Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 23:48

General

  • Target

    97ee4e31ab54dd1286221f66882afc62_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    97ee4e31ab54dd1286221f66882afc62

  • SHA1

    ed782ac0c113e6ee1573539927f3374b8c3e859f

  • SHA256

    4944771164216ccf6811e327befaa3aea12e9247ff731497a94f3c03d5b1b486

  • SHA512

    1e62643409d12493e3e53da846b746496ae55ccd207ae3aebc321744a62717ea8bbe74280ec5d7373a3478ba16bd5763711a002fc8778aaf1a6f068ffd80d1b0

  • SSDEEP

    6144:9YMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:9nSdO0iNEPn+TGOoYzwscMSOXUIJ

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+ydjjj.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2FB68B8F69E0ED66 2. http://kkd47eh4hdjshb5t.angortra.at/2FB68B8F69E0ED66 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/2FB68B8F69E0ED66 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/2FB68B8F69E0ED66 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2FB68B8F69E0ED66 http://kkd47eh4hdjshb5t.angortra.at/2FB68B8F69E0ED66 http://ytrest84y5i456hghadefdsd.pontogrot.com/2FB68B8F69E0ED66 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/2FB68B8F69E0ED66
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2FB68B8F69E0ED66

http://kkd47eh4hdjshb5t.angortra.at/2FB68B8F69E0ED66

http://ytrest84y5i456hghadefdsd.pontogrot.com/2FB68B8F69E0ED66

http://xlowfznrg4wf7dli.ONION/2FB68B8F69E0ED66

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (877) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97ee4e31ab54dd1286221f66882afc62_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\97ee4e31ab54dd1286221f66882afc62_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Users\Admin\AppData\Local\Temp\97ee4e31ab54dd1286221f66882afc62_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\97ee4e31ab54dd1286221f66882afc62_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3356
      • C:\Windows\wrbkidnmrryw.exe
        C:\Windows\wrbkidnmrryw.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Windows\wrbkidnmrryw.exe
          C:\Windows\wrbkidnmrryw.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:644
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3848
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:408
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3024
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8469446f8,0x7ff846944708,0x7ff846944718
              6⤵
                PID:3340
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
                6⤵
                  PID:2680
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
                  6⤵
                    PID:5004
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2508 /prefetch:8
                    6⤵
                      PID:220
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1
                      6⤵
                        PID:4308
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                        6⤵
                          PID:4784
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:8
                          6⤵
                            PID:2692
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:8
                            6⤵
                              PID:4304
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:1
                              6⤵
                                PID:4896
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                                6⤵
                                  PID:4732
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                                  6⤵
                                    PID:4776
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18065462758930638230,6191154937493715406,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                                    6⤵
                                      PID:3752
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:536
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\WRBKID~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2488
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\97EE4E~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4904
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4756
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2716

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\Recovery+ydjjj.html

                                Filesize

                                9KB

                                MD5

                                50307fd7328ac4ebad5d08667ebab79c

                                SHA1

                                3481c01e978ec9ddbb3e6571a94099625958785a

                                SHA256

                                7053b5f91a57bd5dde37b9bb5556a31ed101af640dce2948b8984e19120ac691

                                SHA512

                                1348b2f7a50607cd2dba5c443990aa4a4b9afdecddec53f5051398d6b8739f611bc8b359360f92833155ee8108b0b7065f11e215b206b3ddf16e4b00bc2f4b33

                              • C:\Program Files\7-Zip\Lang\Recovery+ydjjj.png

                                Filesize

                                63KB

                                MD5

                                c210db700c2d44efb535f3ab2d7b9470

                                SHA1

                                cc6096c4a83dbb6d912f5fc9e307d345d4e67ca8

                                SHA256

                                729d15abc9d374f0f64c407eb12c95ecacdf6421177bf290113957c75b48a0bd

                                SHA512

                                2b4e5c01c76b86f5661ac054d46332762128105aeacee1fffe83b52d6b515435da1d69b0dcc886a7a1b8fe9ae4e793ef7846bb5a5728b05286da6b2e02bfe373

                              • C:\Program Files\7-Zip\Lang\Recovery+ydjjj.txt

                                Filesize

                                1KB

                                MD5

                                38dc32c4809fd74c19b12eed00d3b5b9

                                SHA1

                                f263ccb4d6bc091711c6654b61d164c122a2c836

                                SHA256

                                b59437178f40384e61f7250a24fb4fa0571251ded43f6118ef4518282a47adb1

                                SHA512

                                1186c9aec7eb34d01835544e0882b092205e79302afc474488ebe51a105aa3065e29504fccb8466f2e640dc3ff9ede2d9d330a9b63e5d7b576c6b9fc349139c6

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                e6d51335b0604a47d4ce7697f6800246

                                SHA1

                                5428d1a5ffe5bc2faa31307859dae1a994925f1e

                                SHA256

                                c688dca054de466c74c911a651ee42f1ab80129193a3b0f71d8cf3f044bd4be1

                                SHA512

                                0f091339e1a8ade11c0a2d9fe88b7b6a34f93ea68d23a0a49eb9690397099016c7811e05e1a45b86cd3a793ca266758fe796e3870152acccfa305dfd5edc355a

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                d22a4af3bf91abd4223e28f3d167c1ce

                                SHA1

                                9178c59b9b89f0d68ceff49f8e649240afcf2ee8

                                SHA256

                                f00a7a5b50f8fbc416055c9d525e9bb36eb7320bf5a1099c25588e2675b72d8b

                                SHA512

                                f4d8303e3068581721b9b18747df2517159f45c26a578b7100c139de4bbeed11def193a96fd6c12321fd222bcf275a2b03a44237695e3bdcc36825c388c5a1e9

