Analysis
-
max time kernel
730s -
max time network
698s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 09:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tathli.com
Resource
win10v2004-20240508-en
General
-
Target
http://tathli.com
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file 2 IoCs
Processes:
WannaCry.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD7A02.tmp WannaCry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD7A19.tmp WannaCry.exe -
Executes dropped EXE 25 IoCs
Processes:
WannaCry.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exepid process 4604 WannaCry.exe 4688 !WannaDecryptor!.exe 1668 !WannaDecryptor!.exe 5116 !WannaDecryptor!.exe 984 !WannaDecryptor!.exe 4340 !WannaDecryptor!.exe 4760 !WannaDecryptor!.exe 1224 !WannaDecryptor!.exe 4688 !WannaDecryptor!.exe 2504 !WannaDecryptor!.exe 464 !WannaDecryptor!.exe 1524 !WannaDecryptor!.exe 5112 !WannaDecryptor!.exe 1208 !WannaDecryptor!.exe 2484 !WannaDecryptor!.exe 3892 !WannaDecryptor!.exe 4948 !WannaDecryptor!.exe 4796 !WannaDecryptor!.exe 3580 !WannaDecryptor!.exe 700 !WannaDecryptor!.exe 1176 !WannaDecryptor!.exe 812 !WannaDecryptor!.exe 2580 !WannaDecryptor!.exe 5064 !WannaDecryptor!.exe 3316 !WannaDecryptor!.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
WannaCry.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\Downloads\\WannaCry.exe\" /r" WannaCry.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
!WannaDecryptor!.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\!WannaCryptor!.bmp" !WannaDecryptor!.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exeWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Kills process with taskkill 7 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3740 taskkill.exe 2284 taskkill.exe 3736 taskkill.exe 780 taskkill.exe 4440 taskkill.exe 4568 taskkill.exe 1652 taskkill.exe -
Modifies registry class 3 IoCs
Processes:
msedge.exeOpenWith.exetaskmgr.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2539840389-1261165778-1087677076-1000\{8FE203C6-2FC6-4E01-8FFC-512A0E97FCA3} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings taskmgr.exe -
NTFS ADS 1 IoCs
Processes:
msedge.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 525456.crdownload:SmartScreen msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3556 NOTEPAD.EXE -
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 4584 regedit.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3820 WINWORD.EXE 3820 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exetaskmgr.exepid process 2412 msedge.exe 2412 msedge.exe 5012 msedge.exe 5012 msedge.exe 3540 identity_helper.exe 3540 identity_helper.exe 4592 msedge.exe 4592 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 940 msedge.exe 888 msedge.exe 888 msedge.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
OpenWith.exe!WannaDecryptor!.exeregedit.exepid process 2520 OpenWith.exe 984 !WannaDecryptor!.exe 4584 regedit.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
Processes:
msedge.exepid process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exeWMIC.exevssvc.exesvchost.exeSystemSettingsAdminFlows.exeSystemSettingsAdminFlows.exetaskkill.exetaskkill.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 2284 taskkill.exe Token: SeDebugPrivilege 3740 taskkill.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeDebugPrivilege 1652 taskkill.exe Token: SeIncreaseQuotaPrivilege 3756 WMIC.exe Token: SeSecurityPrivilege 3756 WMIC.exe Token: SeTakeOwnershipPrivilege 3756 WMIC.exe Token: SeLoadDriverPrivilege 3756 WMIC.exe Token: SeSystemProfilePrivilege 3756 WMIC.exe Token: SeSystemtimePrivilege 3756 WMIC.exe Token: SeProfSingleProcessPrivilege 3756 WMIC.exe Token: SeIncBasePriorityPrivilege 3756 WMIC.exe Token: SeCreatePagefilePrivilege 3756 WMIC.exe Token: SeBackupPrivilege 3756 WMIC.exe Token: SeRestorePrivilege 3756 WMIC.exe Token: SeShutdownPrivilege 3756 WMIC.exe Token: SeDebugPrivilege 3756 WMIC.exe Token: SeSystemEnvironmentPrivilege 3756 WMIC.exe Token: SeRemoteShutdownPrivilege 3756 WMIC.exe Token: SeUndockPrivilege 3756 WMIC.exe Token: SeManageVolumePrivilege 3756 WMIC.exe Token: 33 3756 WMIC.exe Token: 34 3756 WMIC.exe Token: 35 3756 WMIC.exe Token: 36 3756 WMIC.exe Token: SeIncreaseQuotaPrivilege 3756 WMIC.exe Token: SeSecurityPrivilege 3756 WMIC.exe Token: SeTakeOwnershipPrivilege 3756 WMIC.exe Token: SeLoadDriverPrivilege 3756 WMIC.exe Token: SeSystemProfilePrivilege 3756 WMIC.exe Token: SeSystemtimePrivilege 3756 WMIC.exe Token: SeProfSingleProcessPrivilege 3756 WMIC.exe Token: SeIncBasePriorityPrivilege 3756 WMIC.exe Token: SeCreatePagefilePrivilege 3756 WMIC.exe Token: SeBackupPrivilege 3756 WMIC.exe Token: SeRestorePrivilege 3756 WMIC.exe Token: SeShutdownPrivilege 3756 WMIC.exe Token: SeDebugPrivilege 3756 WMIC.exe Token: SeSystemEnvironmentPrivilege 3756 WMIC.exe Token: SeRemoteShutdownPrivilege 3756 WMIC.exe Token: SeUndockPrivilege 3756 WMIC.exe Token: SeManageVolumePrivilege 3756 WMIC.exe Token: 33 3756 WMIC.exe Token: 34 3756 WMIC.exe Token: 35 3756 WMIC.exe Token: 36 3756 WMIC.exe Token: SeBackupPrivilege 768 vssvc.exe Token: SeRestorePrivilege 768 vssvc.exe Token: SeAuditPrivilege 768 vssvc.exe Token: SeManageVolumePrivilege 3888 svchost.exe Token: SeSystemtimePrivilege 3464 SystemSettingsAdminFlows.exe Token: SeSystemtimePrivilege 3464 SystemSettingsAdminFlows.exe Token: SeSystemtimePrivilege 4512 SystemSettingsAdminFlows.exe Token: SeSystemtimePrivilege 4512 SystemSettingsAdminFlows.exe Token: SeDebugPrivilege 3736 taskkill.exe Token: SeDebugPrivilege 780 taskkill.exe Token: SeDebugPrivilege 2284 taskmgr.exe Token: SeSystemProfilePrivilege 2284 taskmgr.exe Token: SeCreateGlobalPrivilege 2284 taskmgr.exe Token: SeSecurityPrivilege 2284 taskmgr.exe Token: SeTakeOwnershipPrivilege 2284 taskmgr.exe Token: 33 2284 taskmgr.exe Token: SeIncBasePriorityPrivilege 2284 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
msedge.exe!WannaDecryptor!.exetaskmgr.exepid process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 984 !WannaDecryptor!.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
msedge.exetaskmgr.exepid process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe 2284 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exeOpenWith.exeWINWORD.EXESystemSettingsAdminFlows.exeSystemSettingsAdminFlows.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exe!WannaDecryptor!.exepid process 4688 !WannaDecryptor!.exe 4688 !WannaDecryptor!.exe 1668 !WannaDecryptor!.exe 1668 !WannaDecryptor!.exe 5116 !WannaDecryptor!.exe 5116 !WannaDecryptor!.exe 984 !WannaDecryptor!.exe 984 !WannaDecryptor!.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 2520 OpenWith.exe 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3820 WINWORD.EXE 3464 SystemSettingsAdminFlows.exe 4512 SystemSettingsAdminFlows.exe 4340 !WannaDecryptor!.exe 4340 !WannaDecryptor!.exe 4760 !WannaDecryptor!.exe 4760 !WannaDecryptor!.exe 1224 !WannaDecryptor!.exe 1224 !WannaDecryptor!.exe 4688 !WannaDecryptor!.exe 4688 !WannaDecryptor!.exe 2504 !WannaDecryptor!.exe 2504 !WannaDecryptor!.exe 464 !WannaDecryptor!.exe 464 !WannaDecryptor!.exe 1524 !WannaDecryptor!.exe 1524 !WannaDecryptor!.exe 5112 !WannaDecryptor!.exe 5112 !WannaDecryptor!.exe 1208 !WannaDecryptor!.exe 1208 !WannaDecryptor!.exe 2484 !WannaDecryptor!.exe 2484 !WannaDecryptor!.exe 3892 !WannaDecryptor!.exe 3892 !WannaDecryptor!.exe 4948 !WannaDecryptor!.exe 4948 !WannaDecryptor!.exe 4796 !WannaDecryptor!.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5012 wrote to memory of 4640 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 4640 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2548 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2412 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2412 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe PID 5012 wrote to memory of 2520 5012 msedge.exe msedge.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://tathli.com1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe24a846f8,0x7ffe24a84708,0x7ffe24a847182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5108 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3588 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5948 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6456 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2252,15264852796170593403,13671850492743927304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\WannaCry.exe"C:\Users\Admin\Downloads\WannaCry.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 44911715420446.bat3⤵
-
C:\Windows\SysWOW64\cscript.execscript //nologo c.vbs4⤵
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe f3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MSExchange*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Microsoft.Exchange.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlserver.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlwriter.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe c3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b !WannaDecryptor!.exe v3⤵
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe v4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet5⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe!WannaDecryptor!.exe3⤵
- Executes dropped EXE
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RequestComplete.easmx2⤵
- Opens file in notepad (likely ransom note)
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\SwitchPublish.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" SetDateTime1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv n18Ceb/a9UiWJvxEf5ddHA.01⤵
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask1⤵
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" SetDateTime1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv ds0o8KPBH0Kmmp6HfdzbPw.01⤵
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask1⤵
-
C:\Windows\regedit.exe"C:\Windows\regedit.exe"1⤵
- Runs regedit.exe
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im wanna_decryptor.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /f /im !WannaDecryptor!.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe"1⤵
- Kills process with taskkill
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\96.png.WCRYFilesize
6KB
MD5a3b9ffabd0405cfd87972fdec50f343f
SHA18d9c672053f892c5af1d9184eb464bbf82baf76f
SHA2561a639d5c3a4ac93f77ae1c0e2cf60cd90a4b239aad4c189abb43830f32630962
SHA512e43f7cbe64d6c08c44d92625c7b89a069303cf79e3dcbc7ac000a4a87b68052142c6c90701c43740a270bc57ec4e390b505a0b40d0801f9e0d8e31f43a895db6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\96.png.WCRYFilesize
1KB
MD5296ac43a4971f6370a2a91f30bedc647
SHA18967a1f34a0960bb6e3ae9245d8acc5b3b0c896d
SHA256d25441bbe3612071e95f62c2ee40681617e79ac8359ca42965403c8f39362a69
SHA512bc2cb73cce5a838a4fcdef6adb995a41851af3cc5830e781e6fab2a44863e83912b7b578ddbaf48130a9304ac32d328807af48d6e87a048bd9bee43cd5b60e32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000010Filesize
31KB
MD570f9a1aef01e3ee0259d4cf8b50ccea0
SHA11bd2b79d4ef77c0570c170590b1b3c18007422a8
SHA2564d8f397ff7f9a0932910377a528282e01fd8a912a117451cb4c0b02e741b197f
SHA51297ebb3fc8c4d4b481b031806e2307b276b0e7f897933ad5fa2d9f0950214cd0a4f6e08ea7663a97c99b942dacf36b231d9b02c788ed25df7c79782c156d72ab0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001cFilesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001dFilesize
39KB
MD58facf4d1ac6ff2520d3f9536ec0ba688
SHA105a661afe1d0f83e9566498cb4b895f1c90beae7
SHA256a7d8fbd8a9794a97d9ea3752e450a700c2e295a681b4fa7a21affedc4fdb1a9c
SHA5122cf271954eae3bc8766c3e19215732ee46591cbc3492b24d96cd26376be64dedb711c5d4962377b559b37c097aa267992ef380ad02bd5706435679076805a1d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001eFilesize
69KB
MD5aac57f6f587f163486628b8860aa3637
SHA1b1b51e14672caae2361f0e2c54b72d1107cfce54
SHA2560cda72f2d9b6f196897f58d5de1fe1b43424ce55701eac625e591a0fd4ce7486
SHA5120622796aab85764434e30cbe78b4e80e129443744dd13bc376f7a124ed04863c86bb1dcd5222bb1814f6599accbd45c9ee2b983da6c461b68670ae59141a6c1a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001fFilesize
19KB
MD576a3f1e9a452564e0f8dce6c0ee111e8
SHA111c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000020Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000021Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000022Filesize
1.2MB
MD5be529a907c265364aea60b32d2a6b43f
SHA14e36681dc58aaaa130238083d0aa43d4604019e8
SHA2561790bffabda47de3ac63c09728874fec01d03bd240361e81dbef964f8ed179bd
SHA51237e65201a514127811d0f92dce4ca096401af92b4c90441d1e0673c1829cdf5d47f513a63f8ee1593987ac3dd542f197654423b0fe24d50aea4794001356004b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000034Filesize
24KB
MD56165a7c774d104653fee619b4ea77fdc
SHA1214fe3e58449f886e78f2a101844acead3502236
SHA256e6cbb4d443cab3632935bc1284e7691409e4a17d5e67c8b401b831c8dedcd773
SHA5120d95446139983a568f9cd3d18f12eca05fca44257c6644d6e894a13d94e654a2c19accdb5baa4c513a69bd3ec97dbccd143f1290915f13c5c39d0fab478f1034
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000035Filesize
48KB
MD5675c3cc9eeb511d43db6635bf1b515f9
SHA1b5a3bc916093bf35af9cb26f45f79c229db4d70b
SHA256827caf07904c9ca524acf5d97bcaf1f11c84ffdb1fc2e7f683e1dc80648ed58c
SHA5126e82a416ca6d79ed2402382326d8621d9828b420daad5ff0a93f2de13598213b52ed7fc9f6a59dc6bb71bfb6a1bb13be3d54581e2d26ecb0dbf0bb2ecc894197
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000037Filesize
43KB
MD546b6ef2093b07b6333a72ab5113b6452
SHA1566e4accbc76afb673614f4c8b0c2ffe281e89fd
SHA25651be6ba8611f6a3bf95002fba48da012cd9559e0667ff19176a08150e429aa9e
SHA512b19712a582fbb03f57ec1c91e28403076fd7aedf6c7b64cd255b3ea6cfd806df919423da236fd78aa39e78b5f4ef567e41c5d56002bccdc9338857d64cb24ae7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000042Filesize
21KB
MD512b3b06a215a92b61047d4d676009d5c
SHA1bfaffa1420406892f96c14563413c12b22d5578d
SHA256ebddde1fdfe55665db44af96d9a914ea833d5c74b510150b0aafcc6598c8ec72
SHA5125f597b93c1bd9e9be7d7aa42ec1a69d1183d164096046af276546f907c7796cd5d1ea80d152ac8cab76f1ddf3a6e3d51ed74c6dc97d467a4f5519dbad8d42ea8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD54a4b2341b3765ff447e8fa1edfbf2656
SHA1f4b480665b7edb4a8832b8e2224ed443ff1af389
SHA2569c45e525e3e1a2013fe50f742c4fccde26827bcac89fc668eb9f646a957cf487
SHA512ef7865731316af346bd216fb1891438b31e0db5bbf528cd434e808d96f1e1fbfc1fa0c795132d7266810fca0c6a7a4580572b8b100a1abc5b54572b90a487c6e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD523cb2774d554502374b634a0db9f8911
SHA16de94a814fcea06db2ad499962fe80639c80efa2
SHA25691a6cc32b99588e3a24a3d8ddb35b52990e500a57db35272ff2eaca4f7cb387e
SHA512b8b774d95cacf37e987c85404b301fd4150821786fa159437f0e4bd898f8ba1437072cddf3cbdf4aaf76ebf7213753437da55fa920392d4f1e6bd12acc1be624
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD584b05bf0bb765405c62d747f0aa5d774
SHA11b0a61f9662d6b0280b37e4a2cb61cb1c4db574a
SHA256551e1397a9c437bc4f863a4806cafe0b530feb90ff0e219841f67d8b7edca0e3
SHA512a9938b7ef3894b6256f470eb96db6de0347ca65a3dac0969c3fbae801fe4680e7ef910ce72d30fc5ce1b7509ef4636d91e6ee022df09a9ed65ddf08de6765a14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD5d9444485b344908f0e171f149c0680b8
SHA109e718d4f843e73650cbd2e6b1126ad36e96df6f
SHA256c607762658254813598a4381dd08b9e41ca6e22ec7dc65494be5a1834e26807a
SHA5121922c4297e07c70b32456ab24067fb588739faed442550f39c01753bb04a9202de6c31e5016bd656e8cb716559d53d32f155ff00af4d85ab431b716759765cb9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD5c3718f573ed22960162749d7cd3832b7
SHA1f12a197d4dda6efc01a70d88c0e2f58914556f7b
SHA256c9a9378d35c6964d891baa5105e372357ed4ffa5e7051c095f659e368430aeb6
SHA51287ce672f2f39da8e2aa3c27fa00c8f0bdd08084c0770b905ea3964394a3fab012bd42d10dd4d14c806741a61b10d2e11311fa94e8e7fc54150e823e1a7289ec5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD56142c2295fa04d93d0585f276cb520ec
SHA1c8b041252320ec6cd2d77210a1238f293b670dab
SHA2568278e5af17a7eb7534a15958dffcb7e652295a51d8ac5a6649a40c3b1c7b6966
SHA512fc357b3919bdaf006a970ddae89f60774f8574c94d57b3757e9501ec749baf47dea27258de24b09ef146d5653f808c3f5541c3d33a6de30c1f750027b25ab0b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5c1b766a5353b194e9300905f1b64bf24
SHA121b2689eec20880996f7f046cffc6a8794e098d1
SHA2567df0be3e9075e4b298f9908a9c425af2b0bb7ba5c6d27e7d2c5ea082fd3f4eab
SHA5124f249a4c42ae498852d28557348d45f1c1bd7ddc1e171a24e82ea2d20e3bf21683a398428ea4c03b84c00169433b9689764ff768f887ce3c1afa06400eaaf31f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD55f2dbe22b22907691e12d3498399ae44
SHA1b8453d47d3ff4433d2641a48cc1339a540982e9d
SHA256617d2dd7c7cdd2a7904bd2c5e8a63bedffe40c2d4cb17e1c1873654c7c2734f3
SHA512ca7d41a9edddda25cb135ae3e393a6f439dc7104745aad5f3b1acb4a85f791b5b84a8c0c7b25c46e0cfa434528e4ca54880e56da18a9ecc53686c2f39a7ef6fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD51a3ee15c7319c286e56aa34c5548bf19
SHA17279de94a80602de11249199629250c2be7a7208
SHA25621f444b6e0dfe35659e8267f50f29d1b29214d4e1e9404823dcad6dd4822a718
SHA512edf9cf3883fa905b99e9c056e9fcfee38be124d8bee6a9fad3dff8fa256044fda69d5f3970ebdd46ce22c898ab97242642b3631462a564851dcea954cbbde631
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD5f2c7d540fd33175c604fde055d5f8053
SHA108c5d5af462b8c443198935c4e82160d1cf0a826
SHA2566e3c818bb828e3be85c19050b38a5209e923e0865e822b01aebe057ba8e9d485
SHA5126f822268160bcd96e1ce027c29b014e682c0a1d6e67f30a844fadab561592e3b7996336757e9ce9e0670348357f7404dddee6e543afce99ba7c89032a38bfd9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD52e40016f38c1957a483c9cba60b55855
SHA1b1f4fe6b096a14d7c96e545fb3e1cf439a32458e
SHA256b2dda724c37f67048a435468e2c1f2c9fffbe19901b93c9b8b5b4c5b3c66d1cb
SHA51220550b2607a6ae961836de43722c53854b753916032af286e6bac2c7b3d09a6bc9b6425d327c7d5cfe4e350c7bff06dcc51bcec8411409b319c52c7d99c97050
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5bf3f282be5cea149f6eb989f975539b3
SHA176f60c76a91964d5766be82a4dcf514d2e3611ef
SHA256b759e24172fc54e019afef8ac21fd13494e5c808107f45c962e1bad2851fd83f
SHA512e0118b97a2469369110c0ff89b634bb49cf66eecbe0bb15b98d91e3cec95bf0412f4823c185290e3d6c3e6d27d2ea87e754a9d4ded26a5ee4962f534c8b308fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5ae4cd2b8c5e781aa22a4ad7bf9749f5f
SHA1bc97586f0352f9e8ce80b809fba26a6ce4c412e5
SHA256e8403ac5af333d8fdabf7ec3fbdc42941d8641fb410de0f41618938357f8f591
SHA512197c56ff4a489fb0420b3dbfca6cb45cdb74912e81c22024ae9b76d3c85ab2104f94edfa5c8a6e787746b82ad39776f303be49eba29d3535f982e814f48769ec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD566839b8175463f4dc302c556bc8defb0
SHA1af374bbd89bb607291a77dd02821cd79d914a3a3
SHA256d63354980dcaaaf9f24a8ed698ac5d23b47d43e641f946474b263332f23ce8a1
SHA5122c128a2e2756584b02933a78172fd4c28ae810b0e0e4b512509009df960d6b278177ee23f5da9fcc39a5360249d2920573faa1d2b65d707758325b3c2ff35564
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5899d5ef55f3d995ff9a08fd61a3cf7d5
SHA174ed084f8444f9f52c914d2dbae55898d4226901
SHA256af72e133288cf8e610c1b535fd02642e89c0d6b6d256dd5343a77b56e547280f
SHA5127a3f2990014895583dbb452ffd2a6d7ec8b6048a3cb2ca23010c5a7a9b1e2679c4a97bb25a583651e525d5df38e2d052d384956065d528277daabed47a03833a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5dab99ebf70f50a47e0ccef146c173bcc
SHA155d8a71a57115696a7fc03b940a1fbf6d2ff766e
SHA25671428dff9f40aa7e4a15a24a3da445278c6f9c2cced372bb2d31123e8968d7fd
SHA51208651913d1a9cb2fde565d15378e0a19791c82363da260bf869ba3562a752569f59ef802b000404337e022e9ec0eaa5db0a7eff5ae54ab1c35114c28f6b8e9f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD591cadd9e30af7258e52867521f5c537c
SHA1f0c81632aa3812653dacfc85cee63f24f8dcecbb
SHA256534e7dcf2cbe00c89693a8cf82558ebb73f6d6ce8d6fb76c5dba7d4ff9a6e536
SHA51222b8d0a332ad70deacb2fbbe26d142beb7f8721526c7affdb86724c116b73ce0f4bedd0f94208b21b5099bc31dfffcf20f626511f35811b20802c9e96b9e3bb4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5d37cdc2fa9c0c0dc7317e9004ec1c166
SHA1daccf3ccd47adb59613b2f13bfa046dd64085b84
SHA2568a7d8e1cdf32186ed087eb745a130426489137fa200bd1c5a98c9fac609f1f65
SHA51261b13b7d9ab6f6a6a0021826a98396641df6a3d0a33716fc88709606e96a90e7ca1fe5e57002da9f857732d7b734a4f1a0b88a2e7872d9cd409617043f061517
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5ad7721285cfdce00e36940eb1921070f
SHA11ea1021336a579464c426ca9307a4cc74059ac15
SHA256c77a8c6f831c87a5307681eb28c10cb9ba3354e876f826d2a08d7e9077a4d835
SHA5129d68bff6710273843adf3275e4e82aab77f440b024eead44b2fe3cc2e68a969787bdbf49a13ff4ce6fcd48f7d612e20b4fa2c103677d672f60c86f482d6ba423
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5d853bf5070f963c37945834d68722584
SHA1280dbeb3d0feead1d8c2dd31f35dba13d68948e2
SHA25662f36a7168d00d28a16c876c793d063c4512958f0c7d65e2b47198bc20c7174f
SHA512c29baa295af718ee6f7a46f6ee5f240e3d02c806371026e4992608a2b665f835652f8699bc4e1aaabb39835ea0f3d52e78bc12fd79ff79fc755b67a7ff7d184f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5752c0a038120c5b81444647c5fc7fccd
SHA1d1d292359ab37ccc42a00445940667717c3c436a
SHA256b92492cbdd638286d92b11164e78fe905393461844b96098b64d630e73075ce1
SHA51214f3a08608b00116431bd254e1301ff421386fb087001d6332dbc5a04130b320ddee4a0ff4160702d581889ac27448b61e915960ca9e76a3c929bed10b5dc254
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5f9e246234596cfeb78910e6e095e4783
SHA19318c7ce7adfbb8e0b1b36c2d6ef6c7b464e2ea6
SHA256b82a83a1d7f00e878e31fc514456140dfcbc1c2f05cf9caf95cec4a7dad0d92c
SHA5129dfb14eb306708d5f91bae8f059773298c8ea9508abfab6e835c9849075eb200488d330e71d066b851ce040c2d45afbe61dfba98cf2c3f556c63aaa2286aee6e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
2KB
MD59ef4bc185d09686dec4ed8f6275d6f40
SHA1251722e58d0caf76333246d149c8b0d405bc82c0
SHA256cd3efb31298b3727d8ade083bb4e065129427fa36bfaac43ede3e55789a0d0f9
SHA512f838ea9478cc9a36b72e13725238577d411a4ea94d2b14c9fea9ff7ab997d48dd3ee0b3b9bbf83b32d22ae82c887affb3649a02d7b96d8305b60a74830fe64ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5ebff7776459c939d8cc814793a7394fa
SHA1a8ff16f35edbed460554c04fa32e3857e04970fd
SHA25637428152eca07f4bf742507535e3c2c9d63c193ccf3c1d739fa7f6228d07e84b
SHA5123d28fc5ab66a1fb21809ba5911f8571cdcb7e6cd098ca116e19a95eced0cf8c55ce7f96a5c3064d452e39a0e44618444fe9d99ff3cceaf55829ae12e6d7b6664
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5254a461dc3f1c6038e2ed1692271cbf5
SHA143d46c4eef9270e12477df6bd7a0e8b85a35578d
SHA256ddfc38072ac35a591148551a594b5810ffbd1d67a2ebd969938467181fb2e88e
SHA5124a8321c6c10540942eb7f029c368cad08f65a26a94d27665378229d86affdea3e8adfb696b54989cf51864278d724ad9c4cfa927754d0bfe24852ef1674d1aa7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD550c37e8075d7e8440f0ffe7ab83ea11b
SHA19296018ee1b1cf2b2cf2afecce58546db5f8e78f
SHA25691d64bd2563bcf08c6a3b87c7c23a815e2939525d71575294b9a98e59e604342
SHA512425cffbc3e2812f0a56f65d1e4c6e2b611eca486db6990f38506f22fbc3ffc2057e6983cc6d9e4c01375e84f2c9c392e6c3123c55a93dd5495f360fc2b932b30
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57b2b6.TMPFilesize
706B
MD56eef2efc5c87afb4aedf6b8bd187f632
SHA1d0059b54c02e6e7f0f5f29c5fe426afaa9c6945f
SHA2567804bfa7e1f15b3268e25a7ee3f2c1ede33671c60c64cc7abb04902162874163
SHA5128115fd408fd6982b7029c1c47dcad79e1d041e03a7783bbe604f48d7f2ded7125d0cca5f932df3aa994354fbcd640d05e0c60088b306616e3d1803f20063bcf1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.dbFilesize
16KB
MD59e02552124890dc7e040ce55841d75a4
SHA1f4179e9e3c00378fa4ad61c94527602c70aa0ad9
SHA2567b6e4ce73ddd8b5e7a7c4a94374ac2815d0048a5296879d7659a92ee0b425c77
SHA5123e10237b1bff73f3bb031f108b8de18f1b3c3396d63dfee8eb2401ce650392b9417143a9ef5234831d8386fc12e232b583dd45eada3f2828b3a0a818123dd5cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.dbFilesize
84KB
MD5d86c6634df99bd6122ad15c47d4cb248
SHA1a4c2ef57e35ccb56b3b1fae96ad02cb9cb0c4990
SHA256bf1653b0a2778efb4d74f9530cafc7f534407ae174e35fdfc9007792c66db94f
SHA5126c94f61617e0cbca4f6b89d65a61a29696d4fd4482e389e6f353d3b17a04101308830c66df52fcb41dd3b3a0ca34c0e87133ce52292c59078ad88628d928cb3c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5b446c2ae78c2fcf2ecb556d68de12df9
SHA13ae3b71211c642765f7c6b092e0a38f079f6081f
SHA25691448d4beb926316fc4297d1cf2beea42dc3d4f262294e633ee1a388e7931743
SHA51203141fc394b8b6aed8d22c3f18795d1223e5d262d84661be49c9e411426fabdf1d310135847e954937d1790101e22eb13b30ea35402845ec70eb320f0a761dda
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD5416bfaa2c0ae5e4fa96c9f1909e57318
SHA125599935c900f02de175a8f8c23efa348ae3b79f
SHA2563b8a4c3d42512960174beffc30e3e1a6a4c2bf9a17430e0f62f873f7e2a5b92d
SHA512bb89e5c2097c085d59eff7aeac91b408e23a2afadcb7c9637ed06e5a1c7327556d5f4987ea882c088fafdb13144bf2dea9dbe85ce1b9e908de83d6edc1712791
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD522ed293719eaab1fe60c4cf1ce3678da
SHA12e76576cbea772d0dc794e925864003da0c4b16d
SHA256228b230504f0dab212dcd2c097d4e9e14c64060359911221335cb69814b0b012
SHA512cbcc7f9876e8977a232aee72f0d4c4a235d4565a2e44d8f468c14e1f8f3ee67c4bc215436dd9a3862356b904785a1beb94acb8161f984634a3240acb6edec147
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbresFilesize
4KB
MD536c6656d48a3031e664244dc00e8c05e
SHA10c5913a49e4f99eb98b86ad4807eeaced5c4eb2c
SHA2562ee313da03e43aed00ec068f2219d324fd5c21b52975e64e5951a6ff436a79a7
SHA512a92b12eeb14c0bb422a1ec2792a6c9feb8c5cf5b4674c6be458f991bd26eaad421289952c854a5d8971a3bf2f5216586f457718c97c0809727f8d85b5bf586ca
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\AU7PMNK6\2\IJn_0fYO_7cUb--OQ-amF2MQCOo.br[1].js.WCRYFilesize
72KB
MD59be48f833eebdc8b33d26df69b50a90d
SHA164e887d343f90eb49985afae8cb0150986e89280
SHA2564be951085d0d723b2c4fd73e14f614a84e7052804593b8e2a9cf1b3a3ba19551
SHA512558929d417b3728bdfd5c52eabc5db166d02baee0cb66ab1a59e537839a305d19eb61076c37169d99961a96b177770949c4f653346e8e6f8bbcbda7e31d9bf4d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotmFilesize
18KB
MD550ba1ed889bf103acb845c6901909471
SHA125f9c68bce2bfb8f0b41f4aacedcc696f54950a3
SHA256638712cadff77a3544c67ea9b8c46b6764570b7ccae0cc495210688eb301baad
SHA512a00802a79fc1f41df96a3ce5b8d08ac769fea16e97127c9e9a83ef5293679b4b4fd83750e057ebf552d4da7a00476310f7c015cc4fff47bb2d1b2d50366ba517
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
13KB
MD5709976ab80ebac50b755fcd70eb11d22
SHA15bc254915ad664ed1ce131469b88829167d3a2f2
SHA2566208ce107a28ada55f9068797d90043e1ee4d1ee774c074c0131c20bb962edc0
SHA512fae9cad4740a10b885c9ca09b55ab32d9f5ae347530a15198edd01d86ca36643447f83e0e1ad9725a4cc0f14706c68e012f56605978f786852211d5ebdbad637
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
13KB
MD5d0bff7d16c98916c4c3adac2cefa7977
SHA1f55a13ab345bafaf5e9ceceeb4243ac2e032ba89
SHA256f4b0bb205a129c4567a62847799b77ab8e2aeebca1df877479361a12a88ab473
SHA512582923e8d7faee125f4f1f7857b8ba74e420273ec729eaf075cead6efe6542bae57f27fd842ef809dab7999734d6bd56133ecb99b9e0e01b37ec2a2d8a05743a
-
C:\Users\Admin\Desktop\RevokeCopy.kixFilesize
666KB
MD574c79d342438951381bed335f41a4ad9
SHA1016389519fe13dfc9fb9e1c1afced4aac3b82ea5
SHA25660469d01fe5f427d2c193b1217ceb6a5a623cf418c6ac3faecc8f13958b30aa1
SHA512d8509279e0e97ce9fdc9d85ab1ebdf71658599f1c93d859f6058f6080c2b1c4e784b0c3bd7d179ba06d46ed2748eba5dc6a32fab804a11acd9c48ba647647c91
-
C:\Users\Admin\Desktop\SelectWrite.iniFilesize
626KB
MD5d0f10fa554dfd026aa13262d78180068
SHA1065d796b845661c656004f6d9181240f751101e2
SHA256877062bd31579ff0f51f835d67e86e618f571482289ee1b5fe05724ac02d28f1
SHA51275b1ec5f26ac8ed1bc0ad379255eb48820b0abefd134ed22b6ffecd59238ba6dd23796e9d7efaf362fede5115a351a00f8e4732369648076ec388021c674734c
-
C:\Users\Admin\Desktop\SwitchPublish.rtfFilesize
685KB
MD590239db56adcd892f0886bcc1cdd7cb1
SHA10c4d64a04303de66c2450ea4f7feb2c13612e0e9
SHA2569d7e2503b561e0de5806635558418eabf22b1e38f40366626181399c6fcb49b7
SHA512bcab12a36fb28b18a24c552d04d3e84842ddf03839297437056aaa465a7b53539ae6daef5593169889cfa898ee404bedc936936df57c68b3ef00741e81a76d9f
-
C:\Users\Admin\Desktop\SyncSubmit.dibFilesize
293KB
MD521c364b8a37ad33d9ee29ef509863fed
SHA1257715c555117c60e91d51cf06b9d435c6353512
SHA2568494709cc51ce739c56ca0e25e7fb06bb58331eaa7d1c8c922573d972fa93426
SHA5124824b12497c64ad85b9f3d827ae6fc56fcc7f808e64db46108208e1e0be7f0e431803cb1e49dd9dd17d59727bce12a17f43863775d53d94efb44fa9a1f1b2d1c
-
C:\Users\Admin\Desktop\TraceFormat.rmiFilesize
607KB
MD56689bf89e0952685351ad68dadbd325b
SHA157e008cde871a310b0808016dc32aa8f3151c36a
SHA256ed3fffc1da542b9eb363eca4cd205523553cb38113474de070595e3744dab7fd
SHA512595252865113e18d95fd98baff09bc95549d3a2676c038df24d2f5978d5fdad97fbb40fb2db16befbd7d510e833dbcdc15cbbe4721c59af4b7786fe838cc09b6
-
C:\Users\Admin\Desktop\UnblockBlock.midiFilesize
411KB
MD5a5f9983b497d152a8db6e400901600bd
SHA135fc6054a7ef2fcdd56b24a25aca83a4062ee51b
SHA256d54e6d9e4d74550dc6d5315bb11c7d4e0ae3d19a38181c1c4942dc8120e23e91
SHA51219e9433bc91f23bff4be73e3d485420483c70b4e510b263a6ad8ad59a9016a2d34e3710ae980fc95a99c0e05bfd802df8744407033494e7e7a054db28083df3d
-
C:\Users\Admin\Desktop\UnlockSubmit.js.WCRYFilesize
450KB
MD5ae481083dbf9447b922de5e9a5342e68
SHA1fc9b299ae92b55a0005209d34858d756f0f3bbdd
SHA25611649ae0df1fab747eb6b62b0422d509231e9554d0499bbedf25fa2d02c33114
SHA512ab1e0a95d85aa8b3c8f43655fd2b3d58d281f9cde9e02945212404b7511627d27ae096cf597b658f1a4da53befed25bd57a6e9d8300cd3b688d9273f1fc33594
-
C:\Users\Admin\Desktop\UseDismount.rleFilesize
764KB
MD5d8071dfbe231cf2c1732db94ff958e83
SHA13cc84bf2045aa773663dab2fe4b8d81b053f7de6
SHA2567090f74ce12798bd2928fd3cc2aed351b941ebe67eb6600a0697768922589a8a
SHA512bdf87404e3d8475ca4996194b977748158bd8cd28be345b6af7b805710bb322fb669ee0b0133be93dfbc11cc20c93669c24abd13f3e06bd203f434ba3f9cb461
-
C:\Users\Admin\Downloads\!Please Read Me!.txtFilesize
797B
MD5afa18cf4aa2660392111763fb93a8c3d
SHA1c219a3654a5f41ce535a09f2a188a464c3f5baf5
SHA256227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0
SHA5124161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b
-
C:\Users\Admin\Downloads\!WannaDecryptor!.exe.lnkFilesize
590B
MD5ab06f471d2bc139a13954faf68b0a745
SHA10f58b2098060818ca9859bbc70337d42316ba9fd
SHA256dc469afc8bf378e8356784f0f52af1989e1ecaac887fec3e8e844d072b0e7bba
SHA512a0a34f764bae9238075124f9c102cf047a1877dd5875a32363df18d60e95a16d75f246c886198cf70f35ba9bf77d65738eb1d022f9caa5991a6f6874c57e37b8
-
C:\Users\Admin\Downloads\00000000.resFilesize
136B
MD575e1af32a47c6874ebf394a6220e91bc
SHA14fb96f89d40f30aa90cd90d334c24b586c585e3e
SHA2566c29515ca893ef0867f5e919a730d6814f6805379191a5c3b1704723d3d8164b
SHA5121d2c7a22bdab1334b05534c1a1e38599ab832f54e7eab2cf7cc5b6a39dd028d6dde0fe0e8372ac433e8e60be7b21cf62a6402da7dbce8c05c12eba84ff61143b
-
C:\Users\Admin\Downloads\00000000.resFilesize
136B
MD5e456e541b664832b7e228a912ad33a55
SHA194a70c5f00581c18e76879e723e1e959b3bf8673
SHA2569d05fde3d008dffee4914eedc1af585f17d24c280418a04d3b10c430a9be464e
SHA51283e2d18c685184058cde2ea99557a2759f72e45bff504067249458402f645296a5c1c34d9b01c6d0304072ea04642bc7c47e7531e2062819fcf7f825ccb03a0f
-
C:\Users\Admin\Downloads\00000000.resFilesize
136B
MD5462d4ecf5303648744d260acd1157ec8
SHA1d7160b8f9bce1c77e1bdd01c6fc49ddc7e9fdccc
SHA2569e79b7378f0666efa060e7af6c2e2a7ceb664007214dc7031956fd585aa1a413
SHA5122417108f76a1ce040c19c2174c96c806263bb62947e5ff5ebd3c33e25fc95b71bfc33d371fde1505c4a9e842e2f0b02477938f7b36d969d051420916ad1db399
-
C:\Users\Admin\Downloads\00000000.resFilesize
136B
MD5275b108bf639a0d8ca2e1ad304d6765a
SHA1d2c7f58e3a2d834675497cf63f000f41cb0a640e
SHA256b34445ddf3804dad8eb1817709512308db2f10944865d97ddecad603a9dca2f8
SHA51291a969c7205256a50fd98227b590c34c755a915b85dd03f46df6c672abfef277ad4ed0ed08a9ebcafb0fc73d6cc7b88008af6851e3f0c9cab58042fc0e448ae4
-
C:\Users\Admin\Downloads\44911715420446.batFilesize
318B
MD5a261428b490a45438c0d55781a9c6e75
SHA1e9eefce11cefcbb7e5168bfb8de8a3c3ac45c41e
SHA2564288d655b7de7537d7ea13fdeb1ba19760bcaf04384cd68619d9e5edb5e31f44
SHA512304887938520ffcc6966da83596ccc8688b7eace9572982c224f3fb9c59e6fb2dcaa021a19d2aae47346e954c0d0d8145c723b7143dece11ac7261dc41ba3d40
-
C:\Users\Admin\Downloads\Unconfirmed 525456.crdownloadFilesize
224KB
MD55c7fb0927db37372da25f270708103a2
SHA1120ed9279d85cbfa56e5b7779ffa7162074f7a29
SHA256be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844
SHA512a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206
-
C:\Users\Admin\Downloads\c.vbsFilesize
201B
MD502b937ceef5da308c5689fcdb3fb12e9
SHA1fa5490ea513c1b0ee01038c18cb641a51f459507
SHA2565d57b86aeb52be824875008a6444daf919717408ec45aff4640b5e64610666f1
SHA512843eeae13ac5fdc216b14e40534543c283ecb2b6c31503aba2d25ddd215df19105892e43cf618848742de9c13687d21e8c834eff3f2b69a26df2509a6f992653
-
C:\Users\Admin\Downloads\c.wryFilesize
628B
MD521016902333de0ba1d275418f5a71ca9
SHA1c835262bebaa4968e536af3e8b7acd6590b9adb6
SHA256797d6fc3deae834879ba177e71adcb5737bc534458d600a18005ef839c1b4b01
SHA512682fca67c2ca4c9cc9e6d87aede2211f698eeac8d75d39893fcb457082c89a05901c613ce0e51075e3f763facd55c24baa2a7203b2c619fee467bd9024847255
-
C:\Users\Admin\Downloads\f.wryFilesize
441B
MD55e06249612654088e3f7e175d10d6866
SHA14122df9f0eedf8efe5c39c51d8a48553b873d9f7
SHA256dbf25370ad28a1e80b690ee6eccee52dc9a9aa9bc77808795b6118afaa3c271e
SHA5122ef4fa5e022fc66d76dcb374fd0e292e88052971edb128fe6f55179bd821ab5bec6a129a4a493b4b8577824e29bca01067c63eebdfedf37e8b830a9b44f3ee8f
-
C:\Users\Admin\Downloads\m.wryFilesize
42KB
MD5980b08bac152aff3f9b0136b616affa5
SHA12a9c9601ea038f790cc29379c79407356a3d25a3
SHA256402046ada270528c9ac38bbfa0152836fe30fb8e12192354e53b8397421430d9
SHA512100cda1f795781042b012498afd783fd6ff03b0068dbd07b2c2e163cd95e6c6e00755ce16b02b017693c9febc149ed02df9df9b607e2b9cca4b07e5bd420f496
-
C:\Users\Admin\Downloads\u.wryFilesize
236KB
MD5cf1416074cd7791ab80a18f9e7e219d9
SHA1276d2ec82c518d887a8a3608e51c56fa28716ded
SHA25678e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
SHA5120bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5
-
\??\pipe\LOCAL\crashpad_5012_MEKUOTDBWOJFEYFIMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2284-3012-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3002-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3003-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3004-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3014-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3013-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3011-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3010-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3009-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/2284-3008-0x0000022BEC970000-0x0000022BEC971000-memory.dmpFilesize
4KB
-
memory/3820-2924-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3820-2922-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3820-2977-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3820-2976-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3820-2975-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3820-2974-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3820-2928-0x00007FFDF08A0000-0x00007FFDF08B0000-memory.dmpFilesize
64KB
-
memory/3820-2927-0x00007FFDF08A0000-0x00007FFDF08B0000-memory.dmpFilesize
64KB
-
memory/3820-2926-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3820-2925-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3820-2923-0x00007FFDF2FF0000-0x00007FFDF3000000-memory.dmpFilesize
64KB
-
memory/3888-2919-0x0000019046740000-0x0000019046741000-memory.dmpFilesize
4KB
-
memory/3888-2918-0x0000019046630000-0x0000019046631000-memory.dmpFilesize
4KB
-
memory/3888-2917-0x0000019046630000-0x0000019046631000-memory.dmpFilesize
4KB
-
memory/3888-2915-0x0000019046600000-0x0000019046601000-memory.dmpFilesize
4KB
-
memory/3888-2899-0x000001903E290000-0x000001903E2A0000-memory.dmpFilesize
64KB
-
memory/3888-2883-0x000001903E190000-0x000001903E1A0000-memory.dmpFilesize
64KB
-
memory/4604-1307-0x0000000010000000-0x0000000010012000-memory.dmpFilesize
72KB