Analysis

  • max time kernel
    144s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 19:37

General

  • Target

    591c7f90216f596b849ef9562b8f155b_JaffaCakes118.exe

  • Size

    424KB

  • MD5

    591c7f90216f596b849ef9562b8f155b

  • SHA1

    f3c185a27c38214418daa50407c9964fd5281d95

  • SHA256

    3619101e101b7197d37b6b2c02687b81884f8c4ba021c25853f948b484fac4a4

  • SHA512

    31cfa0fb8cc85398223b2377a170fbbdf01ad82764611c3c7775c80119bf0b5bd24d1943135ab18a3e1cff123813b0f786d522ea7d5c5387a1f84f8de6fa178f

  • SSDEEP

    12288:Jj6qMoki2//HuarKqen05/QexvmBG3zbblCJxfS6:JjPQ/HdQoq2fOR1

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_RECoVERY_+qlfit.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B5658B3272ACF9A 2. http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B5658B3272ACF9A 3. http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/B5658B3272ACF9A If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/B5658B3272ACF9A 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B5658B3272ACF9A http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B5658B3272ACF9A http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/B5658B3272ACF9A *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/B5658B3272ACF9A
URLs

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/B5658B3272ACF9A

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/B5658B3272ACF9A

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/B5658B3272ACF9A

http://xlowfznrg4wf7dli.ONION/B5658B3272ACF9A

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (879) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\591c7f90216f596b849ef9562b8f155b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\591c7f90216f596b849ef9562b8f155b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3472
    • C:\Windows\vkuhyqcihrwc.exe
      C:\Windows\vkuhyqcihrwc.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1948
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:640
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:3520
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa99cc46f8,0x7ffa99cc4708,0x7ffa99cc4718
          4⤵
            PID:2548
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
            4⤵
              PID:5116
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
              4⤵
                PID:1116
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
                4⤵
                  PID:1720
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                  4⤵
                    PID:4236
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2768 /prefetch:1
                    4⤵
                      PID:4384
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:8
                      4⤵
                        PID:5048
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:8
                        4⤵
                          PID:4280
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:1
                          4⤵
                            PID:4360
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:1
                            4⤵
                              PID:820
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:1
                              4⤵
                                PID:5324
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4070914009758804019,2012957442045488427,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:1
                                4⤵
                                  PID:5332
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1932
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\VKUHYQ~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:5260
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\591C7F~1.EXE
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2904
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:368
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2892
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4296

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+qlfit.html

                                Filesize

                                8KB

                                MD5

                                318d8f84d8a75e59818eaae5565d16ef

                                SHA1

                                86ebd342fd568e85e7d759aa0a1f579a8e16027b

                                SHA256

                                3e69beef8b1453155de20d3e612056306751582754685f35bd6c3b070a25a3e9

                                SHA512

                                1f10d1078420911f31c249b35d42e45ba43a8480def028648595a4e49cb39492014d6bca4380babcdaff59f893e48f01549406da3a6205b2c32ddf1b21928202

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+qlfit.png

                                Filesize

                                66KB

                                MD5

                                1e3646249dfbe5e0a57ff903f5f9dba6

                                SHA1

                                70f2158b7ebb714f501751795420dec109acc712

                                SHA256

                                7020a290b5cc728f919121a5f62decdaa3097b8fb13c6e81437b1d394020dc1b

                                SHA512

                                9b0203ec3b3a0beb556730b797e8a78b63646f31d66e7666c86d1c81be10f2d7a80f29bf48bc07ecc6231a6b7986fc75d0b3ea51ee83371eb397b4540b369348

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+qlfit.txt

                                Filesize

                                1KB

                                MD5

                                4a46c888eca781a10707ba5ffd5f122b

                                SHA1

                                6356afa87dc39ea20dd80136758a6ed27972adca

                                SHA256

                                0295236d0a2442891b029bb6a5cf39773454a52802a4665140113854fe559302

                                SHA512

                                1901bcdc63d6868029471c4d1c5d3cc42df02beb6462b8468d41e80decc6c73d05c47aafc52e3f081af9ec697d85357d7e2e8d090e326be5bcfddc4d943de657

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                60e3de9669ede2fcbc4288e1b1ee0679

                                SHA1

                                b961b714c331f48dccf5e91d3de8bfc950d09772

                                SHA256

                                3cae7b3824fdae211b1f90dcc5a252a87296985f51077d149987ae4df91c7e6f

                                SHA512

                                65df0c054ec704a53e6541e64a00ea43467628eeb52e861704b67368ad4ec7aacaf7cf765d16921acfee4838ddb89ffe5ef8bfa8bf3d32b14724a42817d4205f

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                13be2ebb4c18d279368ca3a39c2f1ddf

                                SHA1

                                18e96ce61f4eeff172c382e287104d4dea38cc92

                                SHA256

                                f9d74660eeb9102796c4fbdf2658eac8603cc51fbbb004f0314b26a0e432cbee

                                SHA512

                                1085a628fb9a4fa1d1b631bea71025c3458692efb933cca7168507f7c89796ca5999d34479d1555d43ccc112780bd37594909651335a5c002ef169433d24f31e

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                4422688577a4ef929f4a646b6bebfff4

