Analysis

  • max time kernel
    146s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 08:11

General

  • Target

    09b500283366eafb809963ae3341e9c0_JaffaCakes118.exe

  • Size

    336KB

  • MD5

    09b500283366eafb809963ae3341e9c0

  • SHA1

    628610489c41e78617f4e51d0d0143a07b245f85

  • SHA256

    8506824ad4a9aabf540bbf58741412448178b846e540fbbfdf2a4e48acfe46da

  • SHA512

    7ecb3ed388e2866cbb0331d50d910ce3810f8b9bc1ece963e2cc67c5eaff017d2109e7ccb9d022b8960f78cca243c36bbdb29e0f78fdfc32a78cf2daea6ea796

  • SSDEEP

    6144:r1w0U6D6x4kyjf+g0uc2RTqWmx7Ikw9NShXvSmk2OpXaP/EBySkQ4:ri0Uu6ikyjcuk5y0hXaxpKkB

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+tchxn.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/17D85A2D18114C4A 2. http://tes543berda73i48fsdfsd.keratadze.at/17D85A2D18114C4A 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/17D85A2D18114C4A If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/17D85A2D18114C4A 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/17D85A2D18114C4A http://tes543berda73i48fsdfsd.keratadze.at/17D85A2D18114C4A http://tt54rfdjhb34rfbnknaerg.milerteddy.com/17D85A2D18114C4A *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/17D85A2D18114C4A
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/17D85A2D18114C4A

http://tes543berda73i48fsdfsd.keratadze.at/17D85A2D18114C4A

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/17D85A2D18114C4A

http://xlowfznrg4wf7dli.ONION/17D85A2D18114C4A

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (884) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\09b500283366eafb809963ae3341e9c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09b500283366eafb809963ae3341e9c0_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Users\Admin\AppData\Local\Temp\09b500283366eafb809963ae3341e9c0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\09b500283366eafb809963ae3341e9c0_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Windows\cdhjmugkuxqf.exe
        C:\Windows\cdhjmugkuxqf.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2280
        • C:\Windows\cdhjmugkuxqf.exe
          C:\Windows\cdhjmugkuxqf.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1728
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4512
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:3808
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:740
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd63e46f8,0x7ffbd63e4708,0x7ffbd63e4718
              6⤵
                PID:2912
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
                6⤵
                  PID:4948
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
                  6⤵
                    PID:2004
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:8
                    6⤵
                      PID:876
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:1
                      6⤵
                        PID:4444
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
                        6⤵
                          PID:4904
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:8
                          6⤵
                            PID:1544
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:8
                            6⤵
                              PID:64
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                              6⤵
                                PID:1792
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1
                                6⤵
                                  PID:180
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:1
                                  6⤵
                                    PID:2076
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1028679085648663904,2002147221894577297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                                    6⤵
                                      PID:3664
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2540
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\CDHJMU~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1600
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\09B500~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1372
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4160
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1036
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1892

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\Recovery+tchxn.html

                                Filesize

                                11KB

                                MD5

                                c0b396f0dbad0de49c556fe5c8e9e014

                                SHA1

                                7b1e1ed5f9630bb5d4b1794c184e8248533a7ce4

                                SHA256

                                71c277b836d3c2646a540f9c945319f9297c062e6a1def893d53fa68d9ee9dfc

                                SHA512

                                e259347bc0c9ee991fb17c921d149c530df91a9c2d29e63996c676246d0286779b2a71f44978f4580b344dab456d6e24a53cd52543f033f954d4dc97cbefb22a

                              • C:\Program Files\7-Zip\Lang\Recovery+tchxn.png

                                Filesize

                                62KB

                                MD5

                                dd41031a58b6dbbe25ca507a40198e1e

                                SHA1

                                9c1bec9a50d8628ddf22ef5a62d2c0d415ebe501

                                SHA256

                                5969f614fd7ccf3a3428d6931505ec02c57a2b20973eb5a89bcaa047baeb7619

                                SHA512

                                04b25e376699e85e2d59ce9a37305b7180e9ae75389ece9957ce32247cde433da45591c70d89f18500d96ff1b38a37da55ce429284a0c25237742ef2833a9cd8

