Resubmissions

22/12/2024, 17:57

241222-wjmsmavlat 3

11/12/2024, 22:16

241211-169ccszqcx 10

10/12/2024, 18:38

241210-xae7vstla1 10

Analysis

  • max time kernel
    127s
  • max time network
    131s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    10/12/2024, 18:38

General

  • Target

    https://github.com/chronosmiki/RANSOMWARE-WANNACRY-2.0

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://github.com/chronosmiki/RANSOMWARE-WANNACRY-2.0"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://github.com/chronosmiki/RANSOMWARE-WANNACRY-2.0
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1940 -prefMapHandle 1932 -prefsLen 23681 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d39b653e-87e5-4682-ab1f-64628ae752f6} 4228 "\\.\pipe\gecko-crash-server-pipe.4228" gpu
        3⤵
          PID:772
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24601 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e913b248-cbe3-48a5-a5f1-b2264e5c9fd8} 4228 "\\.\pipe\gecko-crash-server-pipe.4228" socket
          3⤵
            PID:3024
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3128 -childID 1 -isForBrowser -prefsHandle 2760 -prefMapHandle 2984 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4903172c-c792-49c7-bd66-0ebb191b6829} 4228 "\\.\pipe\gecko-crash-server-pipe.4228" tab
            3⤵
              PID:4272
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3692 -childID 2 -isForBrowser -prefsHandle 3684 -prefMapHandle 3048 -prefsLen 29091 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {63ba5b26-e56f-432c-8513-9d020b0e3afc} 4228 "\\.\pipe\gecko-crash-server-pipe.4228" tab
              3⤵
                PID:4008
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4268 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4288 -prefMapHandle 4256 -prefsLen 29091 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e83edcd-a256-406a-8610-39a5b5e7cdbc} 4228 "\\.\pipe\gecko-crash-server-pipe.4228" utility
                3⤵
                • Checks processor information in registry
                PID:652
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 3 -isForBrowser -prefsHandle 5380 -prefMapHandle 5348 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e7922ae-f272-4472-b1e0-83add1d43fd0} 4228 "\\.\pipe\gecko-crash-server-pipe.4228" tab
                3⤵
                  PID:2996
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 4 -isForBrowser -prefsHandle 5632 -prefMapHandle 5628 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9badec12-9fdb-4294-a980-1956be8bf81a} 4228 "\\.\pipe\gecko-crash-server-pipe.4228" tab
                  3⤵
                    PID:4800
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 5 -isForBrowser -prefsHandle 5776 -prefMapHandle 5784 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 904 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e68d6388-8b78-4b32-81dc-2bb5a98fa43f} 4228 "\\.\pipe\gecko-crash-server-pipe.4228" tab
                    3⤵
                      PID:4196
                • C:\Windows\System32\rundll32.exe
                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                  1⤵
                    PID:2132
                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
                    "C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
                    1⤵
                    • Drops startup file
                    • Sets desktop wallpaper using registry
                    • System Location Discovery: System Language Discovery
                    PID:1552
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib +h .
                      2⤵
                      • System Location Discovery: System Language Discovery
                      • Views/modifies file attributes
                      PID:1488
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls . /grant Everyone:F /T /C /Q
                      2⤵
                      • Modifies file permissions
                      • System Location Discovery: System Language Discovery
                      PID:1676
                    • C:\Users\Admin\Downloads\Ransomware.WannaCry\taskdl.exe
                      taskdl.exe
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5200
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c 269411733856026.bat
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:5256
                      • C:\Windows\SysWOW64\cscript.exe
                        cscript.exe //nologo m.vbs
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:5356
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib +h +s F:\$RECYCLE
                      2⤵
                      • System Location Discovery: System Language Discovery
                      • Views/modifies file attributes
                      PID:6128
                    • C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:5464
                      • C:\Users\Admin\Downloads\Ransomware.WannaCry\TaskData\Tor\taskhsvc.exe
                        TaskData\Tor\taskhsvc.exe
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2332
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /c start /b @[email protected] vs
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:5516
                      • C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:5528
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5616
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            wmic shadowcopy delete
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1812
                    • C:\Users\Admin\Downloads\Ransomware.WannaCry\taskdl.exe
                      taskdl.exe
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:5816
                    • C:\Users\Admin\Downloads\Ransomware.WannaCry\taskse.exe
                      taskse.exe C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:6044
                    • C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:6060
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "nvhrfadav110" /t REG_SZ /d "\"C:\Users\Admin\Downloads\Ransomware.WannaCry\tasksche.exe\"" /f
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:6048
                      • C:\Windows\SysWOW64\reg.exe
                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "nvhrfadav110" /t REG_SZ /d "\"C:\Users\Admin\Downloads\Ransomware.WannaCry\tasksche.exe\"" /f
                        3⤵
                        • Adds Run key to start application
                        • System Location Discovery: System Language Discovery
                        • Modifies registry key
                        PID:4368
                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
                    "C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
                    1⤵
                    • System Location Discovery: System Language Discovery
                    PID:6100
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib +h .
                      2⤵
                      • System Location Discovery: System Language Discovery
                      • Views/modifies file attributes
                      PID:3064
                    • C:\Windows\SysWOW64\icacls.exe
                      icacls . /grant Everyone:F /T /C /Q
                      2⤵
                      • Modifies file permissions
                      • System Location Discovery: System Language Discovery
                      PID:3740
                  • C:\Windows\system32\NOTEPAD.EXE
                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]
                    1⤵
                    • Opens file in notepad (likely ransom note)
                    PID:5704
                  • C:\Windows\system32\vssvc.exe
                    C:\Windows\system32\vssvc.exe
                    1⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5812
                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]
                    "C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]"
                    1⤵
                    • Executes dropped EXE
                    • Sets desktop wallpaper using registry
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:5920

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\activity-stream.discovery_stream.json

                    Filesize

                    19KB

                    MD5

                    20115ffd14abd31cbd1c3595b34984f7

                    SHA1

                    c1e4e3347e02a4c456106d218cbaab17f515fc0a

                    SHA256

                    760e2a5a63ee3cfae40768f5499b2a65264370a30f8072c0950b093795cf0b6d

                    SHA512

                    19dfd0e15726394cc30c75774560aa209f9cb0cf0af244cd35992d293d381a7fdb8b52f2ca3bc69ec4776154ab24a67f5becc7dac0c541a87b5ce594c02ef9ac

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                    Filesize

                    15KB

                    MD5

                    96c542dec016d9ec1ecc4dddfcbaac66

                    SHA1

                    6199f7648bb744efa58acf7b96fee85d938389e4

                    SHA256

                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                    SHA512

                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                  • C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\mozilla-temp-41

                    Filesize

                    3.3MB

                    MD5

                    efe76bf09daba2c594d2bc173d9b5cf0

                    SHA1

                    ba5de52939cb809eae10fdbb7fac47095a9599a7

                    SHA256

                    707a9f323556179571bc832e34fa592066b1d5f2cac4a7426fe163597e3e618a

                    SHA512

                    4a1df71925cf2eb49c38f07c6a95bea17752b025f0114c6fd81bc0841c1d1f2965b5dda1469e454b9e8207c2e0dfd3df0959e57166620ccff86eeeb5cf855029

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    479KB

                    MD5

                    09372174e83dbbf696ee732fd2e875bb

                    SHA1

                    ba360186ba650a769f9303f48b7200fb5eaccee1

                    SHA256

                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                    SHA512

                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    13.8MB

                    MD5

                    0a8747a2ac9ac08ae9508f36c6d75692

                    SHA1

                    b287a96fd6cc12433adb42193dfe06111c38eaf0

                    SHA256

                    32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                    SHA512

                    59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\AlternateServices.bin

                    Filesize

                    6KB

                    MD5

                    b5be7693f7e7faeda74fcc5ba294410b

                    SHA1

                    a9c2395fc2170af8db5b531aeca58c65dab25bdb

                    SHA256

                    71e7cd5fc6ebdfb890ad974bb8c42782008dc9e42c5fb0fae9f03fa5de45026c

                    SHA512

                    028a6d49dd66cc3aced3fec26693997fa9a6e7c95c1f42bcb5198ffe6f032f6f0fc992aee41e689737c5781be12db34f8bb020a89ab6686b729c400c280bf05e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\AlternateServices.bin

                    Filesize

                    8KB

                    MD5

                    691d3baa0d98ba1df1b4fae56d52cdba

                    SHA1

                    b86bd80535de5da88806d2681d5e94edab7c4d2e

                    SHA256

                    8cedd4cb2d3ff84134576a0d9badae039bf750dbd71d3735cd40d10d91e54784

                    SHA512

                    c68d5cc02788a256378ba559a2d761fb7d36cedcb66a6ad0433128b363565fea3731d160a9943c3a3396c1edaa3d324bce123e3a692f879117ac9203cb1a2b21

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\cert9.db

                    Filesize

                    224KB

                    MD5

                    1c25308b45a335ff1d41bb3912f4f341

                    SHA1

                    2cc35c590cd5e3c5520dcb854806c1efb7cc01b2

                    SHA256

                    c08d00077dfcbf9e2675a1a3ea0fe40c492d7e6e8b106b8e2046e5e92da522db

                    SHA512

                    93a9d87edf7294c836fc36152abfed0cb1ebeb9f6ce2266e2f6bc75999d482d3fb192611c64ccd348549e67802ebec365fb0fa7077638cc0bc36b37ae0adad39

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    5KB

                    MD5

                    042f3ee1e303e414e13f86003d527931

                    SHA1

                    59b0e63098a30bee8f0a91f6709447c3089f7dc2

                    SHA256

                    f41e78bbea241905f21e88e91cc23539d899124bd6ea33469185292412dcf4a9

                    SHA512

                    f6b219b3e280920251f09912b6872a8fbdf39a42d2bed7af9532db9c854d19702e6eb001e76db7172afbad97596701e3c3294d340aec4a9fdbaab57dddfbdf47

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    6KB

                    MD5

                    88e6e3eeb49d2eb9c8ff35883808dad5

                    SHA1

                    d1dce4758fe6e9925e1d353354244381ab7481eb

                    SHA256

                    8fb75e84bcda3d656bc408934877d2ccf7a45d93bf6de7bd804bb4ca494da910

                    SHA512

                    9f12a275b6afd9234dcbeb29ed41dee302f1024bf33a2871ef7e7ec9b4957ffe5bd7e8a32218fa07a7fe754c0b3c5a482d6b723b3dd502a1009c06bfbc5c1a02

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\datareporting\glean\db\data.safe.tmp

                    Filesize

                    6KB

                    MD5

                    56d4b97af4d052787af8972b4bcd366e

                    SHA1

                    83b5a2dd2cf52dc0a32a6f4d80bf8a8223b84621

                    SHA256

                    1813004d302c81f342dde68bcf6f494daa744559bd7d409738652f6be4d76671

                    SHA512

                    78cf5cd9465a28b8f7b3c6942593ddba1914077b536cb632c90a31af42e796a05cd0ff133274244c9a38780777c78a30e4e1614595641e3c3c0b69861bb8d31e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\datareporting\glean\pending_pings\03b41cd5-dcfb-48ef-a347-1aa6776e1378

                    Filesize

                    671B

                    MD5

                    0fe22660c71294ec407883b898fe2639

                    SHA1

                    6ddfff516ec89feaf7d370c5a1e95518f2d3fb5e

                    SHA256

                    acd1a6616abc23b190a01eaa5050b7db853e038ddfe9042bbd9adc5122772b95

                    SHA512

                    a0fb0eee470d4fbf5eb8c304815f1e121d14203da7d2741b7ad38e84985d56b642ac477557dd081f7b2b5ac375e461bf3d80304f22579b708804229034fd5f81

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\datareporting\glean\pending_pings\78a1b70c-889a-4837-858b-cf8783629f1a

                    Filesize

                    982B

                    MD5

                    c6b0b298beb78a2d8d07ec106a6d321a

                    SHA1

                    015ecf284729ad0b0ca237f3a92749688ed307ad

                    SHA256

                    3d045430736112b34a5090165b9711b9d2f80773588f7810880c623e5a7ca860

                    SHA512

                    4f1c4f8e8622b60d7804f1382c19e1671340196b1977fe3e43b7324d99e7706093a4c647035e8975218c950d295fa0da14bc2c75006c1f36cc208bdfceaf222c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\datareporting\glean\pending_pings\f4264d38-fde2-467b-9073-4da1a7c54997

                    Filesize

                    27KB

                    MD5

                    13014f4c44191781bd72b0b1179ca4a9

                    SHA1

                    cc0583ece237a8fa94966f71efffde0500824f10

                    SHA256

                    c2b1ab3708538b426fe0d7856f3bbb0908cd2b931fdc96e36e10ec638695b150

                    SHA512

                    0ca6a3e9a4be7c681c3792721fe96e2311beaa233307c8bc0268021dde429606b183624ccd789fdb3dd45ce7feda9f93e984342649242adbf3105c88402efa8a

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                    Filesize

                    1.1MB

                    MD5

                    842039753bf41fa5e11b3a1383061a87

                    SHA1

                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                    SHA256

                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                    SHA512

                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    2a461e9eb87fd1955cea740a3444ee7a

                    SHA1

                    b10755914c713f5a4677494dbe8a686ed458c3c5

                    SHA256

                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                    SHA512

                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\gmp-widevinecdm\4.10.2710.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                    Filesize

