Analysis

  • max time kernel
    148s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2024 11:15

General

  • Target

    d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe

  • Size

    388KB

  • MD5

    d957a4ca07273763ed76ba4eedce60b2

  • SHA1

    357b159b7404225fb9271bc5c6645a79d8706153

  • SHA256

    ba45f2c559c3c2e0f76441928d967c31ad6b10ee3c65ada1bbd74ee8a0052dcb

  • SHA512

    0b1cef4d07a43d504b2ca95c6fbfe18f7e89235db6d6a6551f9be73ab800e2126e47fe23233b77575d34a1b91b0af576f8cb14205fdb2fd2516986b4d5057ce7

  • SSDEEP

    6144:XYMk7V7PQkaYO0iNq/PimTBQNEETJYOo0DldfrvwmjcMVW5OouUI5KtrQ8POyU:XnSdO0iNEPn+TGOoYzwscMSOXUIJ

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+mvcmq.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6773CF8A4C1F9AEB 2. http://kkd47eh4hdjshb5t.angortra.at/6773CF8A4C1F9AEB 3. http://ytrest84y5i456hghadefdsd.pontogrot.com/6773CF8A4C1F9AEB If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/6773CF8A4C1F9AEB 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6773CF8A4C1F9AEB http://kkd47eh4hdjshb5t.angortra.at/6773CF8A4C1F9AEB http://ytrest84y5i456hghadefdsd.pontogrot.com/6773CF8A4C1F9AEB *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/6773CF8A4C1F9AEB
URLs

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/6773CF8A4C1F9AEB

http://kkd47eh4hdjshb5t.angortra.at/6773CF8A4C1F9AEB

http://ytrest84y5i456hghadefdsd.pontogrot.com/6773CF8A4C1F9AEB

http://xlowfznrg4wf7dli.ONION/6773CF8A4C1F9AEB

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (884) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3580
    • C:\Users\Admin\AppData\Local\Temp\d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d957a4ca07273763ed76ba4eedce60b2_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Windows\unjsubluwdsi.exe
        C:\Windows\unjsubluwdsi.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Windows\unjsubluwdsi.exe
          C:\Windows\unjsubluwdsi.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3452
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1116
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:1528
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4796
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf36246f8,0x7ffbf3624708,0x7ffbf3624718
              6⤵
                PID:936
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
                6⤵
                  PID:224
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
                  6⤵
                    PID:3416
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
                    6⤵
                      PID:4640
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
                      6⤵
                        PID:4532
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                        6⤵
                          PID:3460
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
                          6⤵
                            PID:3124
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:8
                            6⤵
                              PID:1860
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                              6⤵
                                PID:3352
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                                6⤵
                                  PID:4120
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:1
                                  6⤵
                                    PID:1796
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,12374014654135953149,7099912818622389210,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                                    6⤵
                                      PID:3508
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /noin teractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1220
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\UNJSUB~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1340
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\D957A4~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1772
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3996
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3548

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\Recovery+mvcmq.html

                                Filesize

                                9KB

                                MD5

                                d869f66484edd882d4e5f713ce3b52a8

                                SHA1

                                371b80071b7a50d313137ae5ad5a43074a2e26e6

                                SHA256

                                fa8ad29503488aaeb6b4a3336ef1b22e857ed8b833b1b192a745b50fb781547b

                                SHA512

                                ecac9b7a34198640b3cb8d8ae2eb7053b7d20de9a886a2bd56221881efbd4882de09810738533baaf74337b1d74dfb0fbfa1f6af6692bd8db49d9c2b525bd00d

                              • C:\Program Files\7-Zip\Lang\Recovery+mvcmq.png

                                Filesize

                                63KB

                                MD5

                                8802a783130e4f423ed57aeaf3162a16

                                SHA1

                                059285ae13d689cfaab06f56c8e3e13f5f2f53af

                                SHA256

                                ef98d58b58599e1f7ac286293a5098cb83c86d191878dbf8815b971f63ec05c5

                                SHA512

                                7ba1ba54f58e80716fc262da41137a523f7b4a906630d48db95007e57a9e434446b82ddbcd8ae72df8566a680ddd23ddc5bb7f965c14d35ff7bd29d33a71220f

                              • C:\Program Files\7-Zip\Lang\Recovery+mvcmq.txt

                                Filesize

                                1KB

                                MD5

                                cda2dc2ba3cbebaa9da7ce5e896b0156

                                SHA1

                                49a15bc4b99d149b1219bf19966e9f933625a7c0

                                SHA256

                                87f4acea9d6274bb78f8599fe4a4462449cce0782dc1ec05f693e17df4e79536

                                SHA512

                                7245a153672712d4afe30696d449107cc26e942b8d5437e1362851b9b48ed9bc412ecfe45c78a5750bc2440a1c51102aa51d006b987959b947cc377c10fe679b

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                718aa25f8fe496ea58fcf2517e00f3c3

                                SHA1

                                5a678037ee756a34fc28962dedf9d12b85688b3b

                                SHA256

                                4021f44112d2ce0cd68de39df7888deeaa10ae59a59e74d9e659f7ed8d45d840

                                SHA512

                                2d2c6b6eac1e50815ccb0b93af3aca378fc4797d43b72b9ecb21e588ed8cdc708a492d9d379288e2603ddfc4f336c3082400f68ec8b9443017877b15192e088b

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                291cc9d2aa962afb793cc8b0391283a8

