Resubmissions

10-09-2024 00:42

240910-a2qfkszfpb 10

10-09-2024 00:35

240910-axj31ayakq 8

10-09-2024 00:23

240910-apyanazard 3

10-09-2024 00:18

240910-alt4tsyhrb 8

10-09-2024 00:06

240910-adp5xaxbmr 8

Analysis

  • max time kernel
    622s
  • max time network
    628s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-09-2024 00:06

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbe96a3cb8,0x7ffbe96a3cc8,0x7ffbe96a3cd8
      2⤵
        PID:2072
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:2
        2⤵
          PID:5044
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3184
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8
          2⤵
            PID:4892
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
            2⤵
              PID:1496
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
              2⤵
                PID:1612
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:1
                2⤵
                  PID:4920
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
                  2⤵
                    PID:1032
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2624
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4108 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2972
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                    2⤵
                      PID:3008
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                      2⤵
                        PID:3360
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5408 /prefetch:2
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1536
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:1
                        2⤵
                          PID:4584
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6196 /prefetch:8
                          2⤵
                            PID:2344
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,2960529603752190702,8726274543819285290,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6324 /prefetch:8
                            2⤵
                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2100
                          • C:\Users\Admin\Downloads\$uckyLocker.exe
                            "C:\Users\Admin\Downloads\$uckyLocker.exe"
                            2⤵
                            • Executes dropped EXE
                            • Sets desktop wallpaper using registry
                            • System Location Discovery: System Language Discovery
                            PID:1332
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4088
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1192
                            • C:\Windows\system32\OpenWith.exe
                              C:\Windows\system32\OpenWith.exe -Embedding
                              1⤵
                              • Modifies registry class
                              • Suspicious use of SetWindowsHookEx
                              PID:1360

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\95754451-4d14-4975-8070-834d75346a7a.tmp

                              Filesize

                              10KB

                              MD5

                              24ff81cd49847959473e1d7b704e0cb3

                              SHA1

                              d6d097d22859c06568d3740e5d4111dceb128e4f

                              SHA256

                              16ade2c53765da9b6a888c6b230e345ec4733e298c7ef7f64498c6ed86f27c32

                              SHA512

                              b2f8fe9500459a7f9870fc92b2f983cf5890dc847a0a608008792e1cb8d4e8726469b524f133b7ff43d1c3e7f085629418cc5e32bbcb3e0425e639d0dd54b5e0

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              4c3889d3f0d2246f800c495aec7c3f7c

                              SHA1

                              dd38e6bf74617bfcf9d6cceff2f746a094114220

                              SHA256

                              0a4781bca132edf11500537cbf95ff840c2b6fd33cd94809ca9929f00044bea4

                              SHA512

                              2d6cb23e2977c0890f69751a96daeb71e0f12089625f32b34b032615435408f21047b90c19de09f83ef99957681440fdc0c985e079bb196371881b5fdca68a37

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              c4a10f6df4922438ca68ada540730100

                              SHA1

                              4c7bfbe3e2358a28bf5b024c4be485fa6773629e

                              SHA256

                              f286c908fea67163f02532503b5555a939f894c6f2e683d80679b7e5726a7c02

                              SHA512

                              b4d407341989e0bbbe0cdd64f7757bea17f0141a89104301dd7ffe45e7511d3ea27c53306381a29c24df68bdb9677eb8c07d4d88874d86aba41bb6f0ce7a942c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              2KB

                              MD5

                              664a24a40825baaf53e7ea3d3f7e15b6

                              SHA1

                              8b01e66ed74d54652fc1edcb273e306a32e94fee

                              SHA256

                              b2e1d53825874a300179e9e8a49683d9f3216cd55ff75b8eef18ff62feaea535

                              SHA512

                              0ba315000c34da956a0ce89e199bb3a2cdc7319b2b97bbbaa795e3e284aa5cb46ff35e09d5cdf09394414992ad89505078ee65719de3b0ffbe8789679f08cdf5

