Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 08:55

General

  • Target

    VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe

  • Size

    418KB

  • MD5

    1a9ab9e924a6856d642bbe88064e4236

  • SHA1

    d9d445e9dcb8694398c7acb33f38d7261c95321c

  • SHA256

    69155f404a1482e4188726cb0f88b6c6fd6ca94d834b31e05f36e88662281e22

  • SHA512

    f41e93d25fe32248f55dbf5c1c721e4af5d2c28531816955094585a00afa94ea2dab0a6e25191abe8896a2185cdbc535d9dcf3beac14b683d05e1c8c7c6f80b2

  • SSDEEP

    6144:/lhEMsxe34/JTpHIOdX2JOVM8aSC4Zl7rOfT+yIaIWk3HtlE0/Ce+Mx62q2jQ1+d:7ssoJhf8JOqQC4/7CfTk/rsh2jQ1T0jv

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_RECoVERY_+srvsh.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/46D25A3A68B79412 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/46D25A3A68B79412 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/46D25A3A68B79412 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/46D25A3A68B79412 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/46D25A3A68B79412 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/46D25A3A68B79412 http://yyre45dbvn2nhbefbmh.begumvelic.at/46D25A3A68B79412 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/46D25A3A68B79412
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/46D25A3A68B79412

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/46D25A3A68B79412

http://yyre45dbvn2nhbefbmh.begumvelic.at/46D25A3A68B79412

http://xlowfznrg4wf7dli.ONION/46D25A3A68B79412

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (880) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Users\Admin\AppData\Local\Temp\VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe
      "C:\Users\Admin\AppData\Local\Temp\VirusShare_1a9ab9e924a6856d642bbe88064e4236.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\ayrukjsewjtn.exe
        C:\Windows\ayrukjsewjtn.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Windows\ayrukjsewjtn.exe
          C:\Windows\ayrukjsewjtn.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2764
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1952
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:2948
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3540
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8f4c46f8,0x7ffe8f4c4708,0x7ffe8f4c4718
              6⤵
                PID:4472
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                6⤵
                  PID:4080
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
                  6⤵
                    PID:3664
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
                    6⤵
                      PID:4364
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:1
                      6⤵
                        PID:1888
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                        6⤵
                          PID:1020
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:8
                          6⤵
                            PID:3020
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:8
                            6⤵
                              PID:1332
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:1
                              6⤵
                                PID:4580
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                                6⤵
                                  PID:4992
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:1
                                  6⤵
                                    PID:2696
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6655216043210202085,12226381116159086966,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                                    6⤵
                                      PID:832
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1376
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\AYRUKJ~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4188
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\VIRUSS~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1624
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4584
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:832
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3572

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+srvsh.html

                                Filesize

                                12KB

                                MD5

                                2df321643d3668854d9ffd5e816a39bc

                                SHA1

                                64014ce819b5500fa12f3fd716401e81380c1ad5

                                SHA256

                                e0e9786bea4a1b341bb1c9f919b3b47bff36e47b8a1e94e6ef6253b6533610df

                                SHA512

                                23fb84c1f3fea85ff33356652370522704927d23ddbfe09689452b1e28b683210f8ed50c37695ffa4571ea82e88d2a4121c4ad99f993dc3a3aaea2094f9afd54

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+srvsh.png

                                Filesize

                                65KB

                                MD5

                                c93481ca4886154651f9aa708c04877e

                                SHA1

                                89bced68f58cb1def2021867bf67d645dfce3d95

                                SHA256

                                016d10c5cdfe5c1c182ce862491a801ccd4ba24ffecb7c1f06a4ed017fc3777c

                                SHA512

                                17189c3c6927398ad6cea5fea593d00479a1823afe5c92e1b47e889de22bb34b9036957aa0c8b748d1eb77f692d62ac2b5ed4ebb99f162b97c351716bf70f1e6

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+srvsh.txt

                                Filesize

                                1KB

                                MD5

                                4a3d7971fde0fd6cd0d320fa91b865ac

                                SHA1

                                03fbef2731b327fb58f1254d7c5481bc20dbb3a6

                                SHA256

                                dc66e7f10cea8e32f89e1fd4eb0bbcc2e976dde1636df7efcd4552848e860c7c

                                SHA512

                                f5fe472be091f2a7de785d9f253a35fd2d4b3dd025ae774f7838f6c0f76df2ef181f5d154113562c37054c2ddf5a9da789e578c1522157f5d62ae1129b640b1e

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                e0de0456483fb42932c56257933a2193

                                SHA1

                                1f77a0ef003b52f355612bcadfe78fb53dc4c83e

                                SHA256

                                1d0f5a7b466d498cf04473ba3b614b40e5a3c06004b011b420a5334bb562395b

                                SHA512

                                99737ebf863598390d10401dcdec34e310ff6a416ee42b9d99727884e518f57a1428f6dffcae5de6e239842145c465000580c1aedbc1741e33477c2ef3098d73

