Analysis

  • max time kernel
    119s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 10:33

General

  • Target

    d9279ba3dbcbeefbba19f47f801c114edfd7a4532959b519cc00b24dc54a5ee8N.exe

  • Size

    352KB

  • MD5

    b0c00390c9aebb41cfce74f7415bf210

  • SHA1

    62f3f37691303aed6a645631439dcc5c51c6e38d

  • SHA256

    d9279ba3dbcbeefbba19f47f801c114edfd7a4532959b519cc00b24dc54a5ee8

  • SHA512

    0c199aec76be1fc318214c4fee5ef38773cd11d469c9221ddcd86c61c53d176b3a8b2d1cbbdd0c86f482be7c8d250bf9fd8e544c3995f96cc8472eb67aff6ee7

  • SSDEEP

    6144:QMeb/EDtpBx1aRXJub19pf3gOURaJmf+ubexB3wLaYZSzvF:QTb/wtN1aRXJg1f3gO9Jm+u2BgeYkzv

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_ReCoVeRy_+upaue.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C9EE3066B43A890 2 - http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C9EE3066B43A890 3 - http://yyre45dbvn2nhbefbmh.begumvelic.at/C9EE3066B43A890 If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/C9EE3066B43A890 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C9EE3066B43A890 http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C9EE3066B43A890 http://yyre45dbvn2nhbefbmh.begumvelic.at/C9EE3066B43A890 Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/C9EE3066B43A890
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/C9EE3066B43A890

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/C9EE3066B43A890

http://yyre45dbvn2nhbefbmh.begumvelic.at/C9EE3066B43A890

http://xlowfznrg4wf7dli.ONION/C9EE3066B43A890

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (870) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9279ba3dbcbeefbba19f47f801c114edfd7a4532959b519cc00b24dc54a5ee8N.exe
    "C:\Users\Admin\AppData\Local\Temp\d9279ba3dbcbeefbba19f47f801c114edfd7a4532959b519cc00b24dc54a5ee8N.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\wrhsmclstyyv.exe
      C:\Windows\wrhsmclstyyv.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3488
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:4768
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3144
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7edb46f8,0x7ffc7edb4708,0x7ffc7edb4718
          4⤵
            PID:3972
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
            4⤵
              PID:2324
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:3
              4⤵
                PID:4416
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:8
                4⤵
                  PID:3412
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1
                  4⤵
                    PID:4992
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                    4⤵
                      PID:4904
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:8
                      4⤵
                        PID:3612
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:8
                        4⤵
                          PID:300
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:1
                          4⤵
                            PID:2360
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:1
                            4⤵
                              PID:4640
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:1
                              4⤵
                                PID:4632
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16213424124615799820,982853436084760238,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:1
                                4⤵
                                  PID:4136
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:224
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\WRHSMC~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3196
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\D9279B~1.EXE
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2052
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2136
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3656
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2508

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+upaue.html

                                Filesize

                                12KB

                                MD5

                                558ff476c85efbfba24efbfb45d5cd59

                                SHA1

                                3d5ace5bd2415122d95bb2c59682c8251b895c0b

                                SHA256

                                dbbf9c868b1d182a3cbf5d18011c100a2a42545024d6d743fc48cb287fdc1ff3

                                SHA512

                                f1565a5811c97a2f1822051a0214306e2ccd3687ee72dad289b6c68c1c227943bd80cd3528ff8c74ba9208c40013b89d1408f66170ec9fe16f95d295581e4b7e

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+upaue.png

                                Filesize

                                65KB

                                MD5

                                1ca1ca0f302519b37932b71f3674a15b

                                SHA1

                                cb3b22583ced2e0a6bad0557a92f90993a4fe452

                                SHA256

                                45a3f835cdc0ca6346b8e78bedad50da35fc7c897a5a6ee853459e0fc84382a4

                                SHA512

                                6ed4a3e9239b0c31247e4a227ba1bf157261d8da4678a4bcf003637b5f64cf97814042dd8c4270c9972f0d0ba05c7264c2604aa5b4eb8fef7d78c472240e54ab

