Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 02:57

General

  • Target

    cab485f42e842dc2bacea0a6d7688e6c_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    cab485f42e842dc2bacea0a6d7688e6c

  • SHA1

    13f6796312fc00141756c9c054b300cbe395ae2e

  • SHA256

    474b715681f72984fd5f2a2698e193084a2d2cf71c66931f0cc21d145e66f8c5

  • SHA512

    c23a8f65f1ce62d010bde605f30ff74154ba6e0da20a6ee70faa79e180d0e307a24b1d8300d4b53393bef0ef2484c65b62da1c5304f07daa174c1c25f3da3726

  • SSDEEP

    6144:TUjcXma4WgQ/hWCKiFpaub1VUTJrvTCMXa+r3A6tpE32M+uPrPVJqW/Q4x3IpRFb:TUwX7CQcxub1wJBM6tLRuPrtJpB3Ia

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+insqw.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8DF4CBC5FB5ABBAD 2. http://tes543berda73i48fsdfsd.keratadze.at/8DF4CBC5FB5ABBAD 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8DF4CBC5FB5ABBAD If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/8DF4CBC5FB5ABBAD 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8DF4CBC5FB5ABBAD http://tes543berda73i48fsdfsd.keratadze.at/8DF4CBC5FB5ABBAD http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8DF4CBC5FB5ABBAD *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/8DF4CBC5FB5ABBAD
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/8DF4CBC5FB5ABBAD

http://tes543berda73i48fsdfsd.keratadze.at/8DF4CBC5FB5ABBAD

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/8DF4CBC5FB5ABBAD

http://xlowfznrg4wf7dli.ONION/8DF4CBC5FB5ABBAD

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (874) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cab485f42e842dc2bacea0a6d7688e6c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cab485f42e842dc2bacea0a6d7688e6c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Users\Admin\AppData\Local\Temp\cab485f42e842dc2bacea0a6d7688e6c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\cab485f42e842dc2bacea0a6d7688e6c_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3296
      • C:\Windows\enufglmgrbxj.exe
        C:\Windows\enufglmgrbxj.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3412
        • C:\Windows\enufglmgrbxj.exe
          C:\Windows\enufglmgrbxj.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2484
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3428
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:1524
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2504
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa21046f8,0x7ffaa2104708,0x7ffaa2104718
              6⤵
                PID:4616
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:2
                6⤵
                  PID:764
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:3
                  6⤵
                    PID:4936
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2496 /prefetch:8
                    6⤵
                      PID:3872
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2844 /prefetch:1
                      6⤵
                        PID:2516
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:1
                        6⤵
                          PID:5108
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:8
                          6⤵
                            PID:536
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:8
                            6⤵
                              PID:224
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:1
                              6⤵
                                PID:976
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                                6⤵
                                  PID:936
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:1
                                  6⤵
                                    PID:2540
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2320,14008288610018955271,10001406337284261282,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:1
                                    6⤵
                                      PID:2332
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1916
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\ENUFGL~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3816
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\CAB485~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2684
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1920
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3940
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4536

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\Recovery+insqw.html

                                Filesize

                                11KB

                                MD5

                                2fd9d863a149290f682aa0be8b0709ca

                                SHA1

                                b91c17ed0065f1fd5350e99439fb9016297f6048

                                SHA256

                                5bea46e56533a6359212245b15d0c5afcc5b94bca253ff7666ed2d92e11bdda1

                                SHA512

                                fed327fc20e20fb2405777946fdd33d524e615bbbdaf699e73055efcc2a32456da7535f75d9b0ebf1491303f0e4401889067b4233c91eb042f05ab21fe623154

                              • C:\Program Files\7-Zip\Lang\Recovery+insqw.png

                                Filesize

                                62KB

                                MD5

                                4034c5c302bf2b91f430c29c7038f5df

                                SHA1

                                93aa460555cdb32dcbbdaf7eb10c3786b3ac0732

                                SHA256

                                a8c59f3e29f0b00878e5c63141c9f4f5121e46b2b13b3a548e4ff880a79230d2

                                SHA512

                                ab3817096fa12ea50683c9ed443ade61c10cf44f8a77898612f82d249f409f6cba92fe901458c09a81c6f8d0fc6569df37d5b48177a0d6a3c6357a658f5b7935

                              • C:\Program Files\7-Zip\Lang\Recovery+insqw.txt

                                Filesize

                                1KB

                                MD5

                                ed464d2fd1f6985a3e3ff89241924c58

                                SHA1

                                e58fc3a2ada9f84e7e6cf850715ee00e875e091a

                                SHA256

                                efe8bbd5acfe2297e88739dae3c72f735f237a8738f5c6f1a7c95415bbc8a7f9

                                SHA512

                                bbc4853e985a85b6595b5862c28ebb6c544c38173d23b5d8f5aeaa1deb125fc086f53117af90f7152ab9b29a46223861ab4eec89605ba068d4dc5ee438247d36

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                1c2f80bea928bd3c8c5f56bfb30b5d3a

