Analysis

  • max time kernel
    118s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2024 17:26

General

  • Target

    62970d3ad9a12b875acc60a0a8310150N.exe

  • Size

    496KB

  • MD5

    62970d3ad9a12b875acc60a0a8310150

  • SHA1

    fe4a5b2f1e43bb0a4776194765b81309b3b133cb

  • SHA256

    153ba034dc65a8a277f8911c555b8126549e35f40fdf4591bbe07bff8427ba16

  • SHA512

    5e71f110d9dee34126566ff7949726adb3ac06ef996201919e67d1396a3ec324dac18c6bc2a4b947fec961b98ea9ef34e627e6205d9899f7f4f74c689fd8ba47

  • SSDEEP

    12288:sEOgCOhJJJh9x+5Q5oDfXCIWhM9QXpzFq:sEv5JiQ5EfyXm

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_ReCoVeRy_+twywq.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So , there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/8916E28566B6B45 2 - http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/8916E28566B6B45 3 - http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/8916E28566B6B45 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/8916E28566B6B45 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/8916E28566B6B45 http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/8916E28566B6B45 http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/8916E28566B6B45 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/8916E28566B6B45
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/8916E28566B6B45

http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/8916E28566B6B45

http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/8916E28566B6B45

http://xlowfznrg4wf7dli.ONION/8916E28566B6B45

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (882) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\62970d3ad9a12b875acc60a0a8310150N.exe
    "C:\Users\Admin\AppData\Local\Temp\62970d3ad9a12b875acc60a0a8310150N.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Windows\qxidqvofpvox.exe
      C:\Windows\qxidqvofpvox.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:372
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:472
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:4240
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffa0fc346f8,0x7ffa0fc34708,0x7ffa0fc34718
          4⤵
            PID:772
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
            4⤵
              PID:2660
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
              4⤵
                PID:3208
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
                4⤵
                  PID:3964
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1
                  4⤵
                    PID:1880
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
                    4⤵
                      PID:844
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:8
                      4⤵
                        PID:3604
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:8
                        4⤵
                          PID:4468
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                          4⤵
                            PID:4988
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                            4⤵
                              PID:4320
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1
                              4⤵
                                PID:1680
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9768689635654167139,8399931605835492628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:1
                                4⤵
                                  PID:4084
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:444
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\QXIDQV~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4016
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\62970D~1.EXE
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:1700
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4908
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2872
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2684

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+twywq.html

                                Filesize

                                11KB

                                MD5

                                282be0ea12770429ce1122a43476e974

                                SHA1

                                c06f6ce87ca79efa5931541d6456360342ff3a21

                                SHA256

                                fedbcd0781f7e521bb7dd8a1cf1ded33c9988d3d2fea3b6d3d14c767c99b16be

                                SHA512

                                40419e4e4f2ed815906444c54b87a05acc8a956f5d7627816c3d0ae54bb0b01dbb187de50cf3c8767b9db96656edd9f5b9a8f0fe259bbe199a49177005471654

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+twywq.png

                                Filesize

                                64KB

                                MD5

                                6a673b166fc94a0d6a7f9d9591d55a42

                                SHA1

                                cb49dbb9024c897fc97b6eaf3373521601fb315a

                                SHA256

                                33b4cfc4a1394113ae5af266d0fb1f2aa423b4776f95658af68abb6749deb05b

                                SHA512

                                9a6f3defd4b9b7c69cc79fe21e101341962189bd098f7f12eaf30f4d13aec0d3f556620e0f0f31bd1b8cfa9e8f73f6ed327182059210269307cd7cb6c3841b76

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+twywq.txt

                                Filesize

                                1KB

                                MD5

                                3337ef84137c39d80271fdd943c434b5

                                SHA1

                                7add9b4ec2dd5242271e58b896ef34c147c5c617

                                SHA256

                                b2162ff4830f8daf4a020320651c2d35027ac424f94a26682b0c2d5da7b287a9

                                SHA512

                                9b09549e91c686fa3e7c16d3dc997be3a6ab31c84b8a7849bdb5f80963fc56c13559fe2c530f35aa30afcd89c6cc12f0d77cde2f0099e422ae8cf14c45d84c43

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                7e60fdaf681ca928d1d75d95d4c4df58

                                SHA1

                                54d6be07ebde369975c61bd46b91ff31c4a2ca30

                                SHA256

                                54f2279a4ce42f5aef0e219b5e4f5120d7865313dec184b6ac1475b07885cc1e

                                SHA512

                                44a6bf55c463b2d3617dc69c83709bfc73f58a88fd91442063fada010d45a4da12fe35e96dabe23c739c46fa7559accc61673057eeedf06705e9e5f060ddd1e2

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                250263d1c6ee3a26a66114ae87b2fb3d

                                SHA1

                                2e2cb4cde901837d46f1bc4709a828e439d7ccfc

                                SHA256

                                a930bc3cb0681e3146882a22710474025bea172159eccdfbb80ec1c467e90c68

                                SHA512

                                6d9159b80602337fb2762769056b9627431e7cc7d25e3aecece76595fbe4b497c3bf90692945a674d822050fcaebf8b91bf11a95d9582ba58c67ee9135e91ddd

