Resubmissions

04-12-2024 11:27

241204-nkqxnstpgz 10

04-12-2024 11:23

241204-nhcl9stpbv 10

Analysis

  • max time kernel
    146s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 11:23

General

  • Target

    c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe

  • Size

    376KB

  • MD5

    c24ec3c4c8bad4bffe0a30c5da5fb33c

  • SHA1

    6c27f9f02c94dc9ce3bf23970b9071f7b7a0d455

  • SHA256

    6a7506d51f1a4c93555351464c571c856c01c020eba666f4182a201e3f5b7ba7

  • SHA512

    bf4e4dbd10559d601fbc93d9099c15fba4d40812a1f539acd07b2b5a9feb843ed005892f313624039de4f4e04b3cead9ad759723037ab2a0f7814e7158416d6c

  • SSDEEP

    6144:Te3rNhMeYq4CGRTs4kadSoKVStcmTVn57CpSCwsUbg62oXd:TY5hMfqwTsTKcmTV5kINEx+d

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+wfpoa.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/D2DCC5A060FE6AA 2. http://kkd47eh4hdjshb5t.angortra.at/D2DCC5A060FE6AA 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/D2DCC5A060FE6AA If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/D2DCC5A060FE6AA 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/D2DCC5A060FE6AA http://kkd47eh4hdjshb5t.angortra.at/D2DCC5A060FE6AA http://ytrest84y5i456hghadefdsd.pontogrot.com/D2DCC5A060FE6AA *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/D2DCC5A060FE6AA
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/D2DCC5A060FE6AA

http://kkd47eh4hdjshb5t.angortra.at/D2DCC5A060FE6AA

http://ytrest84y5i456hghadefdsd.pontogrot.com/D2DCC5A060FE6AA

http://xlowfznrg4wf7dli.ONION/D2DCC5A060FE6AA

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (883) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\savuxuijhbwr.exe
        C:\Windows\savuxuijhbwr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Windows\savuxuijhbwr.exe
          C:\Windows\savuxuijhbwr.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4464
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3892
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:4268
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4008
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6c5b46f8,0x7ffe6c5b4708,0x7ffe6c5b4718
              6⤵
                PID:752
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
                6⤵
                  PID:548
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3
                  6⤵
                    PID:2484
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:8
                    6⤵
                      PID:4012
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
                      6⤵
                        PID:4848
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                        6⤵
                          PID:1028
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:8
                          6⤵
                            PID:3348
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:8
                            6⤵
                              PID:4536
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2324 /prefetch:1
                              6⤵
                                PID:1464
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:1
                                6⤵
                                  PID:448
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                  6⤵
                                    PID:456
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2973796882603864988,10866967322652666252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:1
                                    6⤵
                                      PID:4992
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4444
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\SAVUXU~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4876
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\C24EC3~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2676
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1644
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3988

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\Recovery+wfpoa.html

                                Filesize

                                7KB

                                MD5

                                846222b71c0275db0fa9ad1146ebdcbc

                                SHA1

                                a500fcdbdfc7b4683c73689c3489174cfea45fab

                                SHA256

                                fc0f7422ab36e72e4726d41d3fb7c797f88b6805594b07a92661c00d63318560

                                SHA512

                                7e78b23b41ed9273a5afb449c72e0c70820fb3ba726a9133037947b9f911f7dfcca10f739a42fc68e9ca6e85afedc0f2d87945e77f676898c6cc06b7bfa41632

                              • C:\Program Files\7-Zip\Lang\Recovery+wfpoa.png

                                Filesize

                                63KB

                                MD5

                                5f5e96b1e30ee5f17eedc28565b0940e

                                SHA1

                                f347fe10e7f097d3b71ef9a49805130f84c2765f

                                SHA256

                                0ecf9e7bce6c673b94f4691301f1a3617b5beec286526d85ef4d0d85ffe6024d

                                SHA512

                                1692aec56489b588a691d4cb5002f08c95bb907373d1ab746ef0e40c300ebe8d1d592df004d4c60fd29a9810a0aa9cdf4426c6d968f09e03fc60450b891840fc

                              • C:\Program Files\7-Zip\Lang\Recovery+wfpoa.txt

                                Filesize

                                1KB

                                MD5

                                054407e7ca4bcf524af0671ea393e243

                                SHA1

                                66f036da07950299a5bf95e795fab63bbf9d85e7

                                SHA256

                                e1cd1b1fe9daabcb9935b90322f8bb98a2cba2fafeaae645c62925b3c3e7279f

                                SHA512

                                c6d6250a5e08fb4072207647810fb1dc3bd1032b1501f82d960fa680a342bd420022e3ef1738692e0f77fc65c983cc785f9a25cbb91bd7a42562b02cac785ab6

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                504e570f26ff2e4204b0944317d2be32

                                SHA1

                                d44fe512e72ae69b41bcf1dcbd7620b29e35122f

                                SHA256

                                9304bd0bf13142fbaf25932aa1f9433a24de8a64669b9dc6ed865a1dec935c5c

                                SHA512

                                2c00a5f465eaaad25d8739bf8ede1b2c4bade7f9bd6ae21d5a34bb08d710fb0217275e4cf970146c8352e5cc1c72944f256d304e23b560faa1bfd0290e64f009

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                872e6410130e1688a2da5dc948f62252

