Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 17:25

General

  • Target

    a334ab3396ed6d7d152c86a41474210c_JaffaCakes118.exe

  • Size

    376KB

  • MD5

    a334ab3396ed6d7d152c86a41474210c

  • SHA1

    d92a16044e1a34304d9c8f722dfc1a685eb67094

  • SHA256

    cbbe450bc39c7c5f00140f416299c0302b890c516e80a51e2f4db40362c6aa8e

  • SHA512

    ec455d4bef69ac8a11461b2efdcb4bb5370a85efc81a773157717ab6c8022cc9e36e55d6aab642c21c157f2e8301e8232550661502e01a25234c4121388496d0

  • SSDEEP

    6144:Ze3rNhMeYq4CGRTs4kadSoKVStcmTVn57CpSCwsUbg62oXd:ZY5hMfqwTsTKcmTV5kINEx+d

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+siqmo.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2224E759251D368 2. http://kkd47eh4hdjshb5t.angortra.at/2224E759251D368 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/2224E759251D368 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/2224E759251D368 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2224E759251D368 http://kkd47eh4hdjshb5t.angortra.at/2224E759251D368 http://ytrest84y5i456hghadefdsd.pontogrot.com/2224E759251D368 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/2224E759251D368
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/2224E759251D368

http://kkd47eh4hdjshb5t.angortra.at/2224E759251D368

http://ytrest84y5i456hghadefdsd.pontogrot.com/2224E759251D368

http://xlowfznrg4wf7dli.ONION/2224E759251D368

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (878) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a334ab3396ed6d7d152c86a41474210c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a334ab3396ed6d7d152c86a41474210c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Users\Admin\AppData\Local\Temp\a334ab3396ed6d7d152c86a41474210c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a334ab3396ed6d7d152c86a41474210c_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Windows\armyeniwtcel.exe
        C:\Windows\armyeniwtcel.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\armyeniwtcel.exe
          C:\Windows\armyeniwtcel.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2716
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3604
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:5080
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3760
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ec4f46f8,0x7ff9ec4f4708,0x7ff9ec4f4718
              6⤵
                PID:3668
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:2
                6⤵
                  PID:4308
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
                  6⤵
                    PID:4228
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:8
                    6⤵
                      PID:4596
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                      6⤵
                        PID:1008
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                        6⤵
                          PID:2188
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8
                          6⤵
                            PID:3876
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8
                            6⤵
                              PID:2520
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:1
                              6⤵
                                PID:364
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:1
                                6⤵
                                  PID:4352
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:1
                                  6⤵
                                    PID:676
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3507744731653871065,1885152087148003902,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:1
                                    6⤵
                                      PID:3540
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4852
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\ARMYEN~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4976
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\A334AB~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1400
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4256
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1216

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\Recovery+siqmo.html

                                Filesize

                                7KB

                                MD5

                                2e40f16a63df70417618ac7d325a0eae

                                SHA1

                                d7f96d9e3eb689b38580b117ce0a9c1aff61324a

                                SHA256

                                6bd4cc99a11782231f831b1cef8f5bba050e4478b00fbf339ed79c6b874e057e

                                SHA512

                                22c00d96f5c69c4c02fc8dd845b0c30b76e64c16add4f4f899fd490d08d9eb4666a755da8c5e1d05baeaf069d9d9dfb93229c0f47c156668f4d4ff16442451f4

                              • C:\Program Files\7-Zip\Lang\Recovery+siqmo.png

                                Filesize

                                63KB

                                MD5

                                916f877ee568f6c833d46d710994feec

                                SHA1

                                fa01f0a43867662696fb14d7bad034f124f25712

                                SHA256

                                da8ebfba563a358d32775a47279fabda5369014a1e33cfd03a7aa43f9a91f078

                                SHA512

                                49e2d4d81848578ed2ec38924b390e198477f85e608a42391df0fdbb52ff83c4d91eef659734e1f5b7bea5695acc44a3c52905125044adb729cb419b88652343

                              • C:\Program Files\7-Zip\Lang\Recovery+siqmo.txt

                                Filesize

                                1KB

                                MD5

                                1f4d80b59265c9d12e399c2d9a976938

                                SHA1

                                139b6673571e6f550f02e1319db746d0a2b697d7

                                SHA256

                                a34673b92f692e6252521cb05fd10bfb8751b267c2ea2a19cbb9663d65d6868e

                                SHA512

                                381025fdc14fd2b2bf8e3287e93ab425d3b22db788ca45e6a9678fbd4f25ca08ee45590dfab74b78012e5c089b9b6031803ac29c904536d71f7d048f687919c3

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                0901a936e390dd4f08c16a49194b1574

                                SHA1

                                bbb12eb56338646a511c3cc4b859f18457283a56

                                SHA256

                                1f6608b2420c7c17ddbee0f39ab09896805555ac60175a30c5fd0263cee6389b

                                SHA512

                                25dd3c4f6a2a1f433919908a35f835781c0ccde271f4bf8973426f72f0c74f919e4f031a4fb349fa01efcf343fe8ebf4b9f1666abdcf08e92a34240d590f4357

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                9d635cf1e3c7a31f0250af7db293276f

                                SHA1

                                5d28fbdcf421369740c68a7f32b14fdcc12c2609

                                SHA256

                                6a9c24120c16cc77d9200cc993315554ff7413481d03483e9bd14a5326682afa

                                SHA512

                                d2243be8653186ea681f01698e89a92395d9b70574a94d59424faaca5678c6bc1b87f258e18ee736896c9a8609c6821ead4fcc10775c53143b626374d228ebeb

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                d36284e371c87803b9aff137a04176fa

