrivilege 1704 WMIC.exe Token: SeIncBasePriorityPrivilege 1704 WMIC.exe Token: SeCreatePagefilePrivilege 1704 WMIC.exe Token: SeBackupPrivilege 1704 WMIC.exe Token: SeRestorePrivilege 1704 WMIC.exe Token: SeShutdownPrivilege 1704 WMIC.exe Token: SeDebugPrivilege 1704 WMIC.exe Token: SeSystemEnvironmentPrivilege 1704 WMIC.exe Token: SeRemoteShutdownPrivilege 1704 WMIC.exe Token: SeUndockPrivilege 1704 WMIC.exe Token: SeManageVolumePrivilege 1704 WMIC.exe Token: 33 1704 WMIC.exe Token: 34 1704 WMIC.exe Token: 35 1704 WMIC.exe Token: 36 1704 WMIC.exe Token: SeBackupPrivilege 2404 vssvc.exe Token: SeRestorePrivilege 2404 vssvc.exe Token: SeAuditPrivilege 2404 vssvc.exe Token: SeIncreaseQuotaPrivilege 2460 WMIC.exe Token: SeSecurityPrivilege 2460 WMIC.exe Token: SeTakeOwnershipPrivilege 2460 WMIC.exe Token: SeLoadDriverPrivilege 2460 WMIC.exe Token: SeSystemProfilePrivilege 2460 WMIC.exe Token: SeSystemtimePrivilege 2460 WMIC.exe Token: SeProfSingleProcessPrivilege 2460 WMIC.exe Token: SeIncBasePriorityPrivilege 2460 WMIC.exe Token: SeCreatePagefilePrivilege 2460 WMIC.exe Token: SeBackupPrivilege 2460 WMIC.exe Token: SeRestorePrivilege 2460 WMIC.exe Token: SeShutdownPrivilege 2460 WMIC.exe Token: SeDebugPrivilege 2460 WMIC.exe Token: SeSystemEnvironmentPrivilege 2460 WMIC.exe Token: SeRemoteShutdownPrivilege 2460 WMIC.exe Token: SeUndockPrivilege 2460 WMIC.exe Token: SeManageVolumePrivilege 2460 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
VirusShare_627ec4f42d9649bc8309d87f03d1c288.exeVirusShare_627ec4f42d9649bc8309d87f03d1c288.exeybbvnmxxrmwu.exeybbvnmxxrmwu.exemsedge.exedescription pid process target process PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 2392 wrote to memory of 4912 2392 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe PID 4912 wrote to memory of 4064 4912 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe ybbvnmxxrmwu.exe PID 4912 wrote to memory of 4064 4912 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe ybbvnmxxrmwu.exe PID 4912 wrote to memory of 4064 4912 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe ybbvnmxxrmwu.exe PID 4912 wrote to memory of 760 4912 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe cmd.exe PID 4912 wrote to memory of 760 4912 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe cmd.exe PID 4912 wrote to memory of 760 4912 VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe cmd.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4064 wrote to memory of 4480 4064 ybbvnmxxrmwu.exe ybbvnmxxrmwu.exe PID 4480 wrote to memory of 1704 4480 ybbvnmxxrmwu.exe WMIC.exe PID 4480 wrote to memory of 1704 4480 ybbvnmxxrmwu.exe WMIC.exe PID 4480 wrote to memory of 4388 4480 ybbvnmxxrmwu.exe NOTEPAD.EXE PID 4480 wrote to memory of 4388 4480 ybbvnmxxrmwu.exe NOTEPAD.EXE PID 4480 wrote to memory of 4388 4480 ybbvnmxxrmwu.exe NOTEPAD.EXE PID 4480 wrote to memory of 1352 4480 ybbvnmxxrmwu.exe msedge.exe PID 4480 wrote to memory of 1352 4480 ybbvnmxxrmwu.exe msedge.exe PID 1352 wrote to memory of 4852 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 4852 1352 msedge.exe msedge.exe PID 4480 wrote to memory of 2460 4480 ybbvnmxxrmwu.exe WMIC.exe PID 4480 wrote to memory of 2460 4480 ybbvnmxxrmwu.exe WMIC.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe PID 1352 wrote to memory of 284 1352 msedge.exe msedge.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
ybbvnmxxrmwu.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ybbvnmxxrmwu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" ybbvnmxxrmwu.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_627ec4f42d9649bc8309d87f03d1c288.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\ybbvnmxxrmwu.exeC:\Windows\ybbvnmxxrmwu.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\ybbvnmxxrmwu.exeC:\Windows\ybbvnmxxrmwu.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4480 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT5⤵
- Opens file in notepad (likely ransom note)
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_ReCoVeRy_.HTM5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffe1a46f8,0x7ffffe1a4708,0x7ffffe1a47186⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:26⤵PID:284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:36⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:86⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:16⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:16⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:86⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:86⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:16⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:16⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:16⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15278409920800682210,1094150655736795644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:16⤵PID:3800