                                SHA1

                                9145924aa8c2f4e6402e39186c75a22832e44aa1

                                SHA256

                                d478f3de49285548c322c82d71acc04cc2bdc77569ec48dabf90fd968faf85d0

                                SHA512

                                b97ed0f191ffa1301672f1935895735dae2a1a95fa2616078b90475679866c275ae0a7e54fa5311dfd75beb59e28c36d331fe0ca480ba183a5ff6ec330a80c88

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                45cd623d19b06227883060819342d524

                                SHA1

                                249c0e723d38fbc4c84fdc4c2d78b63b2ae2de0e

                                SHA256

                                b13424ff3e56dbdaf99d8a340f28159e53336b797f48c1c451f944622ce35942

                                SHA512

                                645d5e08ec77e52b07006a3bdae3923f30da75c99d44daca2b657eb436a8898c6e649794fff6bf2b5df374042f8817fb467db2946a60896bb721a6d20ecc9db6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                443a627d539ca4eab732bad0cbe7332b

                                SHA1

                                86b18b906a1acd2a22f4b2c78ac3564c394a9569

                                SHA256

                                1e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9

                                SHA512

                                923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                99afa4934d1e3c56bbce114b356e8a99

                                SHA1

                                3f0e7a1a28d9d9c06b6663df5d83a65c84d52581

                                SHA256

                                08e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8

                                SHA512

                                76686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                5abde019007861f93acaea8b81e00086

                                SHA1

                                d66b7e66dd532f8b617a92b3edfa78b454a24d43

                                SHA256

                                5674cb5053072d6a127c498a0f59e62b64853c1ba3c4ef39459fd9985e7fb9ce

                                SHA512

                                07d65e25eda34e255e095fe415080ad040ca9bca95c1482c795dcd15ee8737d54d3ed5fa96782e7bcce3c637637e4d2ec94ec49ceb8a97daa165e0f3bbd5a738

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                05c36fa176eb87e9fc23cef22e496c73

                                SHA1

                                d2676fece97ae91ae75060ff4ee051e01675c31d

                                SHA256

                                a89b9419a8552a6a03906ec42bea0a23a57c7217438de9b7df5c0533986de0d5

                                SHA512

                                38389c9e978dd762096fdc817ce0e14e96aa974a15eb92bcd29746c6ddde7ab7e7f7c409d1eaf573ff0a508c6950ab0f4fd80e06fcbfd4130a3786c434511d45

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                9ae52d7d4bd727efef12a7f49dfdeaa8

                                SHA1

                                079fbd92c5411dce62613e81103e4e1164d49065

                                SHA256

                                1e1046fc32b825aa6611be362cce318d68a4c968c71544209b770a04a00c9ee9

                                SHA512

                                e9c152be9524e1272391cd1c95c029dfde42ce6ad9f33f496d568f762d6c941fed95437fca0e0897fa446e46d33dc2b20193fe1b982a654b63f3579874175990

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662898920525.txt

                                Filesize

                                77KB

                                MD5

                                ad53b00fc38476e5518651b9c6f9f6d6

                                SHA1

                                030c0ecef44af7d5e3e3f2075955dc3d0fd1ea08

                                SHA256

                                9a3b358264d1f899cdd6e5f55350a86aeadccefbc7609d28bcd79ef65bc63f82

                                SHA512

                                f094fe586b8543e1f6876709109f5816ea3fdfc71d447cdcbf61b0ec23e037bd061edbcf2a0c41432a96dead5a848d8f4bbce445e34714d7d72f91d15fae79f2

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727672984949051.txt

                                Filesize

                                74KB

                                MD5

                                00780b8bc1e06d0bf031070964210256

                                SHA1

                                8870672ca11ea8a2f5111d2842af71af30a4e712

                                SHA256

                                fc7ff1607906a2334e2cedc7e999cab43b538e7a4004924ba6c588ece2380c78

                                SHA512

                                86797c277a0d076c43483d85e9494c8f6f432028cd97d02e32072fdf14b2054b61ddcb6e62001d8a9e8787370a0144cafb05f7b01f63dcdbb29eadcaa073b241

                              • C:\Windows\savuxuijhbwr.exe

                                Filesize

                                376KB

                                MD5

                                c24ec3c4c8bad4bffe0a30c5da5fb33c

                                SHA1

                                6c27f9f02c94dc9ce3bf23970b9071f7b7a0d455

                                SHA256

                                6a7506d51f1a4c93555351464c571c856c01c020eba666f4182a201e3f5b7ba7

                                SHA512

                                bf4e4dbd10559d601fbc93d9099c15fba4d40812a1f539acd07b2b5a9feb843ed005892f313624039de4f4e04b3cead9ad759723037ab2a0f7814e7158416d6c

                              • memory/1272-12-0x0000000000400000-0x00000000005EB000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/3064-13-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3064-6-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3064-5-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3064-3-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3064-2-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-17-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-1990-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-3948-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-6656-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-1978-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-578-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-9446-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-10711-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-10712-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-10720-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-10721-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-25-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-23-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-20-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-18-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-10762-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4464-19-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/5032-0-0x00000000006E0000-0x00000000006E3000-memory.dmp

                                Filesize

                                12KB

                              • memory/5032-4-0x00000000006E0000-0x00000000006E3000-memory.dmp

                                Filesize

                                12KB

                              • memory/5032-1-0x00000000006E0000-0x00000000006E3000-memory.dmp

                                Filesize

                                12KB