Analysis

  • max time kernel
    139s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 05:43

General

  • Target

    77f9f38aff6772904e5cb6ff14a7abe5_JaffaCakes118.exe

  • Size

    428KB

  • MD5

    77f9f38aff6772904e5cb6ff14a7abe5

  • SHA1

    948101647975f44217414a8a8110b2a5d9e4cddf

  • SHA256

    05884e3e77892db6e9ae3af788003e5265aa2336cd655ac4c81b98e3242ff04c

  • SHA512

    6fdec7bcdeaa9fed3de2708265e0861622d003fd6d83ff1d5d8ad4ae1cbae7da6c9f2356ea74fd93df2736156703b6c883a10ffd39b79d27c87ef587dc53703b

  • SSDEEP

    6144:YS61KBLwidWQW0StEYurSyTheRmfu3pUlzwgaa9rSoXbftChXW3AxfulDGgB:YSxvdk0DtrSmeRh3pUGlahbblCJxfS6

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_RECoVERY_+hjhcm.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/DCB5A5CE6EFBD776 2. http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/DCB5A5CE6EFBD776 3. http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/DCB5A5CE6EFBD776 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/DCB5A5CE6EFBD776 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/DCB5A5CE6EFBD776 http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/DCB5A5CE6EFBD776 http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/DCB5A5CE6EFBD776 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/DCB5A5CE6EFBD776
URLs

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/DCB5A5CE6EFBD776

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/DCB5A5CE6EFBD776

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/DCB5A5CE6EFBD776

http://xlowfznrg4wf7dli.ONION/DCB5A5CE6EFBD776

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (862) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\77f9f38aff6772904e5cb6ff14a7abe5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\77f9f38aff6772904e5cb6ff14a7abe5_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\cjnakbtbgtpa.exe
      C:\Windows\cjnakbtbgtpa.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2672
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4264
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2300
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:292
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcddd46f8,0x7ffdcddd4708,0x7ffdcddd4718
          4⤵
            PID:1004
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
            4⤵
              PID:1104
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
              4⤵
                PID:2240
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:8
                4⤵
                  PID:3088
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:1
                  4⤵
                    PID:1144
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:1
                    4⤵
                      PID:1632
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:8
                      4⤵
                        PID:4996
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:8
                        4⤵
                          PID:1096
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:1
                          4⤵
                            PID:3108
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:1
                            4⤵
                              PID:3864
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:1
                              4⤵
                                PID:4912
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6195990801754748509,14968637260527073512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                                4⤵
                                  PID:4456
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4304
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\CJNAKB~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:268
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\77F9F3~1.EXE
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:3220
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2760
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2632
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:5036

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+hjhcm.html

                                Filesize

                                11KB

                                MD5

                                b18856152ce964e1c498f864b63e10e0

                                SHA1

                                16474b1fcabb469ad7ab8dce09b5ada2154b66f5

                                SHA256

                                618636514e3dee5385a0831a70baecec659b5faaf20e3af7f6eead7c5dfb45f5

                                SHA512

                                b00fc34ce4b8f38113b4e714fe2453bffb2bd9bbf8ffc6404706e6104ea46a81ec82f1af8a29b06f298c6a7c2bbed138aea28c2fd44c26f08167b03d11e030b9

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+hjhcm.png

                                Filesize

                                64KB

                                MD5

                                e6e91360f96f0036ea993debbe937d72

                                SHA1

                                76d721b4596ca36b6c00f501b0679298c1a1b611

                                SHA256

                                07a01d8586e4caf5d5e03bb0d2b7b09b3654040cb3efeaad486ae5b64b4ff32d

                                SHA512

                                cf253a35644b05536fec73e7d5262ca7d4ba27d89891bf710660195299052fe8eef9ce4a07f6294977ab8eee0505761ceb215168d056c9833cca9f777e957211

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+hjhcm.txt

                                Filesize

                                1KB

                                MD5

                                367ea1077443ce870dceeb9c0041d301

                                SHA1

                                b9d4c1638be9647cd6572f7c8dcb18ec5040dfc1

                                SHA256

                                6f7de4dedbf456788e012b97b3ddfc40b95c8e409c7aa74b5ffde59b393eb356

                                SHA512

                                bef7d5799f0aed6689e33cebacdceb5287c599227150d6c3221b40f6d040335e38410ea66de55798304e388d7ab993edc366deff0b84c31b8c7b30ce6ed78b39

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                c1d34696992a2a42971ed67aec5251bc

                                SHA1

                                15b20c1cb8b91855fe3ec97dfb085684d280bcdb

                                SHA256

                                b51dfbbc46595495306fb4f4bbfbd1d97b40294a2eff1039fe90efaa457b5298

                                SHA512

                                d11a219716757feec33b936cb04bf49c004b82fecc5b46dc9f3a21ba78a0c66bbb0f89e7e93599afd4b3a5158d50fcc81f8326ac062506ada51b9dae291c88f6

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                87b3159755737584693a26412afe710d

                                SHA1

                                8510c1283c61b1d7966f57d23cb3c7cd9faa7c15

                                SHA256

                                723b12bb990328c8107ee814d633236dd04c8bc24904025e1950ded4232b6ec5

                                SHA512

                                b600b5f606a02e1ffdeff781c50448ef79765836068cf6d5aa80281a0023647bb5961ed2788d56b5dc8b37b55effdceb353b9626e6b1b62e3a0b338d9e9de876

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                0267a38469f3125cc39200726102b7e3

                                SHA1

                                6cbe64f765020bd0a213577f9d24af5fecbb0ae3

                                SHA256

                                dfd7378ef172ca0b51f089ac2d4f8ed46be11bd8dbc2b02a82b2477f79eff5c0

                                SHA512

                                24b64988d7caca105e2ca6b8ce36cb8b68d8f34ba4e7d2cfa07941b6bbcc24c349e9fd73589bdfdcfb1c0af57e1a70ba6ace276d994512206c149b3d1bee6d06

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                d22073dea53e79d9b824f27ac5e9813e

                                SHA1

                                6d8a7281241248431a1571e6ddc55798b01fa961

                                SHA256

                                86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                SHA512

                                97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                bffcefacce25cd03f3d5c9446ddb903d

                                SHA1

                                8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                SHA256

                                23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                SHA512

                                761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                e66dd6eb9a001c0db573c5f67f6b122c

                                SHA1

                                642589d8c2e9c2ac237b4b4555dc16e45888a177

                                SHA256

                                b31f967aaadd44af377448f56476722a0abf4b60577eaf26e3629ba30621df28

                                SHA512

                                cb499a673381529c46833e46bf21290e7a64ca650ce909187ba6b81e3625908630bf8498e703db57793bfca5e1ef0970ea015ebd8f247c7ca178a63c12050c79

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                c387fae5034b9cd9a1196732dff84682

                                SHA1

                                f22d6e91b3857b0c7d415bdfc98d033856d5368a

                                SHA256

                                0b76cce3b2ea609cb879d560705c8a4c8a2e33f34a5abde035190681484c558f

                                SHA512

                                e17e31a602417224dbc36c6e936e9f82cedbca45bbc1b71b8d80b008942ec168078d8cd82cb11a622c69af6c50a8f4591d98c32571894e1164c8495fb8cc8c68

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                373cc8cc1a88f63f5eba50c604e8d9b5

                                SHA1

                                942bd140d83d1a1082a9c0422f30119bc9703823

                                SHA256

                                0407950eeb03288a5db6fabc832896aea65c7decef6e7af842a87198adfe9c06

                                SHA512

                                29f973dfee89d18f9d4ab18e18f310d342827da47c2ac3bf5cece41acf965a7e05380f871447be95fd04d51e6aadb8784dcae6bdc837bb182e30967a3451b9b8

