Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 01:52

General

  • Target

    e42b2d9d303b72ec6689ae2b96f16236_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    e42b2d9d303b72ec6689ae2b96f16236

  • SHA1

    cb8bf99248ade830b4a5dcc23a813c91bc698c6e

  • SHA256

    335db66a2abb1f82bd92f5b6cd74722b9d5cf209beac6dcb2eefde17603d6a99

  • SHA512

    200dfb19eb35841773837dfa94345c35f6108ed23f952d34b930c20d89b65119ce18725aa33b9e306169794c5782c7cb763826188e6b379fbcfe0a0d552ba762

  • SSDEEP

    6144:aog0kgLyJrIA0UTTng6+bq34dxSM7Zg8EU07L7m9JYie:XfLyLnDIwonZg8EPy9JYT

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\Recovery+amuby.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with AES More information about the encryption keys using AES can be found here: http://en.wikipedia.org/wiki/AES How did this happen ? !!! Specially for your PC was generated personal AES KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/E32EA0FDAF2172F3 2. http://tes543berda73i48fsdfsd.keratadze.at/E32EA0FDAF2172F3 3. http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E32EA0FDAF2172F3 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser 3. Type in the address bar: xlowfznrg4wf7dli.onion/E32EA0FDAF2172F3 4. Follow the instructions on the site. ---------------- IMPORTANT INFORMATION------------------------ *-*-* Your personal pages: http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/E32EA0FDAF2172F3 http://tes543berda73i48fsdfsd.keratadze.at/E32EA0FDAF2172F3 http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E32EA0FDAF2172F3 *-*-* Your personal page Tor-Browser: xlowfznrg4wf7dli.ONION/E32EA0FDAF2172F3
URLs

http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/E32EA0FDAF2172F3

http://tes543berda73i48fsdfsd.keratadze.at/E32EA0FDAF2172F3

http://tt54rfdjhb34rfbnknaerg.milerteddy.com/E32EA0FDAF2172F3

http://xlowfznrg4wf7dli.ONION/E32EA0FDAF2172F3

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (874) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e42b2d9d303b72ec6689ae2b96f16236_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e42b2d9d303b72ec6689ae2b96f16236_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4840
    • C:\Users\Admin\AppData\Local\Temp\e42b2d9d303b72ec6689ae2b96f16236_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e42b2d9d303b72ec6689ae2b96f16236_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3452
      • C:\Windows\gbxjqijhxvtk.exe
        C:\Windows\gbxjqijhxvtk.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:700
        • C:\Windows\gbxjqijhxvtk.exe
          C:\Windows\gbxjqijhxvtk.exe
          4⤵
          • Checks computer location settings
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1108
          • C:\Windows\System32\wbem\WMIC.exe
            "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3240
          • C:\Windows\SysWOW64\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT
            5⤵
            • System Location Discovery: System Language Discovery
            • Opens file in notepad (likely ransom note)
            PID:2772
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:316
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa21046f8,0x7ffaa2104708,0x7ffaa2104718
              6⤵
                PID:4892
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                6⤵
                  PID:2312
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
                  6⤵
                    PID:2340
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:8
                    6⤵
                      PID:4808
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:1
                      6⤵
                        PID:2012
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                        6⤵
                          PID:1952
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:8
                          6⤵
                            PID:1928
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:8
                            6⤵
                              PID:2308
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:1
                              6⤵
                                PID:916
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                                6⤵
                                  PID:368
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:1
                                  6⤵
                                    PID:4932
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11885335657707191152,3466890457315551163,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
                                    6⤵
                                      PID:1392
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                    5⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3216
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\GBXJQI~1.EXE
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4724
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\E42B2D~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4024
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3040
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4548
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4628

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\Recovery+amuby.html

                                Filesize

                                11KB

                                MD5

                                6c7df434646c3b2a30fc67bdbd7ab5f8

                                SHA1

                                1e2812ce730752208a45380984cb64ab41127205

                                SHA256

                                7e56703075fe8af32e05967cd6f01e1a662613cc43476767142db244288d6c01

                                SHA512

                                4c699fc2d6f38599239bf3dbced3f50d4053c814cb44a3bb20979f1f225934523c93f9cca4b202b6922e872b82463d9a6befba8048f695112f1028c3342fb90e

                              • C:\Program Files\7-Zip\Lang\Recovery+amuby.png

                                Filesize

                                62KB

                                MD5

                                03f9674e4dbab9097e8f7370428bdb5f

                                SHA1

                                6dd8186400efd6f4aa8f21927b6b23d9daa6fd04

                                SHA256

                                d32901959c90ff18dca15904831163e386cd6c85aa50eb965586db7a3ecdaa1e

                                SHA512

                                25be10913c011a6948d1f17c6f9813f36f96a5f1380b74a638af9190244bcbe2de5b0c414fae8e3a7a4e69096436bc99e7775ff030907eed9f55b06826bde7e0

                              • C:\Program Files\7-Zip\Lang\Recovery+amuby.txt

                                Filesize

                                1KB

                                MD5

                                eff63c7610b8ee89e3974ed73a58d046

                                SHA1

                                e8998d626514f62e439f6c2c005686b35994c0a5

                                SHA256

                                560660a9f87f4c583b21d6909e0b1eac917115088b5e8bbe339fbc40ff7e82e4

                                SHA512

                                128a88a83f7ef52bc5058e266902f12ecaee41048a5ae1359945e9249ded15a3ed174108a31334095f0e29dff3b9e81644e4e846a4fcd2e77dc376d11e58b81a