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+upaue.txt

                                Filesize

                                1KB

                                MD5

                                2aa7f88409c820271bcab6bb88ea0a4a

                                SHA1

                                e95f49265c9fd0296ec695bcd4c3bbe49bf4c8d0

                                SHA256

                                4cc41494585d455acfbf252d452a1d2a0c41fa3c22a6beaceb9858ee08dd63e9

                                SHA512

                                dc3015603e28527b7b7ae5bd7efaf494c1cf5d917e517ea1d4eb43766f04cd4ea6df124313db04c941720742a23612456d7637c7aaea22797a979394b47d34ef

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                e54bf8487eb3d48d7eb698130e576ff6

                                SHA1

                                3cdfc9451c6b92c2ce72d6012dfde231acc1eef2

                                SHA256

                                f9b377ae33eda64f6d3f3cf34df1c846ab5c7a3217e75aaf0223bb72e00b0621

                                SHA512

                                d4e23928ca51522b592b0a12548f97696f0640e2eca0184fa978c462a3478c56b21d88fac6cdf9d668c0b8fadc5654467dcc2c910ad4a2ca71fb94e177568439

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                c01317ea90708d83d5a38b7e7d764fdf

                                SHA1

                                76a84234ed60ceea44865b93ad24c35547bbb3eb

                                SHA256

                                dd3aafa17c2d0454d609d23194d16378d83510420059800de907070966323c6a

                                SHA512

                                d7af3aa9d5c3fb4366d7c8483a52c942e6925a14b173ee1735bedbeb0eb979a479e135b418b878d0a3b91f1592312080f0eb607f6e85cf2495c99fffbcefe568

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                313510889d18cc5c5a2556b8c454575c

                                SHA1

                                4f637531c4fb54a2c12bce638ef330fa873934b0

                                SHA256

                                47c06d532faca282d8de09f63285d8d17ec45d9c74bfd59f41871943b6fa1895

                                SHA512

                                f8f92aafea3f7dbb46b7deb5e93c0765ae90d9465fdfc1f5068168c1c2d453eeb0515411ea2c2fac8f0144ca20fc0ba40e1976bcca5e49d48731e48016ca2a22

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                37f660dd4b6ddf23bc37f5c823d1c33a

                                SHA1

                                1c35538aa307a3e09d15519df6ace99674ae428b

                                SHA256

                                4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                                SHA512

                                807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                d7cb450b1315c63b1d5d89d98ba22da5

                                SHA1

                                694005cd9e1a4c54e0b83d0598a8a0c089df1556

                                SHA256

                                38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                                SHA512

                                df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                305364c405591cb7ce5d0e8a541988c8

                                SHA1

                                ff52ea6c9f4513141334cfaa6202c87c83a1b016

                                SHA256

                                560626d559ae20d5ca90429fbd45c75ab9eb4fe15451e0bd470e958337c73fbb

                                SHA512

                                79f48704bc049783d30a374306c28c69fc46e3e9b082d8dfbd9079212530f91b313fb3a632590dbefbf5737d9b7bdd01201d27f98634d5bd24f41dec78c03c74

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                ebde656077ae87d764fbf6b5fc719846

                                SHA1

                                d6c3c9169e9b155083646cb5717304a24b113625

                                SHA256

                                b72a55eaef59c0a84dc1d99188f25d7e80dbb91113ef4b1aa466f59a9e3cdc73

                                SHA512

                                800f44360562b975354638e733010aaad52368a1d26845dbd0b871eb473f3aef9a5aef188d7da81c34e4a859530e4ce4360442ee56e58482687dd45ea6faf6a8

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                1863bb637bbdf0ab88d58a0d16e908a2

                                SHA1

                                8d41cd1cbb0652b1b38b8fdcce0c1f71de370531

                                SHA256

                                e3f73dffd6f83551182a5bbce6ef90243945eccc5fd0c3660c95b8430ee5e78e

                                SHA512

                                428c8a33f03d5ce4f299a64d2500e58d297b15b8a35eee004f837b36b5ce780ec7e2ab3c639bacc734b7c5f2d869e5627c95d3cf5cdfab7228e0c98c000830cd

