Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2024, 08:40

General

  • Target

    b015b8821d635a55206799473c28b121_JaffaCakes118.exe

  • Size

    332KB

  • MD5

    b015b8821d635a55206799473c28b121

  • SHA1

    d622a2dd7873fb4ad0b0fdb30add295ff6d0a7fe

  • SHA256

    8837ded9097e82948c53a4c875d66ff10271127e93702f89a8e4a9265625564d

  • SHA512

    6a3f3edb297e839609248081c03dbc458fcac4ad4b91f2ed6fbc43d1ea0fbd410fce9d78cf9db734d4c5d666e1b5227a862223f0cd749bda78a94dca069b4dfe

  • SSDEEP

    6144:xB1n2nSpUKW3Rv4xlS4kUfFm22DK+UrxPKrugGDfh:xBOSp7W3RAxlSly9StD

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_RECOVERY_+kryej.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/3ACC2E22D2FC52A5 2. http://tes543berda73i48fsdfsd.keratadze.at/3ACC2E22D2FC52A5 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/3ACC2E22D2FC52A5 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/3ACC2E22D2FC52A5 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/3ACC2E22D2FC52A5 http://tes543berda73i48fsdfsd.keratadze.at/3ACC2E22D2FC52A5 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/3ACC2E22D2FC52A5 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/3ACC2E22D2FC52A5
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/3ACC2E22D2FC52A5

http://tes543berda73i48fsdfsd.keratadze.at/3ACC2E22D2FC52A5

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/3ACC2E22D2FC52A5

http://xlowfznrg4wf7dli.ONION/3ACC2E22D2FC52A5

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (867) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b015b8821d635a55206799473c28b121_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b015b8821d635a55206799473c28b121_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Windows\nnfukdlayinp.exe
      C:\Windows\nnfukdlayinp.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2840
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2724
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2852
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5072
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd556746f8,0x7ffd55674708,0x7ffd55674718
          4⤵
            PID:1724
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
            4⤵
              PID:4464
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
              4⤵
                PID:4844
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:8
                4⤵
                  PID:3780
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:1
                  4⤵
                    PID:2520
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:1
                    4⤵
                      PID:3896
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:8
                      4⤵
                        PID:3824
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:8
                        4⤵
                          PID:1272
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:1
                          4⤵
                            PID:2876
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:1
                            4⤵
                              PID:4500
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:1
                              4⤵
                                PID:3320
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8462843248161469276,9345849144498797991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                                4⤵
                                  PID:2396
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3312
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\NNFUKD~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2260
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\B015B8~1.EXE
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:1976
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4192
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1180
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:5112

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_RECOVERY_+kryej.html

                                Filesize

                                11KB

                                MD5

                                9ddcc979e78f0454497513b66b40998b

                                SHA1

                                314445e26a8c2e1a7c461fde2b4f93fdfe7e4314

                                SHA256

                                6a9b7e9fd347120d167c493f63bfab2bb82974d0bf5e25026770052c4b680ec0

                                SHA512

                                7fe5f0a8bb15049a09ea777ac1a3a2d6772cff89323226e38aa8eab6810425ce6c126eb346dc938960bbc0e2df0ce68ff31961ee3b5d7f99b749ae15650b64ad

                              • C:\Program Files\7-Zip\Lang\_RECOVERY_+kryej.png

                                Filesize

                                62KB

                                MD5

                                11066da03fd01978c68c63bea122851b

                                SHA1

                                51bf16a58bfab39afe2c3f4e1e8cd75f967a6948

                                SHA256

                                326b7d2b4a2b5d913f5d709d5da2a69798046ce851292c99878af5fc0321628e

                                SHA512

                                f650f6f824fa34c1c50a476015a7966108bf75e91eb43ae0a253c095caa1db977d8614f93cc801878033394ec6ae55cf44265317c716bd7f904b8f7b240a40ee

                              • C:\Program Files\7-Zip\Lang\_RECOVERY_+kryej.txt

                                Filesize

                                1KB

                                MD5

                                fce35dabfa740493e58d52f618782c7b

                                SHA1

                                dee71697cd621c4ffd312585cb66812530abe4ce

                                SHA256

                                04e2f078ed74a14a16df772e3d39b968266aa7a23575d60d6a735f8b3a73f1eb

                                SHA512

                                05da832541b5263450ae24931f14d51e2f207f0ac40e06d27fd12440e24a0d5603420f0ff5699423ab841a74f7e0560c0dcc2c5a8ca22cbf463f6241b7ce1844

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                bc535ed2a07e866686678ca7cc3e933b

                                SHA1

                                fab3e9fd8c7baa1aea235f1791d803bd3b7cbd30

                                SHA256

                                7fcec201c6e27a7df2e262aa146dcc2ba7ef8e74633893c18854d411ba54c89b

                                SHA512

                                d589d565b3e5406f76796abef7cffc3fbbb0aa6f34f52c3c9c2eb2769a69cfecfb4b2bf2594caffb67386fdcc375e291e971a217adcb0e1665bfa642bbe4088c

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                26a0a1fb6e97cf2c3367918f63662b02