                              • C:\Program Files\7-Zip\Lang\Recovery+tchxn.txt

                                Filesize

                                1KB

                                MD5

                                c6ffd51c92aed27c31a4fb2a9739e838

                                SHA1

                                067d4d2a4347b221e81f0e5cd99539ab866e66e9

                                SHA256

                                c85efbfc4e01496a3b9c86b8995019979650fbda42ddbf769e3449a9c4fc29e0

                                SHA512

                                69a9856e1fb59c74dd8f8878db074f76bf18e7af084d6e1c77e080a590597e03c530f1743fdaf9d3655dd07a524bd23ef090472e352188a8beb2fecc12b49f87

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                1a9822dfa55a6aff003baac2b0716690

                                SHA1

                                ed9ffac8686b225bcd02dbb4942facd7c9227986

                                SHA256

                                0ae082b509677788ded3740cc392056a44a6348e52c9b2a339f3cd1422d8cb83

                                SHA512

                                bd08d3daf5f862100ea44b25f21c9bbbec6e8969cdf41071bdcf1a7caa8e616c2e9f5a6120fe707d6c44419d25e04b3b33a8f0ab4f2b8e27144b99b1b861e233

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                400271f73373797bebb9072dfe6f89d8

                                SHA1

                                aa5374da01073c9ab4e3184a5416397650f3dc39

                                SHA256

                                b2bbc4eebe25c232e5c9f6cc8da17957f4b3007a0f35d930c52b6d041b83de4c

                                SHA512

                                4bd3efbe0769e691aa0c0e90ec6a99368cb974b3604af54c3b61cf804aa44529175ba2490dd2ace4c84a420e48a7e95038b362b93ce09c11640c41a33cc069c2

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                a88f49a1983f59cdd88a675e016230e0

                                SHA1

                                4a2da0fd771ab0b5992d82b0d6f69a59f389465c

                                SHA256

                                77414f02ce52bd3908268f5aad2d53881eb2ff241732b6acf926f66fe5dd7829

                                SHA512

                                85f3f09aef40436d41ab816d728acd2efcd25d13a110a30bf5255678892452146b579be184393b8dc2eb9dc866c75492adc2a1119024d2ecb20619fcc450fe93

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                9ebc024cdb324eb41f33c6ec63d1458d

                                SHA1

                                f623e96981ee63c1b6879f682c4364fd5c2265e5

                                SHA256

                                23b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f

                                SHA512

                                6971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                709c6f4a32b317f6487b598788b6353d

                                SHA1

                                50f44d43be9630018f0bd2acb1528df07cd05b7f

                                SHA256

                                353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b

                                SHA512

                                4f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                e2a2f76ed6d98ab489c4305b5e48c832

                                SHA1

                                4f3762781eade0698d8366a5485cd78546ae4930

                                SHA256

                                a12d9ad9fc35d3ef783363cbbb6146cd8f6b646fc29638fc55de4998670dcd52

                                SHA512

                                47253b68397a2ffc1769556073ab1f9100d656ead9f6b2a4aeedff21ef2ed8efa41cf521b7a6a1d1540180894d2b3184f60d96eb4da16c1e7565ebf467e6bdda

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                8fc0c2af1fa8892b913a942f0db64a9a

                                SHA1

                                1800212e0d763a53de11abf65ad58ab50ded24ae

                                SHA256

                                fa2052c143b728e256dba3ea848c316c7ab4c7edf02fb4defccc489d2a46d493

                                SHA512

                                3cefaa83fde397ff3828528864e7ab05bb3a7aa0854ebc153885745b151c4b9eeac4f1fa492cf2c7ff473e756973b85660bec0ea8a8c124da6dbebcbb8664dd9

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                Filesize

                                24KB

                                MD5

                                494a861dfe3fb61b7f6e9a8e1f92d179

                                SHA1

                                903db9c91a888cdd2a359e921ea2c1a958228aa9

                                SHA256

                                46ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690

                                SHA512

                                f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                3b4859e90d432aa74abf99953a231d1e

                                SHA1

                                bb08053790bdde1f5cb90d5bd28f8398e0207c0b

                                SHA256

                                2cf2771c699faaf27e9ceec155df95fd6cfa4960bdd2423864777346f1dd265b

                                SHA512

                                621e802dbee7f4190dca1af5fb471a99caf28b22a1e39e04fb45c2c83fa92838c7498b3cf9e7f46f3dc6ba88af7aad27dfdde29a5e64f279fddd1eca67f8e41a

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{aa88646a-f560-488f-8a00-61a1a07e2907}\0.0.filtertrie.intermediate.txt

                                Filesize

                                29KB

                                MD5

                                c1da4c3cdc78563c273e2147bce932ca

                                SHA1

                                c60904991af43b331f7901b9b2bf4cdb41542615

                                SHA256

                                fc00fe06a673a4e232fabb2d29998c34de78db155253ab8b8f213f6087ff9c55

                                SHA512

                                f281f2a3fd87e28b9f7c33b62d731a033464cdc3e5c20cfcb9a36f710866ad182615faefdf0afc3b618de764d95dd076b94d88d312308f5e0f19f59c7bfbefc6

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133670756351725002.txt

                                Filesize

                                47KB

                                MD5

                                3867304dbe05aea915ed5941e6efe2dc

                                SHA1

                                311e25ed7b7a638b8f950971e5b05eb4d36b6151

                                SHA256

                                bada4a293f28bf280d0c68c3454e67302fcc0798774c636aa88c7054a085759b

                                SHA512

                                4c51fe101452679aa3f7c4fe0d8f907b80ad79046aa234b20401c26a9597d24067eeec5cf95e086110ce2adf539a3e1514fbbc7172f4236f0ea4a88e24c1e3ab

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133670764151817172.txt

                                Filesize

                                74KB

                                MD5

                                285429e78671d78153d3b79a12ae9ade

                                SHA1

                                19ee6a8f5058fc10c841499fc2a30e8a4f3d2aff

                                SHA256

                                c2605d9811a7969626be98762ece26113d4bf31f1cfd201850bc5d30b0e54b30

                                SHA512

                                fcbcfbcaaaf3eccd40dce4f57b77bed09adc40baf863fc9dfdccbe76862339a2a804df102b636ba35e42796f0d06558a7cdd2ad99daa416def952bafb0cef48b

                              • C:\Windows\cdhjmugkuxqf.exe

                                Filesize

                                336KB

                                MD5

                                09b500283366eafb809963ae3341e9c0

                                SHA1

                                628610489c41e78617f4e51d0d0143a07b245f85

                                SHA256

                                8506824ad4a9aabf540bbf58741412448178b846e540fbbfdf2a4e48acfe46da

                                SHA512

                                7ecb3ed388e2866cbb0331d50d910ce3810f8b9bc1ece963e2cc67c5eaff017d2109e7ccb9d022b8960f78cca243c36bbdb29e0f78fdfc32a78cf2daea6ea796

                              • memory/1728-17-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-10588-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-22-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-2645-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-2798-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-2799-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-5575-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-19-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-16-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-10661-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-9184-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-23-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-10589-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-10597-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-10599-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1728-18-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2280-11-0x0000000000400000-0x0000000000748000-memory.dmp

                                Filesize

                                3.3MB

                              • memory/4656-0-0x0000000002400000-0x0000000002403000-memory.dmp

                                Filesize

                                12KB

                              • memory/4656-3-0x0000000002400000-0x0000000002403000-memory.dmp

                                Filesize

                                12KB

                              • memory/4772-12-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4772-5-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4772-4-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4772-2-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4772-1-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB