Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe
Resource
win10v2004-20240508-en
General
-
Target
VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe
-
Size
340KB
-
MD5
6bcc066e2a81f34c7e052895001f44c6
-
SHA1
6f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
-
SHA256
39a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
-
SHA512
b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c
-
SSDEEP
6144:2//b5dx5w2hahQGvPmZ8n0SylbvO+MeTHLlj9HhRbr3ET4b7ODRJT0luqig:SddvwdhHvPmZiyIXgLl3ZoMq4wO
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\Recovery+kwdye.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/89BCB9CD372FE58E
http://tes543berda73i48fsdfsd.keratadze.at/89BCB9CD372FE58E
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/89BCB9CD372FE58E
http://xlowfznrg4wf7dli.ONION/89BCB9CD372FE58E
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (882) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
VirusShare_6bcc066e2a81f34c7e052895001f44c6.execlfeisylhwkb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation clfeisylhwkb.exe -
Drops startup file 6 IoCs
Processes:
clfeisylhwkb.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\Recovery+kwdye.html clfeisylhwkb.exe -
Executes dropped EXE 2 IoCs
Processes:
clfeisylhwkb.execlfeisylhwkb.exepid process 4224 clfeisylhwkb.exe 3512 clfeisylhwkb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
clfeisylhwkb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rymxsubpwkgm = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\clfeisylhwkb.exe\"" clfeisylhwkb.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
VirusShare_6bcc066e2a81f34c7e052895001f44c6.execlfeisylhwkb.exedescription pid process target process PID 3096 set thread context of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 4224 set thread context of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe -
Drops file in Program Files directory 64 IoCs
Processes:
clfeisylhwkb.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-96_altform-unplated.png clfeisylhwkb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\LargeTile.scale-125.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\subscription_intro\auto-renew.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubMedTile.scale-100_contrast-white.png clfeisylhwkb.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\SmallTile.scale-150.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-30.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Light.scale-100.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\microsoft.system.package.metadata\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\NewComment.png clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AXIS\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-256_altform-unplated.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-36_altform-lightunplated.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Sticker_Sunglasses.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\osf\businessbarclose_16x16x32.png clfeisylhwkb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\WideTile.scale-100.png clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-60.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\km-KH\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\NoProfilePicture.png clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\Delete.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosLogoExtensions.targetsize-40.png clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office\Office16\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\StopReproTraceIcon-glyph-e916.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-30_altform-unplated.png clfeisylhwkb.exe File opened for modification C:\Program Files\Common Files\Services\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\animations\OneNoteFirstRunCarousel_Animation1.mp4 clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-us\styles\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteAppList.targetsize-30_altform-unplated.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\xaml\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-48_altform-unplated.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\Retail\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\uz-Latn-UZ\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\LargeTile.scale-100_contrast-black.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-80.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarBadge.scale-150.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Generic-Light.scale-250.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderMedTile.contrast-white_scale-100.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office 15\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SplashScreen.scale-125_contrast-white.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxLargeTile.scale-150.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_2019.716.2313.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\Recovery+kwdye.txt clfeisylhwkb.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\NewComment.White.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-256.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Recovery+kwdye.png clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sk-SK\View3d\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\Recovery+kwdye.html clfeisylhwkb.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-200_contrast-white.png clfeisylhwkb.exe -
Drops file in Windows directory 2 IoCs
Processes:
VirusShare_6bcc066e2a81f34c7e052895001f44c6.exedescription ioc process File created C:\Windows\clfeisylhwkb.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe File opened for modification C:\Windows\clfeisylhwkb.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
Processes:
clfeisylhwkb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings clfeisylhwkb.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3312 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
clfeisylhwkb.exepid process 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe 3512 clfeisylhwkb.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
VirusShare_6bcc066e2a81f34c7e052895001f44c6.execlfeisylhwkb.exeWMIC.exevssvc.exeWMIC.exedescription pid process Token: SeDebugPrivilege 428 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe Token: SeDebugPrivilege 3512 clfeisylhwkb.exe Token: SeIncreaseQuotaPrivilege 3312 WMIC.exe Token: SeSecurityPrivilege 3312 WMIC.exe Token: SeTakeOwnershipPrivilege 3312 WMIC.exe Token: SeLoadDriverPrivilege 3312 WMIC.exe Token: SeSystemProfilePrivilege 3312 WMIC.exe Token: SeSystemtimePrivilege 3312 WMIC.exe Token: SeProfSingleProcessPrivilege 3312 WMIC.exe Token: SeIncBasePriorityPrivilege 3312 WMIC.exe Token: SeCreatePagefilePrivilege 3312 WMIC.exe Token: SeBackupPrivilege 3312 WMIC.exe Token: SeRestorePrivilege 3312 WMIC.exe Token: SeShutdownPrivilege 3312 WMIC.exe Token: SeDebugPrivilege 3312 WMIC.exe Token: SeSystemEnvironmentPrivilege 3312 WMIC.exe Token: SeRemoteShutdownPrivilege 3312 WMIC.exe Token: SeUndockPrivilege 3312 WMIC.exe Token: SeManageVolumePrivilege 3312 WMIC.exe Token: 33 3312 WMIC.exe Token: 34 3312 WMIC.exe Token: 35 3312 WMIC.exe Token: 36 3312 WMIC.exe Token: SeIncreaseQuotaPrivilege 3312 WMIC.exe Token: SeSecurityPrivilege 3312 WMIC.exe Token: SeTakeOwnershipPrivilege 3312 WMIC.exe Token: SeLoadDriverPrivilege 3312 WMIC.exe Token: SeSystemProfilePrivilege 3312 WMIC.exe Token: SeSystemtimePrivilege 3312 WMIC.exe Token: SeProfSingleProcessPrivilege 3312 WMIC.exe Token: SeIncBasePriorityPrivilege 3312 WMIC.exe Token: SeCreatePagefilePrivilege 3312 WMIC.exe Token: SeBackupPrivilege 3312 WMIC.exe Token: SeRestorePrivilege 3312 WMIC.exe Token: SeShutdownPrivilege 3312 WMIC.exe Token: SeDebugPrivilege 3312 WMIC.exe Token: SeSystemEnvironmentPrivilege 3312 WMIC.exe Token: SeRemoteShutdownPrivilege 3312 WMIC.exe Token: SeUndockPrivilege 3312 WMIC.exe Token: SeManageVolumePrivilege 3312 WMIC.exe Token: 33 3312 WMIC.exe Token: 34 3312 WMIC.exe Token: 35 3312 WMIC.exe Token: 36 3312 WMIC.exe Token: SeBackupPrivilege 4360 vssvc.exe Token: SeRestorePrivilege 4360 vssvc.exe Token: SeAuditPrivilege 4360 vssvc.exe Token: SeIncreaseQuotaPrivilege 1324 WMIC.exe Token: SeSecurityPrivilege 1324 WMIC.exe Token: SeTakeOwnershipPrivilege 1324 WMIC.exe Token: SeLoadDriverPrivilege 1324 WMIC.exe Token: SeSystemProfilePrivilege 1324 WMIC.exe Token: SeSystemtimePrivilege 1324 WMIC.exe Token: SeProfSingleProcessPrivilege 1324 WMIC.exe Token: SeIncBasePriorityPrivilege 1324 WMIC.exe Token: SeCreatePagefilePrivilege 1324 WMIC.exe Token: SeBackupPrivilege 1324 WMIC.exe Token: SeRestorePrivilege 1324 WMIC.exe Token: SeShutdownPrivilege 1324 WMIC.exe Token: SeDebugPrivilege 1324 WMIC.exe Token: SeSystemEnvironmentPrivilege 1324 WMIC.exe Token: SeRemoteShutdownPrivilege 1324 WMIC.exe Token: SeUndockPrivilege 1324 WMIC.exe Token: SeManageVolumePrivilege 1324 WMIC.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
VirusShare_6bcc066e2a81f34c7e052895001f44c6.exeVirusShare_6bcc066e2a81f34c7e052895001f44c6.execlfeisylhwkb.execlfeisylhwkb.exemsedge.exedescription pid process target process PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 3096 wrote to memory of 428 3096 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe PID 428 wrote to memory of 4224 428 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe clfeisylhwkb.exe PID 428 wrote to memory of 4224 428 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe clfeisylhwkb.exe PID 428 wrote to memory of 4224 428 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe clfeisylhwkb.exe PID 428 wrote to memory of 440 428 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe cmd.exe PID 428 wrote to memory of 440 428 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe cmd.exe PID 428 wrote to memory of 440 428 VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe cmd.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 4224 wrote to memory of 3512 4224 clfeisylhwkb.exe clfeisylhwkb.exe PID 3512 wrote to memory of 3312 3512 clfeisylhwkb.exe WMIC.exe PID 3512 wrote to memory of 3312 3512 clfeisylhwkb.exe WMIC.exe PID 3512 wrote to memory of 3312 3512 clfeisylhwkb.exe NOTEPAD.EXE PID 3512 wrote to memory of 3312 3512 clfeisylhwkb.exe NOTEPAD.EXE PID 3512 wrote to memory of 3312 3512 clfeisylhwkb.exe NOTEPAD.EXE PID 3512 wrote to memory of 4528 3512 clfeisylhwkb.exe msedge.exe PID 3512 wrote to memory of 4528 3512 clfeisylhwkb.exe msedge.exe PID 4528 wrote to memory of 1432 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 1432 4528 msedge.exe msedge.exe PID 3512 wrote to memory of 1324 3512 clfeisylhwkb.exe WMIC.exe PID 3512 wrote to memory of 1324 3512 clfeisylhwkb.exe WMIC.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe PID 4528 wrote to memory of 4004 4528 msedge.exe msedge.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
clfeisylhwkb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System clfeisylhwkb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" clfeisylhwkb.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_6bcc066e2a81f34c7e052895001f44c6.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\clfeisylhwkb.exeC:\Windows\clfeisylhwkb.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\clfeisylhwkb.exeC:\Windows\clfeisylhwkb.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3512 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT5⤵
- Opens file in notepad (likely ransom note)
PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7d5c46f8,0x7fff7d5c4708,0x7fff7d5c47186⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:26⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:36⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:86⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:16⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:16⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:86⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:86⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:16⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:16⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:16⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16072084049510204809,11454540843948499920,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:16⤵PID:2676
