Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

04/12/2024, 19:36

241204-ybjr4stjdn 10

04/12/2024, 19:28

241204-x6ma2ssqcl 10

Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2024, 19:28

General

  • Target

    c40b893661bbb99187869568375d63ef_JaffaCakes118.exe

  • Size

    424KB

  • MD5

    c40b893661bbb99187869568375d63ef

  • SHA1

    ca533304be2c72b5876d756634b2b3207793260d

  • SHA256

    7097913d473590c8fc507d8b8b6eaee8cd9db77888ebb14fc193eafeac039d7a

  • SHA512

    bea6153b2a3411a4d2de5da6616dfcbc9a233c1297e0d7b0a7c1c443aa03f04739c9e563027723e16cec8be14f89738167073e17c34b93a4c3baeef368c97333

  • SSDEEP

    6144:MsPAYJDo2magV+8GUEmGM41DwAHQmjdN1AUL0yogLpWPoXbftChXW3AxfulDGgB:Hp808fEmLqDwAJjpA+E+blCJxfS6

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_RECoVERY_+cqcto.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/9795B5E663D32 2. http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/9795B5E663D32 3. http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/9795B5E663D32 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/9795B5E663D32 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/9795B5E663D32 http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/9795B5E663D32 http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/9795B5E663D32 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/9795B5E663D32
URLs

http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/9795B5E663D32

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/9795B5E663D32

http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/9795B5E663D32

http://xlowfznrg4wf7dli.ONION/9795B5E663D32

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (876) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c40b893661bbb99187869568375d63ef_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c40b893661bbb99187869568375d63ef_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Windows\nfhubvchnxbh.exe
      C:\Windows\nfhubvchnxbh.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1664
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:716
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:2112
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf5f946f8,0x7ffdf5f94708,0x7ffdf5f94718
          4⤵
            PID:4320
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:2
            4⤵
              PID:4528
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
              4⤵
                PID:1288
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:8
                4⤵
                  PID:2292
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1
                  4⤵
                    PID:3752
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
                    4⤵
                      PID:4932
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                      4⤵
                        PID:4580
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:8
                        4⤵
                          PID:3404
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                          4⤵
                            PID:3276
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:1
                            4⤵
                              PID:3480
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                              4⤵
                                PID:1192
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9576813634708036368,4113984889988830166,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
                                4⤵
                                  PID:3300
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2368
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\NFHUBV~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4984
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\C40B89~1.EXE
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2656
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1108
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4172
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1496

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+cqcto.html

                                Filesize

                                11KB

                                MD5

                                bc90c2eb866e47347c737ec4cfa88614

                                SHA1

                                41ae2ef10da9c24e135e89d47e60dc321e1ae5e2

                                SHA256

                                82d5d15f016b07d8c0845208eee8b2d1c9b38cd674e6285ae279d59d9c3de462

                                SHA512

                                96f5d6b6a2d290e7439be53c75fcbf20985dd8b257f0d13d2745641e32d5a8de2f338c6bfe1ed88e34c417499990773886843b8a31af164a8e822f93183dacdc

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+cqcto.png

                                Filesize

                                63KB

                                MD5

                                1f232cc218887d72a269e089fde2b106

                                SHA1

                                67bde2b218feb71264e907f8324053303a2bee9f

                                SHA256

                                741412eb08abb880aa2ddc1a0c3a3554d59076002bd94a5f892867d11c7415c2

                                SHA512

                                ab8a55a1a64283a0b501cd5a3f983c96e997e86128ebbab1bbaca037abb9a66845b1579aa4e6b2e0b15942ebfd81bcd1e15b8ff5db211d7f021d6f6e814a1916

                              • C:\Program Files\7-Zip\Lang\_RECoVERY_+cqcto.txt

                                Filesize

                                1KB

                                MD5

                                8c4a8a16f303ea75c9212ecffecd1675

                                SHA1

                                58f20796b27f760fd15879f20fa9744955dcabc5

                                SHA256

                                32ca60d2f871166a23f766d104167e78e6565878e44ea1122f80cffd610c5d9e

                                SHA512

                                ff65d220b01c141497048063e3a7791d75e6ca40622ff7e1620d2c6f4555bf9e819d18ab0d269011f572a74fe7da1a8723fba68b4ce56f74c3a1d1028782f05e

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                23e3d750e666dc2ecb98971ba728bc3a

                                SHA1

                                bdd77dcfc1f8ae0ed2a67d6b81fc05842d13daa3

                                SHA256

                                e952bd44b6302136388f24f82613ba2d787fdbae85c57dd01f8c4cf180b1c009

                                SHA512

                                42c72a16ff89fc65710691ef86c2b1cae8ed2a3db475156a7626b5ba229af1d7c6e2ff17c18d918f903a52e498f4665066c7787ffdadf9c73b63eac22a2854b8

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                f60054895a8b9ad7b3dcee00ea82ed29

                                SHA1

                                ca4f82502dbe38ddfca5dfca1d291b5b876765ee

                                SHA256

                                8478cd61de902bdbe352c03933ccc9ca363b388262721a6a3e8bf2f4e26a94a9

                                SHA512

                                a5726a71700f167f79c0ac9c76e5740ab66dc3676bf835315673609231a63c91937c915a01be2542af0cb71dfe387dacc7721a455de95373559cd857b22f73ee

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                e5f4e6170a013210108396333758660a

                                SHA1

                                8729206dbdb76058590dc4721b10349aec4567b7

                                SHA256

                                3b25ed5b2d9ce66fbe87e83a28d3ad6a8c53026e502d34e49563a326db622e8d

                                SHA512

                                214aa5a10f9c60478ff5a7e161a4ff6378003d98753249cae0d2ed0697536174f2524f4406a451dac5eacce26faf9ddd2f120b726bcd11881e8f40c34841b8d3

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                34d2c4f40f47672ecdf6f66fea242f4a

                                SHA1

                                4bcad62542aeb44cae38a907d8b5a8604115ada2

                                SHA256

                                b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33

                                SHA512

                                50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                8749e21d9d0a17dac32d5aa2027f7a75

                                SHA1

                                a5d555f8b035c7938a4a864e89218c0402ab7cde

                                SHA256

                                915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304

                                SHA512

                                c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                1f77046432ffd8af9d147dc14235e1e6

                                SHA1

                                0f29572c8a2c1d6d58698a72e1f3b7d7a68532d3

                                SHA256

                                281d08e37b7ce69be38f3bcfbead7f11cf72890ff09cdac61ca11012d0566d6f

                                SHA512

                                bc4dbf12b9aade194cb7b0fa421d175839cb1d9b872eb3db3b84917f4debd65f101daedf8082912f704f6016b0f882d16038ceff4ffed0485f6de47f3a657a42

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                b0ab6ba37a66716926524fa528bfdac5

                                SHA1

                                1364fdad6cef954fc9e1c593c36462a3e89b7473

                                SHA256

                                f4beb9be0cf9c21f71521e5acd6c635043d3a5872597c4ffe9acc7bbf8db5907

                                SHA512

                                4fadf4f12a4269f4d11d6c2b9a56b1884d1355e3fc7bd01316f5f05ae0126a3401440d1fd6745777bc012fbdf3903435673c9f62a48faf8ee3f793a5c17cb412

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                2a80916ed99166aa183eb1939f2cdf2a

                                SHA1

                                36cc76f05afa96af862da1c65e768609e5eadc18

                                SHA256

                                62758327b7d7fc5c1caed443f3b2038c1fba65491eaa6fe4f200210c7b3c1090

                                SHA512

                                f3c86ad03c27740c21576e5f06fe3d3df8a2b9f2fde85ae47790d8fe92c39232d2504ac182cd7b5dbe0d2d728ec65f68055d62289f10cd6322011c9ab42ab132

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662360645001.txt

                                Filesize

                                77KB

                                MD5

                                41e1898e1bafd3aa780912ad0827a073

                                SHA1

                                4849dde1a0e57cae2c3f8735b6bf68f7417520d9

                                SHA256

                                f66f8f8360dfe7bf5b28b77cc5a706a6c78c27dfb1804d21e01c2c37987cf66e

                                SHA512

                                a89a5404da362843f76d276bedff52430fcb78e2a837ef4b3974bf7785701df3cecb8953dc3893f3fb5be84c62f6e90f2807d87a137ed13fb3bfd146efaa3c6a

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727663623337830.txt

                                Filesize

                                47KB

                                MD5

                                199770f52a8049213386c68cb904b28d

                                SHA1

                                ed7ccf0fa5bf19e5833510e2fcb2be759d0a801f

                                SHA256

                                4914dd26634934e5ce48df7841b16d7960d016189e33ef5e10506caa32a3b4af

                                SHA512

                                374354ffaee4e5777fd2705dbe31a5630fcfeb98535cfe62e6e44cac12ff344ef7b46ced884bf86d30f99a327b8bc369639feab9725f0c8afcbadaaa4a078bd0

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727671211214398.txt

                                Filesize

                                74KB

                                MD5

                                5e05c783daecdf2ab365aecfed1e6d72

                                SHA1

                                765b7d1ea4d3a9420eab68b59406eb5b7ed58e15

                                SHA256

                                ffb3e36038e54e8890acb4cce67753f3422554fb845588473f7afef2fb69f61b

                                SHA512

                                3ca3750ca88bd524eb5ab9a4efeedb6b82ed75b977250f927df4d1464063376abb32130544224ae280837568c24449f7032e67edefc0b097fa44a31b270a9db4

                              • C:\Windows\nfhubvchnxbh.exe

                                Filesize

                                424KB

                                MD5

                                c40b893661bbb99187869568375d63ef

                                SHA1

                                ca533304be2c72b5876d756634b2b3207793260d

                                SHA256

                                7097913d473590c8fc507d8b8b6eaee8cd9db77888ebb14fc193eafeac039d7a

                                SHA512

                                bea6153b2a3411a4d2de5da6616dfcbc9a233c1297e0d7b0a7c1c443aa03f04739c9e563027723e16cec8be14f89738167073e17c34b93a4c3baeef368c97333

                              • memory/1664-2481-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1664-10792-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1664-8217-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1664-4733-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/1664-14-0x0000000000970000-0x00000000009F5000-memory.dmp

                                Filesize

                                532KB

                              • memory/1664-10839-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/3172-0-0x00000000022C0000-0x0000000002345000-memory.dmp

                                Filesize

                                532KB

                              • memory/3172-9-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB

                              • memory/3172-10-0x00000000022C0000-0x0000000002345000-memory.dmp

                                Filesize

                                532KB

                              • memory/3172-1-0x0000000000400000-0x00000000004AD000-memory.dmp

                                Filesize

                                692KB