                                SHA1

                                34d3cc1d5b8db3749b390807c3ee60a23079fc4e

                                SHA256

                                1812370f8de4406bfb5ff90b5bc05ee1a8aea51c071e16c799ba79598bad7b7d

                                SHA512

                                ce2068561396d9615c69379e8a6d09a35593ae2757be2d053c89d7aef84b73ecfd65cfca375d555a278b0bccd75cc8954618ac3ddba1fab86a67ba1e92ed3ce9

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                34d2c4f40f47672ecdf6f66fea242f4a

                                SHA1

                                4bcad62542aeb44cae38a907d8b5a8604115ada2

                                SHA256

                                b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                SHA512

                                50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                8749e21d9d0a17dac32d5aa2027f7a75

                                SHA1

                                a5d555f8b035c7938a4a864e89218c0402ab7cde

                                SHA256

                                915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                SHA512

                                c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                9a910a9495b6caded976eeca6fedfa73

                                SHA1

                                5ab96a107a99f09ff0643c89fb40af707223e3eb

                                SHA256

                                5276322e67f8d3904efb722e61af2401d0b67736d150c169d6e1fd4f550a6fa2

                                SHA512

                                25e2d1364ad650f13a6c507a9410a1056de4cd85d6e223e6223e6f9fef8aa917560dec782676d16b752cb7c7cd796e0b69534378ddfb24086b5f56c8905f0ade

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                c027d70b9bfdb9ebdc38157b83609eda

                                SHA1

                                4264f8fcf2e0fc7f14624d871870edb8fd75293d

                                SHA256

                                790ab7320a54c57385a481a7987642be8183abf5c5cdb22d6907b9258ac969b8

                                SHA512

                                b590cd28e858ba5f1ba10db7735921fa094f65f8dca98fb4722e619e27981d251003f705173dd9c475d60ad1ed0d7fc613f01dedf5fdc016b2889336f1c754ad

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                7831c517a436a6f15a55661a75a49e78

                                SHA1

                                d89fc4cc1ca6512601f085e5f82990c52b9c482c

                                SHA256

                                5bb98c1d94c061391b64a806a3276f3e94ec2fde3649d91927878ed9cd0ad249

                                SHA512

                                e3ecc359ca3b71c15cb30c0321eafd7a358a443dba0faba040912d3c701d38aa3a666bd76d64f89df7f0f42c26c5374e369dfb341f848d31b4042100ed8cd9e2

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662360645001.txt

                                Filesize

                                77KB

                                MD5

                                8b63e6134178d977ff9beb9fd08cd554

                                SHA1

                                0654d21d2c5b05c9b74ab6ca9f58ae546519b9c4

                                SHA256

                                165b0d249b988c4a9b4b09c64bc9c443f87bc9cacd4fd5f9f77b73ec599626a0

                                SHA512

                                8f9eb48dcd876dca7a86cee63e151065fe7a5b410847f4220ee10d427ac6499437a6e67e5f6613450df6a3905a6a93b02e5a0504a3de20945ae8c21f4c64e0d8

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727663623337830.txt

                                Filesize

                                47KB

                                MD5

                                90847825b3960d6c7f5e4762a15b1357

                                SHA1

                                78f74ed94403b3b5a2076fb6b8fb15d3206ffcdf

                                SHA256

                                9c77bf34c3aacdd9d25c193f6e83f6959d851dfdb3e008ed896f2877231e683c

                                SHA512

                                88892e29da46b8d4538b0652286999c2dba70db91e85a4c317b9fdfc880790da20ce5b8ed9c8fa8f556ea4b0f7615cd6cc1aefae168eaa088cd3d0ad73966f4c

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727671211214398.txt

                                Filesize

                                74KB

                                MD5

                                45815622728bd8a0fe75bf48a4b23334

                                SHA1

                                b1ffd7e054722b4fdd36f0b469c23282e7f6ac31

                                SHA256

                                160e54695500f0eb326009fcb89d4d1b798d69ce1958ac496a5c77cdf8907b90

                                SHA512

                                daa1925a207e8bc1aa7c354c1fdf8ab72da8aa8aa3e1cde37d76ad0d5ce76c1d0bdd62a2da66d09634cb95ae6f6e462419a0ba73ba54ca25a007e3547f1836f6

                              • C:\Windows\armyeniwtcel.exe

                                Filesize

                                376KB

                                MD5

                                a334ab3396ed6d7d152c86a41474210c

                                SHA1

                                d92a16044e1a34304d9c8f722dfc1a685eb67094

                                SHA256

                                cbbe450bc39c7c5f00140f416299c0302b890c516e80a51e2f4db40362c6aa8e

                                SHA512

                                ec455d4bef69ac8a11461b2efdcb4bb5370a85efc81a773157717ab6c8022cc9e36e55d6aab642c21c157f2e8301e8232550661502e01a25234c4121388496d0

                              • memory/856-0-0x0000000000D40000-0x0000000000D43000-memory.dmp

                                Filesize

                                12KB

                              • memory/856-4-0x0000000000D40000-0x0000000000D43000-memory.dmp

                                Filesize

                                12KB

                              • memory/856-1-0x0000000000D40000-0x0000000000D43000-memory.dmp

                                Filesize

                                12KB

                              • memory/1956-12-0x0000000000400000-0x00000000005EB000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/2716-17-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-10762-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-2327-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-2328-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-4452-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-7560-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-24-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-23-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-20-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-10159-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-10761-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-563-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-10770-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-10771-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-18-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-19-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2716-10812-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4512-6-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4512-13-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4512-5-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4512-2-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4512-3-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB