Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 13:24

General

  • Target

    f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe

  • Size

    500KB

  • MD5

    f434ffb5c0ee41107301cdd2870b8cb3

  • SHA1

    0f07886af55ecc7b12f6e16fbe2ab58d72f7293e

  • SHA256

    905c987270df31e328c785f35f4b106624137a71e3785d31af946dd525218211

  • SHA512

    3743ad61166066c9393880c54434f9e4dcaafdbd16df737d2e43c27c567e7b0ea20790ca8fe9dcbed775184863cc82e52217ebb9ba771dff4f5dfb43666dde12

  • SSDEEP

    6144:2+5uzIF/dV6GdE98vJwvw8AWLG1qSrX6T26WyJNh:V5uzKdzd7RazYtT6Xh

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\_ReCoVeRy_+koamm.txt

Family

teslacrypt

Ransom Note
NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA4096 More information about the encryption keys using RSA4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA4096 Key , both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. !!! Decrypting of your files is only possible with the help of the private key and decrypt program , which is on our Secret Server What do I do ? So , there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BITCOIN NOW! , and restore your data easy way If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1 - http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1441D4878A9831B 2 - http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/1441D4878A9831B 3 - http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/1441D4878A9831B If for some reasons the addresses are not available, follow these steps: 1 - Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2 - After a successful installation, run the browser 3 - Type in the address bar: xlowfznrg4wf7dli.onion/1441D4878A9831B 4 - Follow the instructions on the site IMPORTANT INFORMATION Your personal pages http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1441D4878A9831B http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/1441D4878A9831B http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/1441D4878A9831B Your personal page Tor-Browser xlowfznrg4wf7dli.ONION/1441D4878A9831B
URLs

http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/1441D4878A9831B

http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/1441D4878A9831B

http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/1441D4878A9831B

http://xlowfznrg4wf7dli.ONION/1441D4878A9831B

Signatures

  • TeslaCrypt, AlphaCrypt

    Ransomware based on CryptoLocker. Shut down by the developers in 2016.

  • Teslacrypt family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (873) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f434ffb5c0ee41107301cdd2870b8cb3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Windows\kipgogefvmur.exe
      C:\Windows\kipgogefvmur.exe
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1040
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4016
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_ReCoVeRy_.TXT
        3⤵
        • System Location Discovery: System Language Discovery
        • Opens file in notepad (likely ransom note)
        PID:4832
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\_ReCoVeRy_.HTM
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5056
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a78746f8,0x7ff8a7874708,0x7ff8a7874718
          4⤵
            PID:3856
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
            4⤵
              PID:3612
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
              4⤵
                PID:1368
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:8
                4⤵
                  PID:116
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                  4⤵
                    PID:4780
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                    4⤵
                      PID:1616
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:8
                      4⤵
                        PID:724
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:8
                        4⤵
                          PID:3028
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1
                          4⤵
                            PID:3964
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                            4⤵
                              PID:4404
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:1
                              4⤵
                                PID:3300
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,18352548401606357382,3275604732915118120,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
                                4⤵
                                  PID:3676
                              • C:\Windows\System32\wbem\WMIC.exe
                                "C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive
                                3⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2360
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c DEL C:\Windows\KIPGOG~1.EXE
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4812
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\F434FF~1.EXE
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2764
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3876
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3016
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4324

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+koamm.html

                                Filesize

                                11KB

                                MD5

                                fce167b2266bdf0188b69e3591caa0d1

                                SHA1

                                4102226e5b3d1573470fb95a3c134bbfb0df6db8

                                SHA256

                                7115ccbb769342bf59a1cc81575cbc78bf9412ef0799a206fafae8a988972855

                                SHA512

                                04e6d3fc04dfc05642d1f6f35c34cce9546687d1832872a64761fb5374ffd636be3001ab47eafef0ae6c768d8fb42159b988ab6acf0b173cb17fedb95e76d07a

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+koamm.png

                                Filesize

                                64KB

                                MD5

                                17868e03858a0b6a427f6be08a43fffb

                                SHA1

                                6da36adff22a7c8e2c77e9fa29875c127358fe57

                                SHA256

                                5a4018f3b9a92b204c2c1daa0ceb13e78cbc5f5328eec42dc642215a23c24583

                                SHA512

                                0e3476c93c07e87d7521c5c3d2db0d38d2f91e06d566759bcf60b6578e36405a32217755f7e343f4805b3726387b2c51adc409a23229790428df14bbd13bdea6