                                SHA1

                                8957a5ade3ffdb92934bda644c2a80178b204e4e

                                SHA256

                                d653cb5537451ff70543f3337a492703333331fe7137ac83e9c815f2407c1bc6

                                SHA512

                                f3549ba298b79944a14663907e18934e721df3d7d8ca0cdb121875d9b021c0ad431ca763a83e597333dd4c4c9f6a786c602c34341749984c7af142b9b8b9599b

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                09d83fdf0937b18c03e0c7b6636168ef

                                SHA1

                                707d43063e91e888720ee2b143f970d8b039adfd

                                SHA256

                                bc6be24dc11de48c43de9fefbec619c86e284956119ff8635cc48f4ff689b01a

                                SHA512

                                94d48a3e0f5754abf811011a3356569f9edcbb06e55a7f475b1ede4de9c08f3505059bac0188b02dcb7151464ea88f198a2567f80928373668fac8d56e9d132d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                e443ee4336fcf13c698b8ab5f3c173d0

                                SHA1

                                9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                SHA256

                                79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                SHA512

                                cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                56a4f78e21616a6e19da57228569489b

                                SHA1

                                21bfabbfc294d5f2aa1da825c5590d760483bc76

                                SHA256

                                d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                SHA512

                                c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                a680a480fa735bf2ae523c0015952e7c

                                SHA1

                                150e8d4147fce1ae90dced61fa28cff473624812

                                SHA256

                                27486bd5c23468a5348694cf056a9297a62499c27e148d694967e6e46fc74597

                                SHA512

                                72d9cc50fb6b3e9c51da62fe9db07ae40863d3ca91c2cebc173518a7e42abbc150d42cdf9d95939642ec52d4dec72c6f607c8c33dd76faba308a054fa8ce2096

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                081b1db06dd14013df585552baab9dd4

                                SHA1

                                945656c348896b60c20baefdd1a6a55c0dfef60b

                                SHA256

                                4f758fc188c219d74bad324a0cc05edf5aac6c8a70aac4bc33a05a2db4eeaa1c

                                SHA512

                                28fffca3da4e81fb5d042d92681187dd7e026c0ba7686511710df82fdceb446681931818663801eb759b20e46ae6044efdcd0df478df9c9f571b892fb87b5cfa

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                4d3a5525e53177685266ebbaa395b3f8

                                SHA1

                                978a18bbb52567b3e970fa4e243054042bd494d1

                                SHA256

                                1a9e4648cd4abb10c821524e61089f0fd5e7ea0533d3636f163608496efe8e9f

                                SHA512

                                5f39294be9357f3db1d742519f499ea7bfa5124bbfad62fda2a704d8d15f993634b974639d8d24374ae589da9f1d3fc1733f2117d4e6f63275f3e0738476ffe7

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727656067266351.txt

                                Filesize

                                77KB

                                MD5

                                91697ecab3e4b545949c2680a2166232

                                SHA1

                                f097098602aea2bb497ee2bebb8313d951ed879b

                                SHA256

                                57f137a7c10ed7fdf92d164ecb7f16b08d2706cd9fbddf905e530999c244dd88

                                SHA512

                                05eba56f59f0310d29051e6efd3194cbb5b893993a3f3612258389794682ae96d62d8d060b0ea601bcb346e32669c50d63267cd9369a87203454eaa5f0bcdaa4

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727665714398674.txt

                                Filesize

                                74KB

                                MD5

                                b1357648e79f23590f80ee69c26be5a2

                                SHA1

                                e923cd5bfef767b475d8ee5fd997ce42770905a4

                                SHA256

                                b719270405144adef2cc5c769027940292f15ce0342e264891e2e61180b67468

                                SHA512

                                794588e95b95add7d27797b97fb9381c730b2f9a9133ba495bd6d95d2ea93dfcfd6f49acb2fc41e47c779f857beb3bdce2c09436be5dd6da16d071fb97c1999b

                              • C:\Windows\nnfukdlayinp.exe

                                Filesize

                                332KB

                                MD5

                                b015b8821d635a55206799473c28b121

                                SHA1

                                d622a2dd7873fb4ad0b0fdb30add295ff6d0a7fe

                                SHA256

                                8837ded9097e82948c53a4c875d66ff10271127e93702f89a8e4a9265625564d

                                SHA512

                                6a3f3edb297e839609248081c03dbc458fcac4ad4b91f2ed6fbc43d1ea0fbd410fce9d78cf9db734d4c5d666e1b5227a862223f0cd749bda78a94dca069b4dfe

                              • memory/748-13-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/748-0-0x00000000022B0000-0x0000000002335000-memory.dmp

                                Filesize

                                532KB

                              • memory/748-14-0x00000000022B0000-0x0000000002335000-memory.dmp

                                Filesize

                                532KB

                              • memory/748-1-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/2840-10547-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/2840-8512-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/2840-5071-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/2840-10591-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/2840-10594-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/2840-2550-0x0000000000670000-0x00000000006F5000-memory.dmp

                                Filesize

                                532KB

                              • memory/2840-2531-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/2840-9-0x0000000000670000-0x00000000006F5000-memory.dmp

                                Filesize

                                532KB