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                4120c2f28d89e4b49b89f73e68a83bb7

                                SHA1

                                bc9ac2d805fd077d361f9b068dd71978dab35f8b

                                SHA256

                                c79c2d4a5a9adc5ec6b449c43ec6716faa5c7659f5bcaadb46657845256b62e3

                                SHA512

                                9e48b78beaf9a511f041fce2b2b7accf64dc10da95680cc3dab9753ef31796c2356e020ef811edc42bd17d535db8c7186b4368391ee103d9c84221b188f43dfb

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                b78c050fe6e24d228688e569f9968349

                                SHA1

                                62335fe6a212858102c559fe003b95aa646a5183

                                SHA256

                                4494d57ff6962f19a269824173471e5197369f38ad455a15749f1186413d1ae7

                                SHA512

                                c1031b553bcd9cb1e7ea04404c7dc80bb97a2220c926bc519bb828f0b0e6d72de27009526aadc4b7f27e5dec2033bfcf848047fe6686a466258b726a046ecd9f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                0446fcdd21b016db1f468971fb82a488

                                SHA1

                                726b91562bb75f80981f381e3c69d7d832c87c9d

                                SHA256

                                62c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222

                                SHA512

                                1df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                9b008261dda31857d68792b46af6dd6d

                                SHA1

                                e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3

                                SHA256

                                9ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da

                                SHA512

                                78853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9859371e-be4f-49d5-b717-22d56933dbc9.tmp

                                Filesize

                                5KB

                                MD5

                                db2f1dfa4e966714d849a6331f7c2850

                                SHA1

                                2380b4e6b3ce6c63a57c01dba1a4033117538ebb

                                SHA256

                                929aa89251e3d5da16ce969950df45cadbf46f6ff68273674a67375ebc2a580e

                                SHA512

                                521b43dfbbdd4e2e89f90f31a33114dab47e3713ab2735dfec0955a27f0076c4f00b120ffb86a2d502b21f55a0267a0a611581a9b1099ef26561296693496315

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133670756262703360.txt

                                Filesize

                                47KB

                                MD5

                                411acf4995de48fb2b8d55d3ab89d8cf

                                SHA1

                                9eb660744f683f3b5f412e85bfbc62586030b5be

                                SHA256

                                efe967cb989520f49cd5e2c6a5a95a7e8ac6790cd3710f0d2f92920c7a8eaba9

                                SHA512

                                639e6c1c33876e22e3ba2c86d28ff790ea6bff408b0072640cda9776b3695e85012cbed12a688a85c179b5379fc24c03ecec2d23efa334f3ccd525fa6a8670ae

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133670764554768979.txt

                                Filesize

                                74KB

                                MD5

                                df3d193d647cf32dbe140b0069191ce1

                                SHA1

                                518730a8212a252c7f930422a49c25f1e2fa3aed

                                SHA256

                                94bda6a83217d800f8260cfc67daede6721c63e3b9d8b6ebffbeb09c84dc9503

                                SHA512

                                1a69477c05b3e05ab309ea69385a77449f4b7cf4af9a041ca9f44a6933cbd8a0bbff4d86ce1f7444b4195d82074b75ff9bf2b019203d53da78cf9e720469d363

                              • C:\Windows\ayrukjsewjtn.exe

                                Filesize

                                418KB

                                MD5

                                1a9ab9e924a6856d642bbe88064e4236

                                SHA1

                                d9d445e9dcb8694398c7acb33f38d7261c95321c

                                SHA256

                                69155f404a1482e4188726cb0f88b6c6fd6ca94d834b31e05f36e88662281e22

                                SHA512

                                f41e93d25fe32248f55dbf5c1c721e4af5d2c28531816955094585a00afa94ea2dab0a6e25191abe8896a2185cdbc535d9dcf3beac14b683d05e1c8c7c6f80b2

                              • memory/212-1-0x0000000000A70000-0x0000000000A74000-memory.dmp

                                Filesize

                                16KB

                              • memory/212-0-0x0000000000A70000-0x0000000000A74000-memory.dmp

                                Filesize

                                16KB

                              • memory/212-6-0x0000000000A70000-0x0000000000A74000-memory.dmp

                                Filesize

                                16KB

                              • memory/2092-5-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2092-2-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2092-3-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2092-4-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2092-15-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-2673-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-10726-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-20-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-5074-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-21-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-235-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-8557-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-10717-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-10718-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-2674-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-10727-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-18-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-19-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-25-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-23-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2764-10772-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2844-12-0x0000000000400000-0x00000000004C1000-memory.dmp

                                Filesize

                                772KB