                              • C:\Program Files\7-Zip\Lang\_ReCoVeRy_+koamm.txt

                                Filesize

                                1KB

                                MD5

                                8495273ddef0aee8a3affe23db0b9b99

                                SHA1

                                32fee38ec642bc670942559be8f58395a5be7564

                                SHA256

                                702a11ea51d732375737a948261da1a2f0a42070563fa8999adf476f26b6128c

                                SHA512

                                f7b06e1d903430e1ff64dcc4dffd93ab59740c068f4ba1a87e716c2ef593d3c8f741b680db942b5a9e91a0156e017f41ff0ad0deeab955ae18f563f2d04ddab7

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME-JAVAFX.txt

                                Filesize

                                560B

                                MD5

                                317b4e7cb3229301d00587a0b8120ac0

                                SHA1

                                6630caab342331cd09af5b99dda20ff1e257ce27

                                SHA256

                                5c26b5e6f871dc8add04d6b8c31f8755127f0dc64f009cb9df67c99fb2dfa0f9

                                SHA512

                                0656eb3b5564c94090b5dd4fdbef5ed51e6284eab0b322969532c1522c920b622042a48e8e9fd452fc2ebf1e83745b18be5b5846f60cb1089946c9be5ca1c6e8

                              • C:\Program Files\Java\jre-1.8\THIRDPARTYLICENSEREADME.txt

                                Filesize

                                560B

                                MD5

                                0d3a2696072d34c1b6b0e4591b6b5b0a

                                SHA1

                                2dbae9297bd6daa7e81bb1b3108fb485934eda36

                                SHA256

                                0f0e52e2f305198bdefc5a0350333c36e3ef296bc1989e0fe88625dff2feb394

                                SHA512

                                63e5724dcde26e9f1ce0da908d61d66c5daa11f237759ea488f632b31a8631d545e373275619985c38e65d2421958f4f9450b3c329cb36d1d111b046f41150eb

                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

                                Filesize

                                416B

                                MD5

                                16061d369db3ee0e3029916a1834ad6a

                                SHA1

                                8b1afb3ae0ed276211c885dc2946a39623f219da

                                SHA256

                                1d3fd77836f73d8c6956a9e5f3b668ce20e446d21f8c2429c02453d353981aac

                                SHA512

                                657fdba80434924c1b9c6104b4f67120d961755b26718f0edc6cb392bc52860c98c2b21719855c816e1f4f1da8d13a008322b1daf7ee3156d1d0b18891c43234

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                d22073dea53e79d9b824f27ac5e9813e

                                SHA1

                                6d8a7281241248431a1571e6ddc55798b01fa961

                                SHA256

                                86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                SHA512

                                97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                bffcefacce25cd03f3d5c9446ddb903d

                                SHA1

                                8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                SHA256

                                23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                SHA512

                                761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                32bbcf91bedb8ed9035cc04c200fa7f4

                                SHA1

                                082672073d075a2961c08cea633bf7717820b4cc

                                SHA256

                                f2f8c200134ee9ea00600b270fb20c5eb835d31a47b0b81745914f7ffdabf51e

                                SHA512

                                612d079d687eb46020a440418d0017fde35b51156ea5e0a608edb7b98157cabe23a919aa7ebb994ae194193aaeaaac81f1a8b294b2eb8f5c856af572fbbafea1

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                3361a217f8d0bfd8fbf8b4c8c7f52a67

                                SHA1

                                e592b6f0294603babff3917a54feb0854e0d1a0c

                                SHA256

                                f1542fdb2b11538b71b00e90b78443843735aa165653b3848a39d181a8a174a4

                                SHA512

                                d0bb7a7b0a1fc1c5a6b18b71e40a4dd0ff552f8b689e4bddbb9472c8899d08e97b341d14b5e6ef1fbdbed5083f4f9c34c27c14b7d4aa6388356093386e0e9929

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                10KB

                                MD5

                                a048205686e9516f4bcca7992b7b37d5

                                SHA1

                                4cf79983f2d0973d22d3d6f5727a881c534c64f3

                                SHA256

                                0cfe1ff6908055a43659253f91209b3bca27c69ceb2a3adf34f468136dd31b2f

                                SHA512

                                58eca39e0fb7ab8cda3d3fbd8690883b253666f1d74c1ae0a4b5a901445e389e1bb8486bb7da89419f8f7599429719afae33a7f408af37b446c9a8ed4c03f0e5

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727662192103813.txt

                                Filesize

                                77KB

                                MD5

                                df789449c994d64d97fd1f678b8d18a4

                                SHA1

                                9eec54ec4100a9458e7d5d5ad63622475d17c83b

                                SHA256

                                8e9a1975cadd0a14ece6e93f5ce1c21b6688310d54f97f90ff1b05097f4af72f

                                SHA512

                                c1edb8dfd722681cb6ee95240eaf39fc7889ae2b1df0b76876760bac840e2cb2e567537095c5e0102c86eb7e3e9eb363ff68f38ab1dd04ea6e842bbeec328cf3

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727663401899668.txt

                                Filesize

                                47KB

                                MD5

                                af1a1f59922a1cb6e3f2a5c33fd851a8

                                SHA1

                                00284acf87bb1f8e57c121fce2cca10eca04d1b5

                                SHA256

                                4124d29cb13c33b79004ee049bec90f1ac8a3f8102333c3e896691ab643030c9

                                SHA512

                                9dbd4c72edd10f3ff5a248670409844bf051f388959e4aed489958538b9a0dfe78547404958e1c658dd5fa568b4fd7edb17059a69c98cd94b93c29abb6856c28

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133727670771168387.txt

                                Filesize

                                74KB

                                MD5

                                d775c35691575bdf7a933fd0276b94a5

                                SHA1

                                86bd6cba32d7bf115710371e0e66dc1d217f4af4

                                SHA256

                                23a549364f2b3d29551a1f07a1be6cb90d8f1f939750f8889055da82a8fd426d

                                SHA512

                                0097def9d7dafd2e5f03139f398747a9771b00990d0e36dd0d16df1296df1f425fc1249f544248a3db0059a94e067ccc18f1dbab6a38c6f09d29ff3bdf182602

                              • C:\Windows\kipgogefvmur.exe

                                Filesize

                                500KB

                                MD5

                                f434ffb5c0ee41107301cdd2870b8cb3

                                SHA1

                                0f07886af55ecc7b12f6e16fbe2ab58d72f7293e

                                SHA256

                                905c987270df31e328c785f35f4b106624137a71e3785d31af946dd525218211

                                SHA512

                                3743ad61166066c9393880c54434f9e4dcaafdbd16df737d2e43c27c567e7b0ea20790ca8fe9dcbed775184863cc82e52217ebb9ba771dff4f5dfb43666dde12

                              • memory/1040-4797-0x0000000000400000-0x00000000004CF000-memory.dmp

                                Filesize

                                828KB

                              • memory/1040-8249-0x0000000000400000-0x00000000004CF000-memory.dmp

                                Filesize

                                828KB

                              • memory/1040-10520-0x0000000000400000-0x00000000004CF000-memory.dmp

                                Filesize

                                828KB

                              • memory/1040-10534-0x0000000000400000-0x00000000004CF000-memory.dmp

                                Filesize

                                828KB

                              • memory/1040-2388-0x0000000000400000-0x00000000004CF000-memory.dmp

                                Filesize

                                828KB

                              • memory/1040-2389-0x00000000021D0000-0x0000000002256000-memory.dmp

                                Filesize

                                536KB

                              • memory/1040-11-0x00000000021D0000-0x0000000002256000-memory.dmp

                                Filesize

                                536KB

                              • memory/1040-10555-0x0000000000400000-0x00000000004CF000-memory.dmp

                                Filesize

                                828KB

                              • memory/3144-0-0x0000000002190000-0x0000000002216000-memory.dmp

                                Filesize

                                536KB

                              • memory/3144-9-0x0000000000400000-0x00000000004CF000-memory.dmp

                                Filesize

                                828KB

                              • memory/3144-10-0x0000000002190000-0x0000000002216000-memory.dmp

                                Filesize

                                536KB

                              • memory/3144-2-0x0000000000400000-0x00000000004CF000-memory.dmp

                                Filesize

                                828KB