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                e7769334f35b69eb2f7a8c912d44c74f

                                SHA1

                                efbda9b54122bbb70f931966979c14843be8444b

                                SHA256

                                071ca0b84d78ce03f6cdf5cb33d8c4f239a1d0759a1679b5d944c22e7e414c0c

                                SHA512

                                ba465a07df5e96097deef321a048f8f99b09f5f50afe948d3b02bc1964b9f5c64d0c9ac472a51c8faa046cf687e8a4b818a0b8687481b5f087d7fa7a1b509366

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                30ffb4ec51f4078edcc9996844056d04

                                SHA1

                                4638a8185ccd5d5f54b106713e71fc20ef507faa

                                SHA256

                                6057debcf34810735ddeacce0af176d619c70e913cbb87b9f8d4067ec54e256b

                                SHA512

                                b8fab8b2cc95d8b9d2b28deca8dce8087dd0768727a96d041588feb42bacc76a9c0ffc97620d7cf1974632cce923004de542cf749a8bb6c68da7c6e37bd3fee0

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                82352f7e811b7354f6f68a991fe1a7a8

                                SHA1

                                a7f0340ea6838348216c900a0d843ae8a08a986e

                                SHA256

                                397b433bf68eada8eaa71ee77294d96a9db885e4f48c4800b04e5f09962f3a92

                                SHA512

                                79c8f4249a85d8312dc46189f453de7197616c8b62809d6013625318f5cf00376da102c7196fe2be0d3d933dcb8d1972c5836291626efef68304583059d69761

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                ba6ef346187b40694d493da98d5da979

                                SHA1

                                643c15bec043f8673943885199bb06cd1652ee37

                                SHA256

                                d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73

                                SHA512

                                2e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                b8880802fc2bb880a7a869faa01315b0

                                SHA1

                                51d1a3fa2c272f094515675d82150bfce08ee8d3

                                SHA256

                                467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812

                                SHA512

                                e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                7059d519040344b379d5e80fe1993205

                                SHA1

                                f5be65b69a258c6d4af9d1381c12d2d5a92ab9f6

                                SHA256

                                c00394eae8f9b4dd2dc20dd9263457df29e24090200a877df55c62733464266a

                                SHA512

                                b66970dd826d7c628f475bd9acde18b01ff1d7d56de33226c5e4c62f07095637c992f7c7981422184f8886eb17f08ab1e178c5a8726d4491763c3016fa890228

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                ef2939aeea52b5fdab678f9790130989

                                SHA1

                                35be58449c379f89bf7fa40f77fc01eaa305f1ac

                                SHA256

                                6094ee91390ee65dad027c7bde1d1f562f34bc1fd4dc47dc0f3e8d8889d8e594

                                SHA512

                                80957c8845cc5724b75d224c14151264edf02f01b11a76e6999136544557e236cf1d8c15875d7c2ac2a2b14772b3543aa12820359b9c2bc60427716c7a51aaf4

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                8f77c0afb2d1e2adfe2f39c7d12d2810

                                SHA1

                                d26e5c714af5b45880e6545c166c9f48f1c3666c

                                SHA256

                                de2a5e5df84284201af6c88246140e7738fa501966ab137570ca6d789af993b6

                                SHA512

                                59ef0b71a2feaf03316cb5ecfe32f914a37d262d38f3723e7c732b4205e0190608a2219fad914990ada342669588d9f14433f7fbe19e507dc7d506e301e909e5

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727665766873969.txt

                                Filesize

                                74KB

                                MD5

                                a9b06184371418d62456318616ee3305

                                SHA1

                                64fae3156578dc2816bbba59c3ffc55dc92ca42d

                                SHA256

                                8b0c4410abbe5076015fec8985f9df4faa8aa8bdc400bb9417d6c00efe5110a8

                                SHA512

                                a133de254fd2363fdb156e0efc130fd923a24679ac1dfee548ab03a8ac3b0a9c4f557944309c80029630f706cb851e14a27e550de3faadcae9df43dd122891a5

                              • C:\Windows\gbxjqijhxvtk.exe

                                Filesize

                                340KB

                                MD5

                                e42b2d9d303b72ec6689ae2b96f16236

                                SHA1

                                cb8bf99248ade830b4a5dcc23a813c91bc698c6e

                                SHA256

                                335db66a2abb1f82bd92f5b6cd74722b9d5cf209beac6dcb2eefde17603d6a99

                                SHA512

                                200dfb19eb35841773837dfa94345c35f6108ed23f952d34b930c20d89b65119ce18725aa33b9e306169794c5782c7cb763826188e6b379fbcfe0a0d552ba762

                              • memory/700-12-0x0000000000400000-0x0000000000501000-memory.dmp

                                Filesize

                                1.0MB

                              • memory/1108-18-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-8369-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-23-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-20-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-19-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-17-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-1296-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-2671-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-2684-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-5063-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-10738-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-24-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-10686-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-10688-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-10696-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/1108-10698-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3452-13-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3452-6-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3452-5-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3452-3-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/3452-2-0x0000000000400000-0x0000000000485000-memory.dmp

                                Filesize

                                532KB

                              • memory/4840-0-0x0000000000680000-0x0000000000683000-memory.dmp

                                Filesize

                                12KB

                              • memory/4840-4-0x0000000000680000-0x0000000000683000-memory.dmp

                                Filesize

                                12KB

                              • memory/4840-1-0x0000000000680000-0x0000000000683000-memory.dmp

                                Filesize

                                12KB