Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-06-2024 11:48

General

  • Target

    VirusShare_97ee4e31ab54dd1286221f66882afc62.exe

  • Size

    388KB

  • MD5

    97ee4e31ab54dd1286221f66882afc62

  • SHA1

    ed782ac0c113e6ee1573539927f3374b8c3e859f

  • SHA256

    4944771164216ccf6811e327befaa3aea12e9247ff731497a94f3c03d5b1b486

  • SHA512

    1e62643409d12493e3e53da846b746496ae55ccd207ae3aebc321744a62717ea8bbe74280ec5d7373a3478ba16bd5763711a002fc8778aaf1a6f068ffd80d1b0

  • SSDEEP

    6144:9YMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:9nSdO0iNEPn+TGOoYzwscMSOXUIJ

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+tengt.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/7B32F5733B9843 2. http://kkd47eh4hdjshb5t.angortra.at/7B32F5733B9843 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/7B32F5733B9843 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/7B32F5733B9843 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/7B32F5733B9843 http://kkd47eh4hdjshb5t.angortra.at/7B32F5733B9843 http://ytrest84y5i456hghadefdsd.pontogrot.com/7B32F5733B9843 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/7B32F5733B9843
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/7B32F5733B9843

http://kkd47eh4hdjshb5t.angortra.at/7B32F5733B9843

http://ytrest84y5i456hghadefdsd.pontogrot.com/7B32F5733B9843

http://xlowfznrg4wf7dli.ONION/7B32F5733B9843

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (867) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_97ee4e31ab54dd1286221f66882afc62.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_97ee4e31ab54dd1286221f66882afc62.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_97ee4e31ab54dd1286221f66882afc62.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_97ee4e31ab54dd1286221f66882afc62.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Windows\eavsyvbbvnxx.exe
        C:\Windows\eavsyvbbvnxx.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3680
        • C:\Windows\eavsyvbbvnxx.exe
          C:\Windows\eavsyvbbvnxx.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2368
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4668
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • Opens file in notepad (likely ransom note)
            PID:704
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4456
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x7c,0x108,0x7ffe605346f8,0x7ffe60534708,0x7ffe60534718
              6⤵
                PID:2204
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:2
                6⤵
                  PID:3904
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:3
                  6⤵
                    PID:440
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8
                    6⤵
                      PID:2248
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:1
                      6⤵
                        PID:1296
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                        6⤵
                          PID:3504
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:8
                          6⤵
                            PID:620
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:8
                            6⤵
                              PID:4388
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:1
                              6⤵
                                PID:4836
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                                6⤵
                                  PID:4840
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:1
                                  6⤵
                                    PID:1868
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,11850893259472916848,9928175189926297963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:1
                                    6⤵
                                      PID:3896
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1224
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\EAVSYV~1.EXE
                                    5⤵
                                      PID:4608
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
                                  3⤵
                                    PID:4340
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4760
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4556

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files\7-Zip\Lang\Recovery+tengt.html

                                    Filesize

                                    9KB

                                    MD5

                                    9a815acb30976b3b25f806e704c8ba5d

                                    SHA1

                                    d25f76cffc0359a3d90c3a2e0460c466edf2650e

                                    SHA256

                                    f96f86e38f1195db0b2bf32fbb2a3cfaa9694125c721ff868de9859561b48b3d

                                    SHA512

                                    db5ac84acb1263c8945f9c10914bb68ec9fc8dca8da1679a0e3b982fc2dfc1cf1eb40a0b8916bcdca979d84429ffe722c98097634ad35590f45b7d2019c0dd1c

                                  • C:\Program Files\7-Zip\Lang\Recovery+tengt.png

                                    Filesize

                                    62KB

                                    MD5

                                    75720df1610dd29f062eda9b58bca0be

                                    SHA1

                                    d9f9fea7443d93a39e9cefcf5f8d0f9797b6f0b1

                                    SHA256

                                    ad8726e91444eb8c6baa3af3a5f9910ac76f8bc1cc22a4b44b2a308dbbd5721b

                                    SHA512

                                    294bc6a4cfb9eac23bc5f10808003a2ff1c132bc4dd9ade50d6bb72787231f0de65389b8be1ba55de22c56c93cf17f8fd8977a2e17892959aa77832f96df860a

                                  • C:\Program Files\7-Zip\Lang\Recovery+tengt.txt

                                    Filesize

                                    1KB

                                    MD5

                                    35a98a1a437b95a6326da196595a8ccd

                                    SHA1

                                    5093ab91cf32bba05f668389e1302ce5d2d4b03a

                                    SHA256

                                    e8fdc90b7c29858ec6ec92a98cf288f91a1f8be1a459f415e6a507c62f496015

                                    SHA512

                                    32adbda24e94a65b00a42afe663587bd5f9078c86918080070ed163f51dbf644b625ed63741260eb91de5a511d3298392ce55727fc228af03afad623791d85ad

                                  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                    Filesize

                                    560B

                                    MD5

                                    a4a4f48ed92830c1b3b4d42c70509a88

                                    SHA1

                                    9bf722f3e5e913e315b815415f62f707304eeb0f

                                    SHA256

                                    9b38692c27dae0074a13613fe4dfee625d1894370a0349f23e0e98fdec1e095d

                                    SHA512

                                    df16685e9cc4e2a735f3a6b99ef47f9eab203e3598b2bea671a59abd49ab23ca0cbb934d8a0f49c0cea16c03be9ddad8396ed70ef55230ba64df1e3672812f53

                                  • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                    Filesize

                                    560B

                                    MD5

                                    fc4edf78b2ae72cddf720d347abeaa33

                                    SHA1

                                    edae7f1a1efeb5c173b801c9ec390d02b988e4b9

                                    SHA256

                                    d4c06d85e909422cebe7d0484df30da387793f189210a5c00c02cb7a370b57f0

                                    SHA512

                                    0635082cb9a940d0d796fb74b2f71b5f41d094d4a5c67be69782b0e9591e2a64b42676ddb220457581f380ed4f53e0833ecb9107f975b2c1bf41e201fc1ab579

                                  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                    Filesize

                                    416B

                                    MD5

                                    cff314a2288aef2ff9740735ed93d2f9

                                    SHA1

                                    117d82cd197d2373fdaccd7139375d223ca07e8e

                                    SHA256

                                    fc832975c3daaf86911e419e217c5cd8752a21a4bcfb8619d4fad18f68234198

                                    SHA512

                                    64f5fc90178adf2e8d1f76ccbd4e88cd85b3d1e0555c622b540a9096545688c3c51165630e904bae5df9f541ae21ac31d9953f1841e26ba9a59fa7692a83e5bc

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    b2a1398f937474c51a48b347387ee36a

                                    SHA1

                                    922a8567f09e68a04233e84e5919043034635949

                                    SHA256

                                    2dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6

                                    SHA512

                                    4a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    1ac52e2503cc26baee4322f02f5b8d9c

                                    SHA1

                                    38e0cee911f5f2a24888a64780ffdf6fa72207c8

                                    SHA256

                                    f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4

                                    SHA512

                                    7670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\156b2436-88d5-47e1-acc6-53aedf96b51f.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    a8f6a26a09ff73acf9d6207eecea77c7

                                    SHA1

                                    cc3ff5e265d5d61fdcee8de53b410b7129fdde66

                                    SHA256

                                    85993229325a179aa80d45d9acf275a8a67fda8ac3c96d64005c9527b56a18f1

                                    SHA512

                                    3bdfc8f11287b27fa8c1d9fd6f0801bf8408d6a0c7928fe77f6a3a626f1778cbde4e9213cef65cd70e2cc24c5c0dfc8de0001c5553d0c4e087d0750e76c9c7bb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    04c87ec852ba9328cdf17cc8cd906084