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              2KB

                              MD5

                              8d09985876fe8568795bc1ffdb77401d

                              SHA1

                              665f12cdf0d5859cf4912970961f5de1683c6247

                              SHA256

                              50c8db5178ed1533c92ed2c55a3487813975524188e6bf9228c7260adace7b6d

                              SHA512

                              1b65d907d37d8c94cf761a91e5eca9a6a7905c192e3e1cfd06785d36e049d34f1868e3222d8f13eddbabd489149690d3b74bfb326b9275a81ed07f398e5adf30

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              496B

                              MD5

                              82eed7f6ef92c6ef0f8e81dbb28b7dfe

                              SHA1

                              053e648ac8b91789cfab64112250d3ee6023d7ce

                              SHA256

                              0e6641cb544fccbd802fdbdb5d7c9d0ffb4c7f73c6f89ef2f05738e4f10b9f3a

                              SHA512

                              0e479ac82709b089aa78f29b9622e51b71f3f1d6b220bf1ad7144722a4cc47e5d428830e47b7fed74d8907f7b39828886133b17d1ac530d9668340a14cf0d69b

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              c886ff6307995c5ac8eee368c694e8d8

                              SHA1

                              2744735a4593b034f94843e72672cd9f8c8ea05c

                              SHA256

                              57d5b4c76286a1d059c0a7fbb2ceb13182bbd7a7e0bb5acb70e16e4fd9f332b0

                              SHA512

                              a90584d783390127238cffeb549f47225bf69f43eaa157f5d8244a16d67f7cba9f8f44b77fb3978d835884a3deaf4aacf22a193c6150709db5e3d7567155d154

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              e117c006ff6c7dbe4c549d8d50589756

                              SHA1

                              26237e8c81a593808ca5538a433373a549446623

                              SHA256

                              0529df8fa245f37e0ea77c98fe85cae789bc0abcf77c41398f335c9f4cf8efbb

                              SHA512

                              f02292edb58de76ec14b5937b78dd7da7950d78ed773ae1f829db21085e44d9cdc70fca99b55fc1ae08c30bdfe6ec46c754e7c8bd70ad4b0ddd3bfcdb41b3788

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              28afe361383ca1de7efdd8d9f94e8bab

                              SHA1

                              7cdc69cd50bdd465f9b1525fd29a88961d77b844

                              SHA256

                              a5693d24013d47badd9b7bca1b0de69bf957e27f7956e207046d1891e1dd1c4a

                              SHA512

                              b859746e61c2a781373925bd7fcd394b7d40e435ab1c081b8a00b423197d2e11e485216e96ac9b5a4851da86a9d5581fda4175142b6d51a8ab92b0a876ef2d96

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              42f7fe9bd350cba478ed268a8bf6e907

                              SHA1

                              881a07155a69043f6b53f213406e7406f541a90a

                              SHA256

                              b8b9018238fc2980960bb150a54a627cdacd1353ead10f43dddd49ae0fdea2de

                              SHA512

                              c251f3ff06453eaab717b6925fd59d91fb49e21d66e0ae1fc51c8734ab0f4fb558b6c4eaacde0f7d74566bb5efd4c03534c4c61eb99658a13bc414c5107d4e42

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              874B

                              MD5

                              a4fa9c50cb4a3c46d8694d156832c79e

                              SHA1

                              0de6ab3b44b4ebddda9a61fdd58c8803da1c0d23

                              SHA256

                              3b8f903787564a4176965207f2e94b27904dfd84285dd74e13a37ad0df422247

                              SHA512

                              68902249b0bd8f86ba01b3b8d9082072b80553a66dc1bd59b2ab46351723b35f787c444e12cde202f8aba0a8138a5ae3c27f9b1ea4f2073f4ecfb87f354fafc5

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              448e4bd2defd3feef595d5337fe13789

                              SHA1

                              3af029e6adb9341c7ef147fabbaeee2a1dfa595e

                              SHA256

                              5e920d5ec6b566f33b2e1d6e9dca0ce4ec84aada7867fb9f888f5b3e9d00743b

                              SHA512

                              7c27fa09d17f587609d4bd2cb95e311115fc7f2fc5f59fab65b219bbc0a07dcfb7dcaa52ce3fe9d07f0ff4576e4709d4fd9f1e8995ab52e1213401c29d86c551

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              874B

                              MD5

                              60f0cbee48995ade081c3b655d62fde0

                              SHA1

                              4c23c980bdb3aad3c04c03beda9f711dd342457e

                              SHA256

                              67ffc0175f1b9bb618239ae1714bf37ba05f1e5476a460961fea5f3a289372ce

                              SHA512

                              002feb49e2608ef0c20756e1e2956f283dd893a72112c71200ed80e8ca8a25ea4e272424e324e575adaf39fa6ef2d12164712d71d58958ca61b30582167c5172

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              874B

                              MD5

                              92ecf4e4810e202905513ee494a581e4

                              SHA1

                              19ecf2b9f2850fa6c84ef061f33a4084fe6717b7

                              SHA256

                              9a93962b83f02a93d729e69673bd92f6baf3ba3bdc9eccb9c2bee1eaa691d393

                              SHA512

                              53dfd74ed69b484365a300b6eb4b99890f22c2c15ddd41dfa16d070a7dbbee9a79987202ef2fac1868fe80c44313115ffe37c23dc8ea12caa78ac0391eaf0c9b

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              de2c6ba821ef7934d1bb5630b84beaec

                              SHA1

                              4b47eebcdc2ca5c57521abdb03d3f842827a07c9

                              SHA256

                              a6c108b7f8f944e7e49879db583d175fa50845ef4b22c83557f3cba4ebb92362

                              SHA512

                              483328d4ee60d253510c27f5e4f8caf6e004e95422c4518a946dc77b221c4cb8a4774d27e7784c6b31431e4958ea1de8b6218af7b436de8010ce14c07ca757a7

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57fd7a.TMP

                              Filesize

                              539B

                              MD5

                              8db7a34147825186ed1ef0abed751d84

                              SHA1

                              47d1e043ff1cf37be84bee9e2d117b7e9d592d60

                              SHA256

                              d066c7e5aeb03dc16d823623373cd34055b3174dfef018d5c1f214041052dcfe

                              SHA512

                              b6d3a00c1147492cc9da45fdb8f1fc762e292aacd47a9e77327c8ae353332aff0c4d0d84bbbb5ee6cfc812b942cf9a8ff9e46e69b234306fab0c6a378e691ad9

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              f85109e1825325effb2f08fc467c6e35

                              SHA1

                              c69e8d0a0d787c6751a10474c85505e8ae7b72c8

                              SHA256

                              e8961d92db1aaf720759cc74b505fa47e2285649035b14659266e2054f8ff693

                              SHA512

                              0b617e894fd81deda714250fad6b52d2e63d5a8bce958fdf558496eb4a64561f38096460fe390899574544bde6a835db6428ff02c406651ca9629857769f43a7

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              b52163d32cd4b993a77ecb8d77f30171

                              SHA1

                              6f495b61558f7bd11812f678b8ca86b15acde028

                              SHA256

                              2ac6f075b9d9bd0bbeab4059221902cae51adffd6744cff5368a35a0d7569058

                              SHA512

                              09501c52dcccfc4d64ae1c075f1e103e5f2dae1bf890d2aec50716a97bc567a11a263107f9143d16dd3d9c9db5d849fd4007a63975a304911316686321b328d7

                            • C:\Users\Admin\Downloads\$uckyLocker.exe:Zone.Identifier

                              Filesize

                              55B

                              MD5

                              0f98a5550abe0fb880568b1480c96a1c

                              SHA1

                              d2ce9f7057b201d31f79f3aee2225d89f36be07d

                              SHA256

                              2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                              SHA512

                              dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                            • C:\Users\Admin\Downloads\Unconfirmed 106141.crdownload

                              Filesize

                              414KB

                              MD5

                              c850f942ccf6e45230169cc4bd9eb5c8

                              SHA1

                              51c647e2b150e781bd1910cac4061a2cee1daf89

                              SHA256

                              86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f

                              SHA512

                              2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

                            • memory/1332-417-0x00000000004C0000-0x000000000052E000-memory.dmp

                              Filesize

                              440KB

                            • memory/1332-418-0x0000000005520000-0x0000000005AC6000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/1332-419-0x0000000005010000-0x00000000050A2000-memory.dmp

                              Filesize

                              584KB

                            • memory/1332-420-0x0000000004FF0000-0x0000000004FFA000-memory.dmp

                              Filesize

                              40KB