Resubmissions

04-12-2024 11:27

241204-nkqxnstpgz 10

04-12-2024 11:23

241204-nhcl9stpbv 10

Analysis

  • max time kernel
    2154s
  • max time network
    2049s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-12-2024 11:27

General

  • Target

    c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe

  • Size

    376KB

  • MD5

    c24ec3c4c8bad4bffe0a30c5da5fb33c

  • SHA1

    6c27f9f02c94dc9ce3bf23970b9071f7b7a0d455

  • SHA256

    6a7506d51f1a4c93555351464c571c856c01c020eba666f4182a201e3f5b7ba7

  • SHA512

    bf4e4dbd10559d601fbc93d9099c15fba4d40812a1f539acd07b2b5a9feb843ed005892f313624039de4f4e04b3cead9ad759723037ab2a0f7814e7158416d6c

  • SSDEEP

    6144:Te3rNhMeYq4CGRTs4kadSoKVStcmTVn57CpSCwsUbg62oXd:TY5hMfqwTsTKcmTV5kINEx+d

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+sjjeq.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EB55246760F38F 2. http://kkd47eh4hdjshb5t.angortra.at/EB55246760F38F 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/EB55246760F38F If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/EB55246760F38F 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EB55246760F38F http://kkd47eh4hdjshb5t.angortra.at/EB55246760F38F http://ytrest84y5i456hghadefdsd.pontogrot.com/EB55246760F38F *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/EB55246760F38F
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/EB55246760F38F

http://kkd47eh4hdjshb5t.angortra.at/EB55246760F38F

http://ytrest84y5i456hghadefdsd.pontogrot.com/EB55246760F38F

http://xlowfznrg4wf7dli.ONION/EB55246760F38F

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (794) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c24ec3c4c8bad4bffe0a30c5da5fb33c_JaffaCakes118.exe"
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Windows\qlwegnomeroa.exe
        C:\Windows\qlwegnomeroa.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3804
        • C:\Windows\qlwegnomeroa.exe
          C:\Windows\qlwegnomeroa.exe
          4⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:4000
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1932
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:1240
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1256
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaf8fb3cb8,0x7ffaf8fb3cc8,0x7ffaf8fb3cd8
              6⤵
                PID:1912
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:2
                6⤵
                  PID:2572
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 /prefetch:3
                  6⤵
                    PID:2128
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:8
                    6⤵
                      PID:3780
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:1
                      6⤵
                        PID:1408
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
                        6⤵
                          PID:4976
                        • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:8
                          6⤵
                            PID:4684
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:8
                            6⤵
                              PID:2252
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                              6⤵
                                PID:1524
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:1
                                6⤵
                                  PID:2076
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                                  6⤵
                                    PID:3040
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:1
                                    6⤵
                                      PID:4024
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,15867698255392786106,2655881697735183120,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5172 /prefetch:2
                                      6⤵
                                        PID:3588
                                    • C:\Windows\System32\wbem\WMIC.exe
                                      "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                                      5⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2072
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\QLWEGN~1.EXE
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3652
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\C24EC3~1.EXE
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3928
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1996
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4688

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Program Files\7-Zip\Lang\Recovery+sjjeq.html

                                  Filesize

                                  7KB

                                  MD5

                                  15b850a06bb437f55ab958726cfdf70a

                                  SHA1

                                  f1e0f098fce7ede045ef2c461d91e5ffd67ddedb

                                  SHA256

                                  ffd6163a09df510c9969b88cd3b44f20bc6c4e61f69ded63e62d8b423a41d19d

                                  SHA512

                                  3d64692a0ef30feb4a58f91ff2852a150e3bee9fbcdadfac0c1bc2fba48561caec58461ccd45085baa256c7e9fdf51305d7932351eb71afdb495597ebbcf3c70

                                • C:\Program Files\7-Zip\Lang\Recovery+sjjeq.png

                                  Filesize

                                  62KB

                                  MD5

                                  d6ba98733e63448626b052176ba4c84b

                                  SHA1

                                  2471dfe88c4469943a4ef01f8453e3c069b81f64

                                  SHA256

                                  f28e4985028e63d5c914c17f3ba168f66dbb1e2023af6285003e09eb2065be94

                                  SHA512

                                  69e91df7a71fc9efa5e5e3370b45d94837c001095da4de59c99c5eeadbdf79d4873d6782d3c09684dacc0bffb4f72dab7794a72f5d361bd1be0ed2520d0b2ebd

                                • C:\Program Files\7-Zip\Lang\Recovery+sjjeq.txt

                                  Filesize

                                  1KB

                                  MD5

                                  1190ab98c92c7cf5d740ef7f76941e90

                                  SHA1

                                  e7ef1bc68700b61f7914f514a48accb3d5e6aad0

                                  SHA256

                                  c9a9fa3538ae99fafdf7d6e4d517a184e943d75c485d1afdd443537b5d2a029d

                                  SHA512

                                  4342140e64a864d82d75a29920a18c5a562c98ddf5b66a19f80fbe1f953795111f7119a3c7958d49b4d9dd7d737dc8f39536e28c465cbcd4aabbd6cddc7ea636

                                • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                  Filesize

                                  560B

                                  MD5

                                  7c40bb7c944159e1c2505b9c9db6f9a1

                                  SHA1

                                  ab8e99ebc24d5e032f41db914a66a588fe9bea41

                                  SHA256

                                  32c83440593e5699f46aa3161430846148b9fb7910257f80fdcc54f7e35e47c0

                                  SHA512

                                  33ed7096a32cafb88a08f482d66bc685ca4f40086b668edeb065b4799e9fa6b58cf0ad5c0b2a5c2991aa531788929498572447768ecac9ec12506a4f1b3088eb

                                • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                  Filesize

                                  560B

                                  MD5

                                  20c450eae2344cf34f65b441c4918b6e

                                  SHA1

                                  a7af604b634de6c8bb9fe5a3d493f6f58c591ed9

                                  SHA256

                                  1b98cb02bd95d4e5dea3d143d1182374ecfccaa87c1e3685b9bf2f37ee5e41c2

                                  SHA512

                                  bf09dec9b9005b54596119d9a7cf7c37b89895a8b288bd0e12dd4a02546a3fc17aeeaf402ade976a4aef1206dc3edce6c0d34ae3c64c9fd202d13217ac395dfb

                                • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                  Filesize

                                  416B

                                  MD5

                                  1e587ffbe56d904cdcc70c57c9c37417

                                  SHA1

                                  d2500bdec414a1747cb63cc88eb2e954d4baf192

                                  SHA256

                                  0676321aed6f0e1c8d88d0001b6cb44b1158af7513563c6a5e8844537fee145e

                                  SHA512

                                  72efa18c1bd82b940643ddbb1b01911d23f74e61c6df62d6117f5f9bf07c5e8a558a32651567eaea00efdff96e69df3f9763bf24fa91d4569218650efcccd652

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  f1d2c7fd2ca29bb77a5da2d1847fbb92

                                  SHA1

                                  840de2cf36c22ba10ac96f90890b6a12a56526c6

                                  SHA256

                                  58d0f80310f4a84f687c5ce0adaa982eb42fe4480510399fa2ae975d40bb8bc5

                                  SHA512

                                  ede1fafea2404f16948fe0b5ea5161ccee3ee6e40c55ff98c337eac981a6776b9c73dc030a5c59e4347aec91259f497539206e71949c33adcecbf2c846709e14

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  4c1a24fa898d2a98b540b20272c8e47b

                                  SHA1

                                  3218bff9ce95b52842fa1b8bd00be073177141ef

                                  SHA256

                                  bbcc378fcbf64580e7a48b4e7ca9be57fa0a1f2e747f488325685bdb18d73a95

                                  SHA512

                                  e61f196e7f1c9a5fe249abe9b11eea770fb2f4babc61f60b12c71f43e6fe9354cf14869daf46abc2c2655bce180252acd43c10562a2dcd31fa7d90d33253820e

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\32661fdb-5218-446a-930d-cca2c61c2fbb.tmp

                                  Filesize

                                  5KB

                                  MD5

                                  6e3c8a6b13c6e0e5af65d57d3f423e93

                                  SHA1

                                  39bf6b6bb26c1ccd21f420d02b7b0ffabec1dda3

                                  SHA256

                                  93da7c1e6a805f64d56713650b609febf842019976b7b60f59d9d4c8eda66ab2

                                  SHA512

                                  958e763a43e254e70a5b8d8c20849a8f324fdbbf226436cedeec4d1ac75ff29bf0a19b377c67bffbbcd40dc2f1d3533b61f434f40f8b949bf290db2c3f04aece

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  c987ae2f88c7d65dd2e033ab0acfd50e

                                  SHA1

                                  97f3ea7d27574da6b8e1b9e937681546c3386a97

                                  SHA256

                                  3ada20f5899fa1aa78fc9296996ca493f8d19de7095d687a23135ddebb44b796

                                  SHA512

                                  001a34e47acd0fcbd4712ee3921316a3ce29e42a10d0c047c4720333a0122bc59b19efbfc3c062982e191bf44e87a029c70aa591d991839e001f4ec7e34a70ce

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  523a4d3b42bade5034a362a38fdbf649

                                  SHA1

                                  45c8e2be53c23b77b078cfd17825c5c0becb6fa7

                                  SHA256

                                  e2d4870e335e0325ec940d22eed1e52a714f37f9e9a5faa14b72981858605965

                                  SHA512

                                  4045c6698ab8ab79cab7d6697de5f775791a0534b8e03c2d7eea648c21c26fac9545ab83148323241d779b121468cf3dbc7004ef1e5568cf552fc4186ae68518

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  10KB

                                  MD5

                                  11b9fb1e3376866e3ab2f187d268d6b7

                                  SHA1

                                  bd2eb4fcb84400cd725bee1be44d409375c2a84e

                                  SHA256

                                  bb8a98b7e6932e435918d00a4a82c18220dfe28e137107113fac1c7a8062a0e8

                                  SHA512

                                  d3e25651a45d94926d3a930059784284d727c333e10623bd89499470f2b6938ff78d10ef5b95038a2641a82f9f296c6576f6f6f4ddd8ecf07417bd587618081a

                                • C:\Windows\qlwegnomeroa.exe

                                  Filesize

                                  376KB

                                  MD5

                                  c24ec3c4c8bad4bffe0a30c5da5fb33c

                                  SHA1

                                  6c27f9f02c94dc9ce3bf23970b9071f7b7a0d455

                                  SHA256

                                  6a7506d51f1a4c93555351464c571c856c01c020eba666f4182a201e3f5b7ba7

                                  SHA512

                                  bf4e4dbd10559d601fbc93d9099c15fba4d40812a1f539acd07b2b5a9feb843ed005892f313624039de4f4e04b3cead9ad759723037ab2a0f7814e7158416d6c

                                • memory/3000-3-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/3000-13-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/3000-6-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/3000-2-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/3000-4-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/3148-5-0x0000000000CB0000-0x0000000000CB3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/3148-0-0x0000000000CB0000-0x0000000000CB3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/3148-1-0x0000000000CB0000-0x0000000000CB3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/3804-12-0x0000000000400000-0x00000000005EB000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4000-17-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-5587-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-8354-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-10272-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-10274-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-10282-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-10283-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-3807-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-1645-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-1640-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-507-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-24-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-23-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-10344-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-20-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-18-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB

                                • memory/4000-19-0x0000000000400000-0x0000000000485000-memory.dmp

                                  Filesize

                                  532KB