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662192103813.txt

                                Filesize

                                77KB

                                MD5

                                7aa3d307c3dfb1d769d1adc050d8be39

                                SHA1

                                25a3f7d0d7d6aae1d0c6dcfdc7a9d38b4e9987b4

                                SHA256

                                6df66c9054d39565968d4b6b0eb060205a02bf9fd3ed3efc2445bbc28e180687

                                SHA512

                                df31272aa01287c5722ed9763b6ddf446b33bfa669c54209497ce104f7b78a2590995a33a1059fa248328790eefb40c4fae1f976f2110be3dc2c45e73204b2ac

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727663401899668.txt

                                Filesize

                                47KB

                                MD5

                                ba41d964976942ef0e43baaeaba9fa7a

                                SHA1

                                b3ea94aa079f7cbbb4034cbc660d667a29271c48

                                SHA256

                                170a0581b9a166bec0442544e1e2f62f7b19916aea399fc0abe4c55297ade9c2

                                SHA512

                                4eca989cc0fecc6f80138108dabc61c89eeb48b938e2d83a35aa830306732b7886f532a550723158f1f740e307ce885c4154ec9192087d235eb4c66587a496ed

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727670771168387.txt

                                Filesize

                                74KB

                                MD5

                                a837cc917ddff3acce22b19cf758b54e

                                SHA1

                                2b7a93e9b71fad5eb75a1de52e712751c815ceac

                                SHA256

                                6e39ceb8b39003bf41a7805c8666e5596420bd89b46551c5f73a300cbbaebc27

                                SHA512

                                8713d30cf28340357d1804eb859eec64313fdcd089e30f38062a716ca0012e9dc99cc2888e0b4a6355d57e65e95268f1ccb3fc6020d70e75c80470b7ef6ebf92

                              • C:\Windows\cjnakbtbgtpa.exe

                                Filesize

                                428KB

                                MD5

                                77f9f38aff6772904e5cb6ff14a7abe5

                                SHA1

                                948101647975f44217414a8a8110b2a5d9e4cddf

                                SHA256

                                05884e3e77892db6e9ae3af788003e5265aa2336cd655ac4c81b98e3242ff04c

                                SHA512

                                6fdec7bcdeaa9fed3de2708265e0861622d003fd6d83ff1d5d8ad4ae1cbae7da6c9f2356ea74fd93df2736156703b6c883a10ffd39b79d27c87ef587dc53703b

                              • \??\pipe\LOCAL\crashpad_292_LBZIYDWVQSAPEKHP

                                MD5

                                d41d8cd98f00b204e9800998ecf8427e

                                SHA1

                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                SHA256

                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                SHA512

                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                              • memory/2672-2575-0x00000000021B0000-0x0000000002235000-memory.dmp

                                Filesize

                                532KB

                              • memory/2672-9291-0x0000000000400000-0x00000000004AE000-memory.dmp

                                Filesize

                                696KB

                              • memory/2672-10546-0x0000000000400000-0x00000000004AE000-memory.dmp

                                Filesize

                                696KB

                              • memory/2672-5577-0x0000000000400000-0x00000000004AE000-memory.dmp

                                Filesize

                                696KB

                              • memory/2672-11-0x00000000021B0000-0x0000000002235000-memory.dmp

                                Filesize

                                532KB

                              • memory/2672-10592-0x0000000000400000-0x00000000004AE000-memory.dmp

                                Filesize

                                696KB

                              • memory/2672-10593-0x0000000000400000-0x00000000004AE000-memory.dmp

                                Filesize

                                696KB

                              • memory/2672-2566-0x0000000000400000-0x00000000004AE000-memory.dmp

                                Filesize

                                696KB

                              • memory/3980-1-0x0000000000400000-0x00000000004AE000-memory.dmp

                                Filesize

                                696KB

                              • memory/3980-0-0x0000000002270000-0x00000000022F5000-memory.dmp

                                Filesize

                                532KB

                              • memory/3980-10-0x0000000002270000-0x00000000022F5000-memory.dmp

                                Filesize

                                532KB

                              • memory/3980-9-0x0000000000400000-0x00000000004AE000-memory.dmp

                                Filesize

                                696KB