                                SHA1

                                2ef560e0ce58cd2103504de9c91f84b5f5362b2b

                                SHA256

                                f93b1104b90cf701565b335cc7a13a898355fec6a0c7de347e6190995b3458a0

                                SHA512

                                ac43cd033bf50ad70b176cceaed896213b0a752734d12f5b9fd03ecdc6270c57c7c786e98317a4622f944fd51b41fe7e852932b83d50c969089c238d09851eed

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                34d2c4f40f47672ecdf6f66fea242f4a

                                SHA1

                                4bcad62542aeb44cae38a907d8b5a8604115ada2

                                SHA256

                                b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                SHA512

                                50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                8749e21d9d0a17dac32d5aa2027f7a75

                                SHA1

                                a5d555f8b035c7938a4a864e89218c0402ab7cde

                                SHA256

                                915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                SHA512

                                c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                d2ed1f2cadd472d0a54b34b7e4c2c7ce

                                SHA1

                                f15abe3c832cbd59d535a9a3c59626e532d0f74e

                                SHA256

                                1016ad8f9659d251b96cc4423663492f48957610f70e70fdb8864910ad50d2d7

                                SHA512

                                61f7061177f2a16fa9742f7b1057a71e407fce16610763adf179204611b45d6cb4f8ff86c589fc1a14f182bfb455b1fcbad95db21d271f4d704de400918037e0

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                bd0327a8eee1b46ae3ed7ba565906698

                                SHA1

                                f628f4a9ae6b0d8573cb7754be8494b581e86af4

                                SHA256

                                6b94c9b52d3e461d7d4babcdb85372c53ff04b16e7e459db6be31e672f123c10

                                SHA512

                                a7a6a727df62ce751b2b7347f0c8d493e0a5176346921aac283f3b30e4ef1878b3ca9bd92abbdeb661a9de049de7b96b9b21a9f5a74f25d39c23287206123e7a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                094dc40aae9d8c5dd7022c26db4f27c1

                                SHA1

                                065986d07280d11448a353bd4ee92f25e12cb220

                                SHA256

                                8c65b08e09a275a9221158bb9a9686d1961d466e300b7522a42a1d00c0a952ea

                                SHA512

                                aaae15f094aef130a1d670dd66ae5b00952f51b10f23421e2b9196977117d35eef8b6f949996c74e34017dcf53209c4ad10910c39d92a8f3b3935d827f48218c

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662360645001.txt

                                Filesize

                                77KB

                                MD5

                                f40148694c317bffd8c10286ce3cb2bd

                                SHA1

                                abe626aaa27dd041ca2d9c623be71c2b409f27f4

                                SHA256

                                6fc9e5bbf5b480f5051db4a158ecc5d95c10271b5005db124c602d327cdb1681

                                SHA512

                                742e7df0ebe5911141fffb5b11abea582bb7b5cf2e29dbe6b4d62acac02025abefa1be50aefbaa9ad5d45c699257771aa13b93f05ec87d9cf69252804953da1c

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727663623337830.txt

                                Filesize

                                47KB

                                MD5

                                ebcddd83187782a8a2607092c702039c

                                SHA1

                                004a1f913489b40b4ebda9e92afcdccefa36096d

                                SHA256

                                7be335269d43d6c165a1852e7db8b16abfa6fb688e4507f935c928d40c3fe73f

                                SHA512

                                7fb9961529fb20cfe525c7a8561f3a17b534d8109170387cf4b8d9ae2be4b759b8daecae48a56ff9b2c9c1ec4a4e233647e0559bb4a2b3a0028bf853a1a93cac

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727671211214398.txt

                                Filesize

                                74KB

                                MD5

                                ad6527f96df19fe864fadf4375dee9c1

                                SHA1

                                962c58a46944c36389ca1cb224f29cbef08f26dc

                                SHA256

                                0628ce8de1387b6c1caf57cca3c81f9a2b8e75704bd82c05a6edfcaf10f07940

                                SHA512

                                66c3776f3b8426b80c9a72b4c33791560fb51c734ec856b4d6b072530d85004553fb14fe11bc43434d8cf5d6b858b5e1ad9b5cbcf257f270d49ebd527c63390e

                              • C:\Windows\vkuhyqcihrwc.exe

                                Filesize

                                424KB

                                MD5

                                591c7f90216f596b849ef9562b8f155b

                                SHA1

                                f3c185a27c38214418daa50407c9964fd5281d95

                                SHA256

                                3619101e101b7197d37b6b2c02687b81884f8c4ba021c25853f948b484fac4a4

                                SHA512

                                31cfa0fb8cc85398223b2377a170fbbdf01ad82764611c3c7775c80119bf0b5bd24d1943135ab18a3e1cff123813b0f786d522ea7d5c5387a1f84f8de6fa178f

                              • memory/1948-8763-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1948-5120-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1948-11-0x0000000002170000-0x00000000021F4000-memory.dmp

                                Filesize

                                528KB

                              • memory/1948-10751-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1948-2471-0x0000000002170000-0x00000000021F4000-memory.dmp

                                Filesize

                                528KB

                              • memory/1948-10795-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1948-2470-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1948-10814-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/3472-1-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/3472-0-0x0000000002290000-0x0000000002314000-memory.dmp

                                Filesize

                                528KB

                              • memory/3472-10-0x0000000002290000-0x0000000002314000-memory.dmp

                                Filesize

                                528KB

                              • memory/3472-9-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB