Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 14:29

General

  • Target

    0633631727771a19c3593b678268e8f9_JaffaCakes118.exe

  • Size

    276KB

  • MD5

    0633631727771a19c3593b678268e8f9

  • SHA1

    2c8af799af11e03abc5face54f3943c2b3071203

  • SHA256

    dd754c7e866babc27f01d9e9b3bbac680dcc3e83b8a748d39e026b871052b527

  • SHA512

    f705f51b7f49f51a13c4509909b80e7eaeecf2914867b41f42dd13f655ad1e815355366cb05b9a6093c1887dae569f204b9ca7ad5761a3f1952b3cbc9b31645b

  • SSDEEP

    6144:wL+ROMHXZ99JX2WngMNSYZh1r0CLf2dWsLf2EUOH9:wQ7J9PgMN7LsqEUO

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_ReCoVeRy_+odwlr.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So , there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/EDE68A54A6AAC395 2 - http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/EDE68A54A6AAC395 3 - http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/EDE68A54A6AAC395 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/EDE68A54A6AAC395 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/EDE68A54A6AAC395 http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/EDE68A54A6AAC395 http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/EDE68A54A6AAC395 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/EDE68A54A6AAC395
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/EDE68A54A6AAC395

http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/EDE68A54A6AAC395

http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/EDE68A54A6AAC395

http://xlowfznrg4wf7dli.ONION/EDE68A54A6AAC395

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (885) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0633631727771a19c3593b678268e8f9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0633631727771a19c3593b678268e8f9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\0633631727771a19c3593b678268e8f9_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\0633631727771a19c3593b678268e8f9_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Windows\wihhlutvoais.exe
        C:\Windows\wihhlutvoais.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:856
        • C:\Windows\wihhlutvoais.exe
          C:\Windows\wihhlutvoais.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3784
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3936
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:1712
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1300
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa497346f8,0x7ffa49734708,0x7ffa49734718
              6⤵
                PID:1056
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:2
                6⤵
                  PID:4292
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
                  6⤵
                    PID:452
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:8
                    6⤵
                      PID:5044
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                      6⤵
                        PID:2980
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
                        6⤵
                          PID:5040
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                          6⤵
                            PID:3912
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                            6⤵
                              PID:3388
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:1
                              6⤵
                                PID:3684
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                                6⤵
                                  PID:740
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:1
                                  6⤵
                                    PID:1644
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9271940705844593772,16988143294244498011,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                    6⤵
                                      PID:1672
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3320
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\WIHHLU~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2268
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\063363~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4792
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2324
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4944
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4284

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+odwlr.html

                                Filesize

                                11KB

                                MD5

                                fb9d62dbf8298c29665bab70e280da31

                                SHA1

                                dda4c9244abed3dc8e756245ba902cc4e2557438

                                SHA256

                                fe6c5b40442b5860dbb52fbe6036a5a35d11bd6f63193134d634a30a6307826d

                                SHA512

                                f5648a5a1c3dd5e6179aa36feb034a45a5314e3703a89ae6323c71c9442fd0fb39542e3238a174226ce0d22592b92df98096fae3855f9cdda45cbb2d569126c6

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+odwlr.png

                                Filesize

                                65KB

                                MD5

                                2d5b30025221f5ee596ea3aa5c74dec2

                                SHA1

                                203092543781f59376b44c7baa77f6fa8e19ee85

                                SHA256

                                9408c5a57c9a59b0644029d0a5640f0367453b56442428a8dcec2e0aa1114377

                                SHA512

                                539abbf44829a4b719d4bee99fbf916a3d83000d779bc04f4bfa248280a1a704b39d82d4aed5fc70e9e9e8f722392db38b3932c77bc51abcbcc2b430b945b311

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+odwlr.txt

                                Filesize

                                1KB

                                MD5

                                7fa49ba9582dcce83a966c4d064a4cea

                                SHA1

                                b5c8cb5d654853a65c35d82631df25a73127475b

                                SHA256

                                01c996083e59a4e4c9724f6ecc22946f6019841ea6eab63ce671dd41cc41f25e

                                SHA512

                                60abb05863ce066a84bd314997d48b4960e7b83ee5c8b1c803611cf0d8cac3893b1d45758582cdd7ff8b807820a9665679768dce41f4dfcd3ec64304da89c07b

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                4e4e5bcc4d0d0b3888abde492556c61e

                                SHA1

                                b64185ebcaee3c068562f41b550dd6877b1d4b2f

                                SHA256

                                b82ec0ee95e669a6b7bd0a831f5705ae8d1985f8ede56897ef9fc8bb46a8ca69

                                SHA512

                                261326242e931d18a1d86f99ccacb727236d46e453dd6c861be81538d1373fac5c10f1576fc97e63848beddfe79ffbc3bdde65216cb4184c00b6ae5a4e080971

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                c117f1cdb97984fd60c74427f1b3e868

                                SHA1

                                c2260eaba8f66cb83e186b3ba6972610ca854a23

                                SHA256

                                1a4246ec274664400657d283f1cbaf77a0cd1e698f8264615eac9ed3d57d260b

                                SHA512

                                ff5d048735a4054eebd36715a262eafb14e94b72d4d577379f02c43afe723c1be0e7bce350ffd9d3324faf3a90cde23d643d90393fc6200bbf6010c85aed7929

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                a86b89b6eaa1f880e3aafbfb22b182f2

                                SHA1

                                4f024326dd158abb6167d2dc885b083f36e773da

                                SHA256

                                c5f234d9d5750452a03ceee83c0802d80c469d187dc481f55ae44c00342b627c

                                SHA512

                                5dd6a234998163ca3e1d22a057152034436de1efc16247258e8453cc70d18b8591981bff778e99047392a0e31fc3414509d48e60a4ea3bbb522b7d6fac7ccacb

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                27304926d60324abe74d7a4b571c35ea

                                SHA1

                                78b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1

                                SHA256

                                7039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de

                                SHA512

                                f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                9e3fc58a8fb86c93d19e1500b873ef6f

                                SHA1

                                c6aae5f4e26f5570db5e14bba8d5061867a33b56

                                SHA256

                                828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4

                                SHA512

                                e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                369ee465201662a4e97d7b7b1be04370

                                SHA1

                                57e17a59c530931b0e912bd86d2b4b3a5510bdce

                                SHA256

                                1f7fa2336f571f0635a78cdf148626dd5f13c8ad26f34deb27412dc88fbaedd7

                                SHA512

                                1de8053e5c133ba0f3fb486d2479544c8692f860b52d8af1d97aa522f8a0d952f78b9283de9d6830c47a248144656d36d0b38db2ccc311127c2e91f6de2cfeb0

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                f27eb43d37808d696332919385746b55

                                SHA1

                                c4ba7e9e1a28a876329f3ab67b5e522a78fce91a

                                SHA256

                                81b80a913d0530de120a58e91efbab1934b28f87834e4b8409227e3f1b12dca4

                                SHA512

                                65e33fde7aa9302f4f0ab29b6aaed713072ca5d94d414518c3e48ba05ecc4d0f27372bac27cbbc8ec363cecda79ee27e033de417e65f113391a0b68d1c41cfe4

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                e0a81202c4cd702bba3c1e33b036ec13

                                SHA1

                                76b5d2d65e213d36b87ba3d05975d2a9ed9c79d2

                                SHA256

                                17d24e2abc9a77b4613a2daeed4c8bc58ff474b95c1563c07ab01f80cfe48e90

                                SHA512

                                3267a61a899da9babff7be2279817e5a8186ef9965926d642b35fc34b7c22a919c9ee29e4ecba31d47e6c29ac1848794a97f59a654b3ab34e4a226687f46e62d

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133670756351725002.txt

                                Filesize

                                47KB

                                MD5

                                cf4edb26bbfceae96ebd29ac943f6073

                                SHA1

                                63907b9017a814cb9e25ece17b5edde9da5d73d3

                                SHA256

                                18103093de6f309db1bd03d0bbcad0b5542c186f85110513db050398c5ad2f18

                                SHA512

                                518ea79a3bf37a33ebe601ebe214b52ed80a9c085972e934857627b2ed4fa5a7bed2cadec0faeb2ff1b2d7ce2fa88207c8cc88a7a7c48047bd3a56f9b6dc2059

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133670764151817172.txt

                                Filesize

                                74KB

                                MD5

                                bc08d94ee980ae74f93f20711507c9ce

                                SHA1

                                6ebeec71a06df78d4b31245989017d59b4d1e4ac

                                SHA256

                                46e92e460f7dc156d6e216d36b40cf0cf436f2c33667392ee49815e491aa7f05

                                SHA512

                                a161962c3b4328db719216ceae2739849970f33a592aae07a17e77a78e1825be8b25fd17e54d2a850f9e62c10efd986e05b39a8e1b4945f6eaeb23a1a4960b08

                              • C:\Windows\wihhlutvoais.exe

                                Filesize

                                276KB

                                MD5

                                0633631727771a19c3593b678268e8f9

                                SHA1

                                2c8af799af11e03abc5face54f3943c2b3071203

                                SHA256

                                dd754c7e866babc27f01d9e9b3bbac680dcc3e83b8a748d39e026b871052b527

                                SHA512

                                f705f51b7f49f51a13c4509909b80e7eaeecf2914867b41f42dd13f655ad1e815355366cb05b9a6093c1887dae569f204b9ca7ad5761a3f1952b3cbc9b31645b

                              • memory/856-12-0x0000000000400000-0x00000000004CB000-memory.dmp

                                Filesize

                                812KB

                              • memory/1300-4-0x0000000000660000-0x0000000000665000-memory.dmp

                                Filesize

                                20KB

                              • memory/1300-1-0x0000000000660000-0x0000000000665000-memory.dmp

                                Filesize

                                20KB

                              • memory/1300-0-0x0000000000660000-0x0000000000665000-memory.dmp

                                Filesize

                                20KB

                              • memory/2112-5-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/2112-6-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/2112-3-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/2112-13-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/2112-2-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-17-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-6022-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-3063-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-9506-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-10708-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-10709-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-10717-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-10718-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-3062-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-231-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-24-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-10745-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-22-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-20-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-19-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3784-18-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB