Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 13:40

General

  • Target

    d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe

  • Size

    332KB

  • MD5

    d751fee2c28a335e3de105d54f478ea6

  • SHA1

    a6a25e2603e735251910adb9f8c032bd7d5a1c9d

  • SHA256

    3e877dcafd60525ff6d5ec5dd76a01415afdd321fad8d4f1102b22c71493f603

  • SHA512

    a4f897ca7a11974e8d08126ebd98a5a12675de0934f2247e5f320467314ed4a4243804d8d79f4ec54c806b2cf9a537fb241fdc1f755a4546fdb5f948edb78dd3

  • SSDEEP

    6144:MM5BqZrr4/U+aJzkJBnd2pmsj/Bg+PHFTuydm8Vcu7cThSkwpA52w6twte9krk5R:MkolWUtJzkJBnd2pmsbSEHd7dvu51Cw3

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_RECOVERY_+oyyvb.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/9BB8A5F0DA96514D 2. http://tes543berda73i48fsdfsd.keratadze.at/9BB8A5F0DA96514D 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9BB8A5F0DA96514D If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/9BB8A5F0DA96514D 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/9BB8A5F0DA96514D http://tes543berda73i48fsdfsd.keratadze.at/9BB8A5F0DA96514D http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9BB8A5F0DA96514D *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/9BB8A5F0DA96514D
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/9BB8A5F0DA96514D

http://tes543berda73i48fsdfsd.keratadze.at/9BB8A5F0DA96514D

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/9BB8A5F0DA96514D

http://xlowfznrg4wf7dli.ONION/9BB8A5F0DA96514D

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (882) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d751fee2c28a335e3de105d54f478ea6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\yhheorslshpb.exe
      C:\Windows\yhheorslshpb.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3936
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:4476
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1480
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4a4b46f8,0x7ffc4a4b4708,0x7ffc4a4b4718
          4⤵
            PID:3160
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
            4⤵
              PID:1580
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
              4⤵
                PID:2568
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8
                4⤵
                  PID:3604
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1
                  4⤵
                    PID:4356
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
                    4⤵
                      PID:4852
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:8
                      4⤵
                        PID:4452
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:8
                        4⤵
                          PID:3220
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:1
                          4⤵
                            PID:2064
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:1
                            4⤵
                              PID:4696
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                              4⤵
                                PID:1004
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7006452782199590425,2843817883714009687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:1
                                4⤵
                                  PID:5116
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4780
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\YHHEOR~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3064
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\D751FE~1.EXE
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:4452
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2512
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4120
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2912

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_RECOVERY_+oyyvb.html

                                Filesize

                                11KB

                                MD5

                                4900927eec690cc56226d7e86f985a45

                                SHA1

                                36557f9124669d21d58711ebdc8dfd795c575818

                                SHA256

                                47a2479ca056e28e54b75e8baaa80f1fac43597c1d5c1b8312dbcf410766c691

                                SHA512

                                5ca9ef86f04a250f4cda94bff37160475838eb9beed45e74281c251e581823effa969bd0592b5215cceb1e7699e9a0b2a538a9448c3f30b5d7f9e5ff2b400a91

                              • C:\Program Files\7-Zip\Lang\_RECOVERY_+oyyvb.png

                                Filesize

                                62KB

                                MD5

                                457fc39a3726e1c725e3e09431133d8d

                                SHA1

                                acde61f67f32bb154c599d8b668c37f302449c07

                                SHA256

                                41eb1669a4b0ddbfb09a3f624cb5dca876b8175426381f9b049b2c59431e956b

                                SHA512

                                ac4649e208ecb7c7db7640b3e0fc560f408f2a000a72d51c4862719ed642e3f562f78d5c63a441e4a93c06ad03b30ba5cad47d0bc4940755667952e786d54550

                              • C:\Program Files\7-Zip\Lang\_RECOVERY_+oyyvb.txt

                                Filesize

                                1KB

                                MD5

                                b44accb351c5cad27fee1b7ad92721a7

                                SHA1

                                046ca1852e92b9af75487c6ff0f6af6a70ee6022

                                SHA256

                                6c9ee6b8409d1524e7a806c981f85a3733f82791761ca0c8f5413a011b0aeef6

                                SHA512

                                f6989ae4663ed818a7fbe4e0a6af267b46049bc50ad5c11533abd5704a4244bc1c1519b8a704789a88ffedb7e0b4960b33cb130e1451187f2cb3f25f418bfa55

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                fe39b26e66ea419f3f901481e0525aa8

                                SHA1

                                4e74b404c321637f61cf51f0417b2686350b8d8d

                                SHA256

                                fe172b847d29e146e4ca4120d850fe1db5196936dd9a6f5a89d44b82fd58e297

                                SHA512

                                5b1292c445f9c3f576eb53968eb0da815f736acf7cd4814254d32205fef6a8d93b1dfe14cabe1956b119a23cc71b78fa9a53575ca2684e367e3f30351a42427e

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                2f9a360c8500dd9039904966e0155db4

                                SHA1

                                683b44ba56ff67a3fa27f5b114826d62d6e03196

                                SHA256

                                2ecdaaad74456e1feb026b7e0f3f6380d64fe7a8dda52d623be55e3fbc965daa

                                SHA512

                                4f4a96220e43497a5e1efa414acfc2bc437b9a0fdfeeba1f90d1ca533299fd9fadbdab427ecb6928014303ed46bf14ded136efa4f60306dc7eaf9d647773bfe3

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                9f5e1fad33372806364fa1355e3de0de