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE3⤵PID:760
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5004c6bf177b13c2c62c2dd1ce0e2acf3
SHA1f27822b77b4b848b3b1584f1f27f6e77a118a89a
SHA256d181651d5819b65b33ced68b15f3a294d14b340ba86e3bf49f091d6fd3bbbc22
SHA512ab7016aba68ec06454e1bc3f70ed1762adeb3caf40a1b5eb4ecb3cfcb4253947f46dfc216af173ac9f2575150d46f2ead51736078649904219735141090ce783
-
Filesize
64KB
MD5ddd002be90def1ac94fb08f124417aaf
SHA19ea51c26368fd2924ec0abdc1be3864e7dfb2a4f
SHA256009114362184d66c3181ff3a7e58d31de7f9687c1ba89cab3abd1339ee2a7b07
SHA51282455bdcb0f668cf3b66eae53b0885bdb861b35a3549b3e6b3d64d6bb1a029104b34f45fd88d506c22c2893b98af94bc70bff4bfd7564e210fe8f6c0fd5f9f9e
-
Filesize
1KB
MD55f963af5ef6f1414d93f3953cafc4b81
SHA1b198417c173cfcec3af8a2e12836aecd37a9c646
SHA256d62f73e6165f6a94242f966d0598bb1fe32bfea21ee833aeec2aa713a6377dce
SHA51289745c674738f086f77917e003f8c3210c76d87a2e3822652247b013d047e8ebbbf9563667f4d6e1fcc60cebf0a121c811f97d57e1095a8740bc41cd7b831792
-
Filesize
560B
MD57ea327fae10ae235cad9c5a152174005
SHA1e12ea7b4493a0d3631a26366b5e2bb25f7960468
SHA25686cb408cba9e896ee1877a83284c49946975b26fa60349b277c43d0d512b65cf
SHA51286df8723f2faa6d62552b3524674b09c7d131f1595214e2a7a3276879ec6c80765b45bed511ae2dad513ce771af9b90b597498e1b90d674cf20484e7b4966a10
-
Filesize
560B
MD59845e1dcc52595f3bd5acd2f98b3b1a8
SHA1cb860b7a23de02b8204713e2bab919962edf2a28
SHA2563874d10fb6bed4624232fde9f28d167cdec5582b0da75d90359383d1297c2434
SHA512d308b6bf85e264fee4ec42de5b45ff7a0c9a33d73a8a725c6f63bab3bc966f3d78132414d5f0d40f44296b85270fd39651a9fbe6705e4e1d2476be785333b752
-
Filesize
416B
MD5916b9daf6515f376e885bae9f5edf6e4
SHA17c9ccc954b985d8cd5929759e1a580eb206f26e0
SHA256ef9f4242831a7016d46b723dfde24a7a78159fb31e89ebd0d2f966cb7fcedeeb
SHA512c745af594192052f0abde6daf5289f3b0250f30b3ac496a8541c1d31af26534836d770ff7e086b4b35d42982e8a672c0ee233c91a48c7816f91469aa8b282377
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
5KB
MD5506b9ed8471fd52211e48e5b66f1906c
SHA1ef411707a7eb64a59fd008bd692b074c7db76740
SHA256fef6009072b1831447280f0780c343afd47697ea43a0d69fdd49bfbe6015b4e9
SHA512b82240e6c58daf0996bb10ea12432cb58071d086edf51e41610edf55d2b292f196e237d4317b99b05f40eb9f102b8762e8991a289a6a1be229f816a7074ae7c7
-
Filesize
6KB
MD5a5ef824edc40e1eaba63bc1d31b0dd51
SHA18aeb15c9cba834ae6048d29558fcb9c2faea7aa1
SHA25611152017fd2e21f144e27857375db95397b1b8a47611163b0419c5b0b179e7a0
SHA51269390451dd35f35e3b612d57954021b669986b7ade6a241a890abb8be5aa5e09b644d3f5893ede7119bccf6bb5e6e88628a343df511bdefb1aba4e266cdaf1ae
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD516e016c6eea6bff9a6beb5f1dd35541f
SHA1bca6b6fcb71a10537834fba2fe36456447cd0f2b
SHA25698e5f214d59ac306ea080b2ac499b1eb9e042c5c345dc8a52c57c3405554adc6
SHA51276a96528b25e6a4d6fcdf62b662b97eaeecd0e404897050a101e4961aaead1b305fe05121fabfe583c020308765e3ec23bf03be2c5f8d640d92ad0af27f7aa66
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133586088054759135.txt
Filesize47KB
MD572c58d61bac82b33adfd463a48c3f77c
SHA18dbef38b2e4b8703f4a4430123718d37d18850dd
SHA2567e5d761a2d159c6f13dc32b794a28272706e2cfe0a9a193aae75458502478701
SHA51223afb12399b9c5aa83068dccfd05eef0792cfb5c6c6fbd1afdd919b9787a352a4992d3618e7f7701a0253fbafe2f61af2eb763694079cb3d98c0227d995ebf2c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133586133455468809.txt
Filesize75KB
MD500e22f3e0e7e7fa2c060ec11dfe107c6
SHA1eb0445c348cd6e9f5374090277eea5156d2603f3
SHA2561d3217b3fa262427504c9b84f88c4d752bec5c23cf320ba479459bc7ce88e052
SHA512677e07c5ecc266867486924961d5dc7bc9d1d8f36dcda668a3bbc75bccb54ba58f352ce646f32a5f7a64b33fb9f9bbc4c6b47da7d9a3ee2e6844b65072d26b27
-
Filesize
368KB
MD5627ec4f42d9649bc8309d87f03d1c288
SHA16cd845e8de2c2197cbab48f94eea823f88b0efd9
SHA2563503e011b2844b6eb3f18b3a7c0965ff07171ac6af2488fcf03c0e69d95cd066
SHA51262899ac229fbfff6cd6ace9610b6d6dc027cc32ffe5b7b2c08fb3445815e134caec32047e0a5129118675f22b32aed516fc877b33c90da98261eb44f119a74bd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e