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                0637567889868172a6d53a347abc26f3

                                SHA1

                                ac258e06f2740064d4a5b41848ee26fc7e70b2b7

                                SHA256

                                ed40ae700580b5e95e51708adb40244b9edb28995fe332c6f6b42ed5d8cd4c96

                                SHA512

                                f38d75aa3b1889d891daffe0690c8af8477126cf75b525f2e0eab2826d4b4d82c7b9acc2dafd236e1115f44714b42c89fe1b7e6a754154f031668b0ebe4cfa84

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                719923124ee00fb57378e0ebcbe894f7

                                SHA1

                                cc356a7d27b8b27dc33f21bd4990f286ee13a9f9

                                SHA256

                                aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808

                                SHA512

                                a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                d7114a6cd851f9bf56cf771c37d664a2

                                SHA1

                                769c5d04fd83e583f15ab1ef659de8f883ecab8a

                                SHA256

                                d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e

                                SHA512

                                33bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                a5306781597925ec0c7c9ca2bc68bbd1

                                SHA1

                                0893a5100baf0ba462d80f8a2b23f490590a7ba8

                                SHA256

                                c2e2b9a7770b115a903afdea1711bb7a3be838395927d5becdde9c690a0a28df

                                SHA512

                                591e737e4b1209696a177b3a53215397f876f62a62361228c75d23891354f82d4d931ce060ee1b7d84aa84f440414be5d63f6a20b21fc57d6b3ef0180d2424c7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                caee5481b33c308ac17c5779231fcabb

                                SHA1

                                fd03ee8f087cde06f6d103e12346acac4b0a5e26

                                SHA256

                                e54e65a6ca00d0974229f985353e81c531cb012d6ecf0b4ee3d3b812ce5cce63

                                SHA512

                                c436b8aaefde870b27f6f5da52625e49d78e624c276f679ae08d94a9b2f0ff4a9e9223d59b6e898f76eceac5fc397983665d244d7f3537aae324c6ba9ed85184

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                3145ffe8654539b023dcaaff323d030c

                                SHA1

                                9157359169a5aa34b1331d7a76e491b3a36f5635

                                SHA256

                                5f487c8446d867a58f9c11be6a082885878985e5a6987b4171e23676d653f525

                                SHA512

                                7bd5d6be4901a955ce49962bbea7c5acfa5d48abb25f9f075ecf6928edade7a75678decfae28dc6dcae44f195f581e24a745cff3fd6ae2a4518376aed0b5eafd

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133670756182462133.txt

                                Filesize

                                47KB

                                MD5

                                ddd97833c4da16189152d804ef0271f8

                                SHA1

                                0511c6e3502e894b46729ece3e397da00e09e977

                                SHA256

                                1dea6e2e58b76a651c9eb5af019868fede267b309e2e39b7c33b58867fda43ab

                                SHA512

                                f7688c4f760e142dbdb59e4b7cfd43bfa15a543ad8179a9deb4b1097a0316d35c63d5a092aaa2ffc5e93f1cbe6f48d841b2ffc19eca9eff2fb83ccec7cf8b14b

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133670764368086779.txt

                                Filesize

                                74KB

                                MD5

                                430efb341fb217057eefeae0e04cf155

                                SHA1

                                01c3a4fd76fa7cbbcce4da888bd484648b8ca720

                                SHA256

                                e112816c8c42a14e1444177be325fc08571e3282e5644467d7294e1651ad8d63

                                SHA512

                                31f7a79c7f7927752ef199c6ba8e7029a1c4dbe404f660616005ebb045aedef50ed0863101ee1b8eadb13e971c8f1451413cd751b9099be64f01dce1cb5e2138

                              • C:\Windows\qxidqvofpvox.exe

                                Filesize

                                496KB

                                MD5

                                62970d3ad9a12b875acc60a0a8310150

                                SHA1

                                fe4a5b2f1e43bb0a4776194765b81309b3b133cb

                                SHA256

                                153ba034dc65a8a277f8911c555b8126549e35f40fdf4591bbe07bff8427ba16

                                SHA512

                                5e71f110d9dee34126566ff7949726adb3ac06ef996201919e67d1396a3ec324dac18c6bc2a4b947fec961b98ea9ef34e627e6205d9899f7f4f74c689fd8ba47

                              • memory/372-16-0x00000000021A0000-0x0000000002226000-memory.dmp

                                Filesize

                                536KB

                              • memory/372-2697-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/372-8823-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/372-10483-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/372-10486-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/372-5453-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/372-2390-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/372-10529-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/3816-0-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/3816-1-0x00000000021C0000-0x0000000002246000-memory.dmp

                                Filesize

                                536KB

                              • memory/3816-2-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB

                              • memory/3816-12-0x00000000021C0000-0x0000000002246000-memory.dmp

                                Filesize

                                536KB

                              • memory/3816-11-0x0000000000400000-0x00000000004CE000-memory.dmp

                                Filesize

                                824KB