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727658865736960.txt

                                Filesize

                                77KB

                                MD5

                                3b86bd59d28c709392595aea67e612f7

                                SHA1

                                c22ae8d911edf131993791e0c174d630d2656489

                                SHA256

                                82f969017001e484cc674984deab046b5e134456c422b60bb9dc9e91d34c40da

                                SHA512

                                8b5bbdb9c118bd1256795e31ae245726bf1ba632dd6a68f4359114d757fc89c1bc4ba37fc09943e6c12ad95dbb52ea5a8e94c6d7876e945c170f0b77efff07f3

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727660257997193.txt

                                Filesize

                                47KB

                                MD5

                                7a959955d1c0280a20e5cee46258684c

                                SHA1

                                2a6d14b409ef51b7530f68eb745cf55aaa724d43

                                SHA256

                                488d02417ffcb12ba8f950ac2ef00fb2c3f5ef8dd37f7e872ec3eed39ef9f783

                                SHA512

                                a394629373d8e1cec2ada34db6d16aaa3d55449076716ae4dff9fb9ac55784c07e72081da07e6de17af8709a27cfa92599759dc1751c20985a70e5936901e258

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727667861810871.txt

                                Filesize

                                74KB

                                MD5

                                c8b26642aab68b9dcb38f2c745d9ca84

                                SHA1

                                d5758ba3dc2cb6aa568475b984f4737439584f57

                                SHA256

                                5c2b8d36af873829f3f9ae7fdb3ce7fa2a904703c8787d2b53138ea3d32a3f3d

                                SHA512

                                895532b87b58f590313afafb286f7b57eb74a127f2ef7747feffe77e59043f78ba9c0b54e41a5e48f8741bd1b1050a334aac510e4473ab5c273790464f60e1c0

                              • C:\Windows\wrhsmclstyyv.exe

                                Filesize

                                352KB

                                MD5

                                b0c00390c9aebb41cfce74f7415bf210

                                SHA1

                                62f3f37691303aed6a645631439dcc5c51c6e38d

                                SHA256

                                d9279ba3dbcbeefbba19f47f801c114edfd7a4532959b519cc00b24dc54a5ee8

                                SHA512

                                0c199aec76be1fc318214c4fee5ef38773cd11d469c9221ddcd86c61c53d176b3a8b2d1cbbdd0c86f482be7c8d250bf9fd8e544c3995f96cc8472eb67aff6ee7

                              • memory/1504-2-0x0000000000400000-0x000000000049C000-memory.dmp

                                Filesize

                                624KB

                              • memory/1504-0-0x00000000020F0000-0x0000000002176000-memory.dmp

                                Filesize

                                536KB

                              • memory/1504-10-0x0000000000400000-0x000000000049C000-memory.dmp

                                Filesize

                                624KB

                              • memory/1504-11-0x00000000020F0000-0x0000000002176000-memory.dmp

                                Filesize

                                536KB

                              • memory/3488-8393-0x0000000000400000-0x000000000049C000-memory.dmp

                                Filesize

                                624KB

                              • memory/3488-10724-0x0000000000400000-0x000000000049C000-memory.dmp

                                Filesize

                                624KB

                              • memory/3488-10730-0x0000000000400000-0x000000000049C000-memory.dmp

                                Filesize

                                624KB

                              • memory/3488-2460-0x0000000000400000-0x000000000049C000-memory.dmp

                                Filesize

                                624KB

                              • memory/3488-5020-0x0000000000400000-0x000000000049C000-memory.dmp

                                Filesize

                                624KB

                              • memory/3488-10769-0x0000000000400000-0x000000000049C000-memory.dmp

                                Filesize

                                624KB

                              • memory/3488-2461-0x0000000002160000-0x00000000021E6000-memory.dmp

                                Filesize

                                536KB

                              • memory/3488-9-0x0000000002160000-0x00000000021E6000-memory.dmp

                                Filesize

                                536KB