                                SHA1

                                067634057f57645e17a16877c7a5dc44e0ab0816

                                SHA256

                                c95e0b6d1a4f0ab9a8152397b0ba30a11526f22f43924bf2b4a575b873214ec8

                                SHA512

                                2b9664206d82544feca9a0bd5c206874269d478c38ff4c850af9aeda54bf5e65611cbc5338bb6b3ae64e6491b46e63e633661c60c4ac82ea85b7440930112c73

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                49d78a5de0dc8d0e0c541e71a7365631

                                SHA1

                                eb87b610800e2e448123964b71259ab99054c169

                                SHA256

                                0d379ceaba5bee1fc91ea07d8d66776a4d2ade86fb75b337b0ba46f62382264e

                                SHA512

                                264f21303908450d7f7119690b083ed4fa384c1bff0a349e3cd67d2072d8b7767083b3026ece635f69a55a5db41526bee65ee6ad09e3e021fef2450925486f4f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                a0486d6f8406d852dd805b66ff467692

                                SHA1

                                77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                SHA256

                                c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                SHA512

                                065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                dc058ebc0f8181946a312f0be99ed79c

                                SHA1

                                0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                SHA256

                                378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                SHA512

                                36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                79c859177c458f70aac2879e05392c5a

                                SHA1

                                5114710c866b9d55f35d3f42b4ea79cf4d926ff9

                                SHA256

                                e2a64d177cd4fa60e64f6c3895893ee10c228bbf9666330920b852a13cf48174

                                SHA512

                                eca79767a7f3a79fe46b208ff9c1813709a48c901edec4ff9346fdf22fad0f490f6d8e0cdcdc663f7d876b4eeb533450cebc1c0e40fd452cb5a1673d62e726ac

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                b5e115a874394e74bd4e7e44573e30fc

                                SHA1

                                4281521671a234c243c424c4e91ca090ca99e6a8

                                SHA256

                                9bb42d2f6395fb461de6891931178597beca823db54cdd0dd335034c197c8fc1

                                SHA512

                                ec7ef2ee2f3229b07f62e0c59dfa7b67147da58fa989ee07709fce647138fe7c7b13dfe35d8cedfea9f24a1fb5763ea1d5eee93755b9bda7479014f103b54f11

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                88b8e3bb5f63ad496a8ebeeef5da3ea2

                                SHA1

                                1d1efc29c31e5a8d55c1d619db6ea01bec9237f0

                                SHA256

                                b65c7544360ded2c3a70b6943975eb71b32571f8c7babdd7f972b5aee82bc02c

                                SHA512

                                775ed10e2f56996ff664b552aa7230c49a3630d2c7af1b991424133f03532eaa4f2372c6e6b9daed721a83df5e238e3f17099d9f675814d5a1620314095be65a

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662824772148.txt

                                Filesize

                                77KB

                                MD5

                                4a5ec578ccab68488eaeb226b352674c

                                SHA1

                                b7c4a1613691fee9eb53dc14d65f9b53c88e5686

                                SHA256

                                181fb49bb38790c5217c17058435709af35756a46f09d491fb7f307913ce4b1f

                                SHA512

                                6722d7a0532c2f3f06d02b29cf46e348d0e75965591cbb5cef2b6e7fde2f394b99624d38b408cde0211fe195bdbcd5521cdbdcf00a5344e334e2064ce1d3f2a4

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727671764608349.txt

                                Filesize

                                74KB

                                MD5

                                c986e22ff42b8d98daa79b1a62eb5bb1

                                SHA1

                                f30991518757935c53e8f4f59c559eedda43f041

                                SHA256

                                9c2ad285cbe8e1d49942cd3fc850157f57b05ef1d0e7de22cda5b1f601398144

                                SHA512

                                e2f5581541dfa483e01809ab063091b490e4199b575a32ea03f6b8d289404f4d2786e24d1eeeff59b06228728d9b5dd6af840de0e862fc7b19ec51e8f492e403

                              • C:\Windows\unjsubluwdsi.exe

                                Filesize

                                388KB

                                MD5

                                d957a4ca07273763ed76ba4eedce60b2

                                SHA1

                                357b159b7404225fb9271bc5c6645a79d8706153

                                SHA256

                                ba45f2c559c3c2e0f76441928d967c31ad6b10ee3c65ada1bbd74ee8a0052dcb

                                SHA512

                                0b1cef4d07a43d504b2ca95c6fbfe18f7e89235db6d6a6551f9be73ab800e2126e47fe23233b77575d34a1b91b0af576f8cb14205fdb2fd2516986b4d5057ce7

                              • memory/1884-13-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/1884-4-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/1884-6-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/1884-3-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/1884-2-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/2524-12-0x0000000000400000-0x000000000085C000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3452-17-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-3124-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-3123-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-6221-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-1580-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-24-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-9840-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-10559-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-10560-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-10568-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-10570-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-22-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-20-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-19-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-18-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3452-10610-0x0000000000400000-0x0000000000486000-memory.dmp

                                Filesize

                                536KB

                              • memory/3580-0-0x0000000002510000-0x0000000002513000-memory.dmp

                                Filesize

                                12KB

                              • memory/3580-5-0x0000000002510000-0x0000000002513000-memory.dmp

                                Filesize

                                12KB

                              • memory/3580-1-0x0000000002510000-0x0000000002513000-memory.dmp

                                Filesize

                                12KB