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                375a185b7fdeaa1df43edcfe56f190a3

                                SHA1

                                334fd6c25a412b9016273b77a1866839db566da4

                                SHA256

                                af7114eb3ed8f5eda0982ab78ac4dda15cbf28c7a6fb716633873732e667a76e

                                SHA512

                                5744513dc6f8cd2bd10a43de4a6987e45999f57d24271e569d2c39be3092613a331fc8f6016222271f46cd3e900bfa5b9386c241a8366af146eef83f6ab61ea5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                c2d9eeb3fdd75834f0ac3f9767de8d6f

                                SHA1

                                4d16a7e82190f8490a00008bd53d85fb92e379b0

                                SHA256

                                1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                SHA512

                                d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                e55832d7cd7e868a2c087c4c73678018

                                SHA1

                                ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                SHA256

                                a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                SHA512

                                897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                733796e0d1f8cbdc59581e098471e372

                                SHA1

                                9365bb3935611268d8851749cca3cdc6afdf37ce

                                SHA256

                                55ded099ebe706e36ed3f146bebc60ffb03613f11e6f060d33a22f7f2cb73be0

                                SHA512

                                512d9f605f8cb19beb87fdf7e0637f7eeaef03a2f66298e22a23a0108682471987f9db56a806f70fbae2697741902a6c98ad0e4b6a1df024d7958a45ef8015ad

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                42fef285c699f4b96c7d0fb6814cd0a2

                                SHA1

                                fb0788700c608a524901e1b72f93dfc80f202ed5

                                SHA256

                                6d2cdd0af8bcf471bdf0d66ede43c39849f6c862db01c9865fb997a5ba01f694

                                SHA512

                                c531d0741139538c33d50abaa97660d0891fb6cef8c6a21db2bc7b8611e7ea581d33d7c639bc53df6acdd859e094d55f05346e48441b681717f98be20df308f9

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                c7bed43581329ea295014ec4beb003b5

                                SHA1

                                671ba201e333c5ef471eb727cdf361b29432007f

                                SHA256

                                5f63d5829aeec227f2baeca3683a78cbcc9e775a8c3a5dcd9aa0bc59f24d099c

                                SHA512

                                119b9b6e291f26b19a304b6a7e1e520d6aac79c7fb18e5d5032d408ac6f226fdee6070d26b040ef67e1a3ebf454d8e3adb5d2bdca257d1dd05d7b94abe18a55d

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662820354407.txt

                                Filesize

                                77KB

                                MD5

                                4a1bfb240c77ce598142185d23a6e91b

                                SHA1

                                a058533165f8e5aac2d1d2d193923bad81bb1469

                                SHA256

                                944a5deefba172587fbda0295a6433b5a788b7dd88430499fa2b39874c74a9bb

                                SHA512

                                f14d71025d3d30798b06c2a99b95805585a824d3c7c0ad2a40858616ec5ef79aac2c849ee7823dbd8c44de7656e70fb2ee76f88ffab53dc7f834967fe9e84af6

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727664176773847.txt

                                Filesize

                                48KB

                                MD5

                                ae6c2b94b752964ab45b1f37206b3ef1

                                SHA1

                                64a839061de9d21b79dbab3524a307ce60837cba

                                SHA256

                                eb92a53e24ba0567f7b04f26f57a1c8551913d1b8b14959334668d2a2d46e3e9

                                SHA512

                                8a4420055fb1a6c7f7784a29f4d589e04b207f0f8bb025f6cf8e00fc4ffedc105567b1ba71fed6e8233c874c713fd0e84f6c917df93d2712b2d2674f4eea57de

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727672589120253.txt

                                Filesize

                                75KB

                                MD5

                                9707da23e797a365e5f9cc31c68b999e

                                SHA1

                                3dc20713880b1e98d1e6828998e9a9068f666a42

                                SHA256

                                b92bd9d22accd8ebe4d0c5a899259c8a25da892e2708be862e8a1af9a224cb82

                                SHA512

                                06804e17959b2f8c15a2effe196050a61e81ce9d9569e28a2b50df2127206e72fff66b5aed4f4685de4d46dd7ab8f2b532c0fed8ad1e6a6f3be6805ee27b97b7

                              • C:\Windows\wrbkidnmrryw.exe

                                Filesize

                                388KB

                                MD5

                                97ee4e31ab54dd1286221f66882afc62

                                SHA1

                                ed782ac0c113e6ee1573539927f3374b8c3e859f

                                SHA256

                                4944771164216ccf6811e327befaa3aea12e9247ff731497a94f3c03d5b1b486

                                SHA512

                                1e62643409d12493e3e53da846b746496ae55ccd207ae3aebc321744a62717ea8bbe74280ec5d7373a3478ba16bd5763711a002fc8778aaf1a6f068ffd80d1b0

                              • memory/644-18-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-9124-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-24-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-21-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-20-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-2984-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-2985-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-5025-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-19-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-10882-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-10826-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-25-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-10816-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-10817-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/644-10825-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3356-15-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3356-6-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3356-5-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3356-3-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3356-2-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/4716-4-0x0000000000A20000-0x0000000000A23000-memory.dmp

                                Filesize

                                12KB

                              • memory/4716-0-0x0000000000A20000-0x0000000000A23000-memory.dmp

                                Filesize

                                12KB

                              • memory/4716-1-0x0000000000A20000-0x0000000000A23000-memory.dmp

                                Filesize

                                12KB

                              • memory/5096-12-0x0000000000400000-0x000000000085C000-memory.dmp

                                Filesize

                                4.4MB