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE3⤵PID:440
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD59b389cb90e89a8f15d5dcaded0f3cd5c
SHA1291a8c17215e7d6bd83cd7c95943f752ee0aad80
SHA256432a540e43b852b7b2de3a175247ade278533bb51f0c102d5bbcf600d65569c5
SHA5128b41f918f50b623d238e7771d35769334d03ce40269b61fab6128b3c4325b1549fa1d9bf5b7ff107d2a51dc2c18fa5c0fdd3a0504541e90401b54d37aa8e780a
-
Filesize
62KB
MD565e7fd1649b1d232e4cd93770d348bde
SHA1b2edcda61cea38b4b648952450b6c157065f1bc9
SHA256e47bc7905c8e36391cb399c8d16f5eb516f58212453af49d1db5f52718da393b
SHA51241925fb4bc681ff2fb7e54668fc336a2e216fc4abe6050620dfaf47c475b49b59661661b23e1ee95e9bab5d54a870ace9a2507f68199b9a99ae0f46955b05f5e
-
Filesize
1KB
MD59edb1eb718c817f042e20d4ea564f384
SHA1eba03c4e9871f63fa8ad6c1a6fe620d2f2739772
SHA256930ab95d8b19aa6e8d78659ec455550ce2c5b80c4dfd0a2ebf18a3bbaeebf605
SHA51216be818f64edf2ef352a040c2f9ce65683ece23ec50ed8b09c7a81e3b4cf3994b7b13a03e67312dcafa012016ce7d3f57a0d35e47062f99d8c3691fa83165cd9
-
Filesize
560B
MD54ea496a8e82ad0872a1e452267e8b98c
SHA19907e0feb610317cbc14839cbb0969983071e69c
SHA256a83d7d892a7e0c89f0e88735a5e5c821cff8e62be77af4bff7d0378aae022c5f
SHA5129918ef9c08c2a54aa9960187d6a4fa55ff47774fcf080ae4f15c2b41f808fd3adbdf92bf68e32334e0cbb90a106ddf0d70e310645c8c52092a81fced8bf4da57
-
Filesize
560B
MD52b0efd301cb7264f27bc008d6090f7dd
SHA1de278f359407388b407e0fff3b151c93f0ed4cb6
SHA2560fa315b2731506964202aefea8ce5ab8eb0db987ada54cef45ef62d32fb807d4
SHA5126190d5a730fb57ab6ed719d2e70a9248130d3b14d7bff807db1db577e19dd3cdea28165269f45331d6fa5b4f694381ae24e058d9df1ef69dd38a45ad68a5b8c6
-
Filesize
416B
MD51702de7001920d14c13eb8b4cd216d55
SHA112910bcaab20704cde2ba24ad271087b11eb6fb8
SHA2566ce1d35234d3f64db50df7a7769d098d3d55835c1ba18de5b6be81c054dfaf39
SHA512f250c7539f5b366ef08778a5f4445d68e113d6497f1d823de04e7932f3823c92f16a25d7944537622d28b3bb115209ba54781126aa18f9cffc63d1de6ad73724
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2f3189f8-5d13-486a-ae4e-66c3e6ead7f8.tmp
Filesize5KB
MD55d6a4e5c69b7464ff8f9b90027c5abd2
SHA1903bfca8061cd4975fe0a6f5888655f790080c99
SHA2567a1ddbb98ae62cdef7e9a21c74fe641274dac89dbbec00276fb10e4efcecae15
SHA5120dcfd335ddfca3525cceef6d762874fd4a8739553ada41f29b0e9fb38cdfecf06a574709b8db71a6f16789043de1a56a7a9f126ea61994d349e200e8b0d2a51f
-
Filesize
6KB
MD539a3c3d3c7628992b322502d554884cd
SHA1255f452ed48338ec0b356cfd9c03e3c83e723080
SHA256e5d2635588f0d64752b6731177d380320a51d744f8f35abdb5306895b168197a
SHA512bb5ee50fab58bd8326d77485ee12246592d5aa646abcad353f4c350eaf7dc0de2675fca42ab7de29e09accf835fef689ec3b3dda0e9751a24ce5a5a47f3f0d2d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c9a14214c3e6031e4baf1f7b411fe4d4
SHA1403caec2dab6005d7ab1d6f9b93862381a5054ea
SHA2566c88aac5eb338e67444e51ab6a63f5567cfdfef90767a036b5bcc136b60f24db
SHA512c9616992d3adda5bd6876d4801506c9499f8c6b8ba91453ed9e6c331ba8fc308913013fb0e7f117d346cfa81bca5a9f4c87e1005747496e8afe53db3f315f6b2
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133596449526171674.txt
Filesize75KB
MD5bce0b10b7e00dea1ce480fdf88f13734
SHA1ad66648f8809d5c01583134f7325fe65e0d986c5
SHA25695f632c1218b9433be9e4c1abeb18cdb31f1af1f3d170e7a27a28261a0f71a5c
SHA512f096bf49d95b0bc37280c6a278f484ee6f01330918ef8be6f6479cf268e89aad9b42c3901ba91a87addaaf40cf0ebd138f23e1850d5cc6126637e7a9504a568f
-
Filesize
340KB
MD56bcc066e2a81f34c7e052895001f44c6
SHA16f892ec0287ace1c4c7c86e3945b44de6c9d3ba8
SHA25639a70938288eacf5eab1002150cb06a8299475ad6064fb131aa6e9118c66b4bc
SHA512b11b924dfda23d28019879acbd790778049f4f711134b0003967408b28532544745d12081a9da538f9ecd84f3791b621d3d9c1b4a62699b22d7c56274a1f9f2c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e