                                SHA1

                                197453aee475cbfb832635b42e4563627fe5b311

                                SHA256

                                8df27b1af4b0277612ca6a47d9bd0fbccd3ea8ae3221aeb922862909a659db24

                                SHA512

                                008eaec76983026ba185cdbe764d73e48f2dc3300a6e943aec0dfe16fd6ccc8f04a6f446955b3c49703469dace7e79c9563fed87b3fdfae65c4e413299a6b129

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                a13d13d4ae3524ada0003be43fced452

                                SHA1

                                6ca0068d55ac192f75b4d9b3e74c5985c7cd5821

                                SHA256

                                19ff88924d8fc4ee359024277bb86554325761d66c93d00c089c74c20e88657c

                                SHA512

                                a21d64c21850c07b0850865b9797814b747e7a8a59a4ffe07bc5a9193ed0ac7c434735391ad150189770a5303db404266d7b5a656ec8abb781daec7165a54de5

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                dbded4374ac79c062b6454ffc3db3322

                                SHA1

                                be5634bf7750bdc0a8a41e693ad13ffdee995181

                                SHA256

                                69c3990f6a4744fdaa754994bc3384d7a5da009f6de98bbda15ae4975c5c6836

                                SHA512

                                6efd096dfdba7ae0b85f062f38f76e9301a519b3fe09ff6141fbc9a84259cb66b1bc68f1c78aacad7eca3a6b7cd2ed21a6217db4e54c0c110844ac216f18a300

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                ba6ef346187b40694d493da98d5da979

                                SHA1

                                643c15bec043f8673943885199bb06cd1652ee37

                                SHA256

                                d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73

                                SHA512

                                2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                b8880802fc2bb880a7a869faa01315b0

                                SHA1

                                51d1a3fa2c272f094515675d82150bfce08ee8d3

                                SHA256

                                467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812

                                SHA512

                                e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                2ba6aec7c28885e802da927c42a5514f

                                SHA1

                                351182d2a9fcab8d6ca9981d19fe0fecb9559e2a

                                SHA256

                                8bfc26df7d1091d2bb7333e983926d4b182c1d6741bd27f467b309bf27e53d1d

                                SHA512

                                1c12a39f62c41f54fa5c98dc081b81470c6973f0bd81848532e22ff5bc60f56d0530b6ef10284ea37e0d1a3f0ab10deb3c46564073aff93f76d4add0693d67f6

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                714ddc4e875a10280a874b927eb84ade

                                SHA1

                                e57359388ac53b8a51ca9a9c62484a962e77a946

                                SHA256

                                8cba2848708bc90f659ecb04a7177ad44416e0f0b27996dc5f511806f90128fe

                                SHA512

                                5738058ef1dc5606872b392124147548f3a65a6ce5e99d46465e3de444760f19ed4d86d423ec47e18a832ccf3a7989a41488bf7ac3c0685785648fb74e87870e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                339b80051c749ab215d668d59928483f

                                SHA1

                                d276f658b807b8f3b9c969030d80718981ba2fa8

                                SHA256

                                9d6dda010ac9f6004c88f3015d2ffeaecb6a8c0ec7119c3443851a6a231e27d7

                                SHA512

                                e3417d57d5a88b7ce18a7c151f0c5eda8a5ccfcbee3d4b3ac71ef11bfb721d86f5fc312d6db47fed2ae5e2b4438123b1ec64e21e62c2676ff76a3f517ad38583

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727665766873969.txt

                                Filesize

                                74KB

                                MD5

                                df8af0a4cbd6020a056cbe14c2fa71ea

                                SHA1

                                0744c642764a80f763ea615aaad75859224c9de5

                                SHA256

                                d3ebd7ea02e8a1742c520eef5aa6c82a4fb51767fb6db506a94fbb1dd27b5917

                                SHA512

                                b0d9d25a4d8cfdbd0580e87ce18bb8e287fd35b5b1c4f5134a1b2569ec21c3675ca2b41c52b16c7f594b7ed6cc5f79b36066881bf4906db2035bc0dea013e657

                              • C:\Windows\enufglmgrbxj.exe

                                Filesize

                                340KB

                                MD5

                                cab485f42e842dc2bacea0a6d7688e6c

                                SHA1

                                13f6796312fc00141756c9c054b300cbe395ae2e

                                SHA256

                                474b715681f72984fd5f2a2698e193084a2d2cf71c66931f0cc21d145e66f8c5

                                SHA512

                                c23a8f65f1ce62d010bde605f30ff74154ba6e0da20a6ee70faa79e180d0e307a24b1d8300d4b53393bef0ef2484c65b62da1c5304f07daa174c1c25f3da3726

                              • memory/2484-19-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-10739-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-24-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-21-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-769-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-18-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-20-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-10691-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-2770-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-2771-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-5571-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-25-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-9205-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-10681-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-10682-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/2484-10690-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3296-5-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3296-15-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3296-4-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3296-2-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3296-3-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3412-12-0x0000000000400000-0x0000000000564000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/4268-6-0x0000000000830000-0x0000000000833000-memory.dmp

                                Filesize

                                12KB

                              • memory/4268-0-0x0000000000830000-0x0000000000833000-memory.dmp

                                Filesize

                                12KB

                              • memory/4268-1-0x0000000000830000-0x0000000000833000-memory.dmp

                                Filesize

                                12KB