                                SHA1

                                0bdd3f973e25055d1190f35997bad9768083a587

                                SHA256

                                4a2db0b01a72eaa692181a7c412f8176779163b0a6e1a6f014eb61c2af6ef394

                                SHA512

                                8cee7c737e39c47a50fbd0e888b824759e9f6b0ae091c003a491185802eaba64cc57c0fb435d8cc04abf9f9aec93471d3723b49fb0590d27cc4644623e7e8a1d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                d22073dea53e79d9b824f27ac5e9813e

                                SHA1

                                6d8a7281241248431a1571e6ddc55798b01fa961

                                SHA256

                                86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                SHA512

                                97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                bffcefacce25cd03f3d5c9446ddb903d

                                SHA1

                                8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                SHA256

                                23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                SHA512

                                761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                c8e971ec8ea46ccdc5c4d05055d07298

                                SHA1

                                db53ce04fc10752f93320bd655119c3f3ade1fb5

                                SHA256

                                f3b355d96d1f04d7d1a6d8170b51ea20b7b86d808b42c74511978441dbf3c4a4

                                SHA512

                                ca6c8ef9de4cf9d0c5515095e745bc97a34e6381aab9ea36e1ec2353c318c3c237ce3e8a899e378507e53f0079ad4f74103508324f84134346bb4c8644b34a8e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                a702893615d5c25dc13dd5d4c7f88bfd

                                SHA1

                                ee10cff5616b7cd251b79f3d9bc634084b1e3af7

                                SHA256

                                ab0365bb89beb6a7bbbe4220dbee6cefb907a3011ebe6373be7a97940abaf018

                                SHA512

                                b938654fbe48dd89018231ff1563b79d753f0403c02c73729cc1f74f62e3b311f5c085882718f398a3c7b93923563086e2a6810a5e7ad2e79f210d1864db0851

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                4a243aecf418686508c1738c5a7f0e73

                                SHA1

                                a2d4eb1124adce308605b04831f7394ce63cfc45

                                SHA256

                                7e98d83a7b06f7d3d6ecf15eefcd709cdaddb33115d62a234a16d26e0cd09354

                                SHA512

                                acef779349b635627f2431d3cc4e47d18c5c6d259ed61ead3f7fa816b58d607fce59e1cf01cb9ac12fad3b8d560281dd8d1d576adb9717309bb04eb11d6dcd82

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662192103813.txt

                                Filesize

                                77KB

                                MD5

                                d66cfcfaaac305bb951b78b0e152de09

                                SHA1

                                a89de96d07ffdbfa26179ade21749565b2f62324

                                SHA256

                                c05f1c3f70e00da76c6958d541bc625473ef20ab5e12c86d1fde4d0b8668b810

                                SHA512

                                fc0919ef2b1e918b85d689e66f224a3a661b3567ff774b7a30937f490f8c8d8e633f388b5e2efe0c899566c7ebf0f9d8bdb3ade3d51c9244f0fc821a54885ded

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727663401899668.txt

                                Filesize

                                47KB

                                MD5

                                8a3864b118193f844b51b5d5c2da9b1f

                                SHA1

                                d5726397a220eba78071f25116ad91c5830b4531

                                SHA256

                                c8b4b45bd1b26747c726954bc475b81db7bb97a8591dd888f56636ba1282646d

                                SHA512

                                7621daa7d633a9bfce7b99273ab5ecab665a3aef515cf1c53761ca24a6f53bdf13b90a6baeb6ab7eda9407bd96932c1bf5aa304816b494d12c5f98e95d8675c6

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727670771168387.txt

                                Filesize

                                74KB

                                MD5

                                d9255907b9c272b6cc48d4e34b11d65f

                                SHA1

                                0928402991103d31e54ebda91a192f9a87e24eea

                                SHA256

                                02486555430b1c14bb6c24447f3626937b3a4b92b2fc5fd307d5dec2ed565255

                                SHA512

                                027df4ba2b8f0333b30a3162474cac298a0b809e13c4025a58da4005019d9cd6594abe657fb2d7895203836d8a46b30751d39bd43369aa1cc3dd0d0eb3e09d32

                              • C:\Windows\yhheorslshpb.exe

                                Filesize

                                332KB

                                MD5

                                d751fee2c28a335e3de105d54f478ea6

                                SHA1

                                a6a25e2603e735251910adb9f8c032bd7d5a1c9d

                                SHA256

                                3e877dcafd60525ff6d5ec5dd76a01415afdd321fad8d4f1102b22c71493f603

                                SHA512

                                a4f897ca7a11974e8d08126ebd98a5a12675de0934f2247e5f320467314ed4a4243804d8d79f4ec54c806b2cf9a537fb241fdc1f755a4546fdb5f948edb78dd3

                              • memory/3272-0-0x0000000002300000-0x0000000002385000-memory.dmp

                                Filesize

                                532KB

                              • memory/3272-14-0x0000000002300000-0x0000000002385000-memory.dmp

                                Filesize

                                532KB

                              • memory/3272-1-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/3272-13-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/3936-4963-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/3936-8446-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/3936-10763-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/3936-10770-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/3936-2518-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/3936-2519-0x0000000000AD0000-0x0000000000B55000-memory.dmp

                                Filesize

                                532KB

                              • memory/3936-10810-0x0000000000400000-0x0000000000497000-memory.dmp

                                Filesize

                                604KB

                              • memory/3936-9-0x0000000000AD0000-0x0000000000B55000-memory.dmp

                                Filesize

                                532KB