                                    SHA1

                                    d05a47b305f42ff6e53fa605da2557f9d8a13a7d

                                    SHA256

                                    2a4de8b8fe718752501bc39e072d1790e8091e128e759c8479e50f0e589bc0f8

                                    SHA512

                                    cb10a3edfff0c3cd5a54988e7abf7e3afc5e6efc8bcde0ddae0eb89db48c56eff0a2a34122147d23c3f3f2dc83cd07e1db65fc9c069790a688ed6d757e5f6776

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    35444e5aa768f5a0789c24cc542d5e2d

                                    SHA1

                                    8e0cb5217a389a3eaa1538e7318b4420a44a8a77

                                    SHA256

                                    484298d1827eaa6c7691f5cee07a9fe14e4fd84c161d9ed0a124e8aeda454ce5

                                    SHA512

                                    2ec944d6a1f6104e3993b4e2d16681cd5180350345606209a49ddfcdbaee890cff78b0db9b203a457e9db8981e76733479db27e5e5ff028e590e0f7b7d1af387

                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133586087795228297.txt

                                    Filesize

                                    47KB

                                    MD5

                                    133b3ddc6eed72bff0a44899cbe65be8

                                    SHA1

                                    777c3d8123bd89346e6a7a10df360a6f2c7fa4d2

                                    SHA256

                                    f1679c5064c3e4e61851205a66ab587609c4aa012f31df932b37f64db8cf87c4

                                    SHA512

                                    ccb1e2f9132b4b0f82de9d18263cd25dc22b5a762057c337fb6afab27be63e9558db63f7ff30e98a7ec873caa5c94cbb2185a24eb7cfad39504e86c6a4e07e6d

                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133586106130932495.txt

                                    Filesize

                                    75KB

                                    MD5

                                    57f283883ab2858ac7b5105d9e27bfb4

                                    SHA1

                                    01d932e880bb14a526c5500e111c791208ba3c75

                                    SHA256

                                    887dd83b9fc71fb19a1748878b4a2a01a4f86e1f4ac668e2d7d8d5b7ef9cc118

                                    SHA512

                                    65b4ef1801a4f7b84251e54d68c53e7b41fd205b977b916b4087ab4853b9874370dabcb3195cee06ca04e072298d2a10966af278d7e0cce30591915510c93e1c

                                  • C:\Windows\eavsyvbbvnxx.exe

                                    Filesize

                                    388KB

                                    MD5

                                    97ee4e31ab54dd1286221f66882afc62

                                    SHA1

                                    ed782ac0c113e6ee1573539927f3374b8c3e859f

                                    SHA256

                                    4944771164216ccf6811e327befaa3aea12e9247ff731497a94f3c03d5b1b486

                                    SHA512

                                    1e62643409d12493e3e53da846b746496ae55ccd207ae3aebc321744a62717ea8bbe74280ec5d7373a3478ba16bd5763711a002fc8778aaf1a6f068ffd80d1b0

                                  • \??\pipe\LOCAL\crashpad_4456_CDDKZZVQVYJRDSJZ

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/2368-10389-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-5490-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-446-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-20-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-19-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-17-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-2750-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-10399-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-18-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-10457-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-8879-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-23-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-10390-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2368-10398-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2604-6-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2604-5-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2604-3-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2604-13-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/2604-2-0x0000000000400000-0x0000000000486000-memory.dmp

                                    Filesize

                                    536KB

                                  • memory/3680-12-0x0000000000400000-0x000000000085C000-memory.dmp

                                    Filesize

                                    4.4MB

                                  • memory/4380-0-0x0000000000E20000-0x0000000000E23000-memory.dmp

                                    Filesize

                                    12KB

                                  • memory/4380-4-0x0000000000E20000-0x0000000000E23000-memory.dmp

                                    Filesize

                                    12KB

                                  • memory/4380-1-0x0000000000E20000-0x0000000000E23000-memory.dmp

                                    Filesize

                                    12KB