                    372B

                    MD5

                    bf957ad58b55f64219ab3f793e374316

                    SHA1

                    a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                    SHA256

                    bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                    SHA512

                    79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                    Filesize

                    17.8MB

                    MD5

                    daf7ef3acccab478aaa7d6dc1c60f865

                    SHA1

                    f8246162b97ce4a945feced27b6ea114366ff2ad

                    SHA256

                    bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                    SHA512

                    5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\prefs-1.js

                    Filesize

                    11KB

                    MD5

                    490b18d869ccf8488a746030e1320fd0

                    SHA1

                    f0c6b3427fe05794f1d015237d4858dbfa0a4fae

                    SHA256

                    d10d4d17d0014d06da2969b7a52a39b58f3e7c3cb60280a53c7ef4798ad4346b

                    SHA512

                    9bbf4b1c1a52cd806c36c366a793ca8f9874ccfd24bcbac207ba5765b74f52c381c422a154f454ea3c0244d36467e32af0aa1c1bbab511c1878803e9bbb077cd

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\prefs.js

                    Filesize

                    11KB

                    MD5

                    650926e48a06a71377fef050292dc2c0

                    SHA1

                    9a3f0c79137bed9c4d46b011fae3df7c41d62f08

                    SHA256

                    4075fde191c64f5aa84b14369cf4726b54696b093366afc3c4884d228369afbf

                    SHA512

                    204127c7a1bc2f7178eba24dbdff285c43327b4906b580561b424c39576dac12bcb875de68d1a6b7ccc6aeacf04b522dd7c1cdaa416c73da82db2b3d5b278229

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\sessionstore-backups\recovery.baklz4

                    Filesize

                    3KB

                    MD5

                    a838f724cac944837848933faa82511f

                    SHA1

                    320d6137bce0ded575aa754429cc21e4d504a5cf

                    SHA256

                    9914b9fd8bbbe66c2200578f19aa5bf56b95a099d85080d0f150956257566798

                    SHA512

                    bbe711d75502536d63931341eb08f14c87bc9d91c625cf657a2e90716423b9ec73c7d93747986a8976b788d3c943a8856728ef0dcb136368c35dc1db99682cf8

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\sessionstore-backups\recovery.baklz4

                    Filesize

                    3KB

                    MD5

                    b198ca3fd93d42aaeabb9b0d68d89ba6

                    SHA1

                    2f2145f1aed35fd32f30a5731a18f0522fafa0e3

                    SHA256

                    2361b1353544128a3bef4d2cd1a8152cecd63852206fd50f2e72e6fe0f2ca3ec

                    SHA512

                    941d45848b9110a504c8ace6228ca22bd486e0788f06a9253918f18ebef02c40a658dbceeec96dde54b27164d7baa51d9198c518f6451503a28e315b11ccb766

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ld3ilkk.default-release\sessionstore-backups\recovery.baklz4

                    Filesize

                    3KB

                    MD5

                    c9ab4169626d5cfeff7b03818603fec9

                    SHA1

                    990a04812cbfd4fb9d932dae162e4e1527d21e6c

                    SHA256

                    0c1e47b54f142cd9fa85b17f6e695a929daf133099c264dd1dadc45d8599a5bc

                    SHA512

                    ae9574f0d2fae44d64ce929e0c423decdf852fa76046f25a7adceb322e5a0d723faec1ac6e378b349f242f6da7aa9d8d0445ad73da6f728ffff17f04ed69381b

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\00000000.eky

                    Filesize

                    1KB

                    MD5

                    5b1e04b36b26179c294d58dd0dab69d8

                    SHA1

                    2d7997242fa9af23f09d46ba7216cdcd7e092e3d

                    SHA256

                    1c57ce1b227362b3d5d0e87261c2e56f87f0a627fa98a74571767e0ee66e980e

                    SHA512

                    5352ce216df6431dcb69887fb218da6bc7e30da06d148b79873e3c92ceaab7f4257109240e4fed1354bbcc6fd1103ca295a7aaf03b14ff8f7602a4aaff4bb2fa

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\00000000.pky

                    Filesize

                    276B

                    MD5

                    8fb70e7f05b1cae4274bb231f64b8119

                    SHA1

                    6f7751a8474453cd987bdc4a6d8fe0643d458137

                    SHA256

                    fbef7a64ae33224ecbcef4e6db1c72ea2eb52ece7bbdaa145cc86c41c4b39849

                    SHA512

                    bad4210f65279ef4a47512e02c8a15778c2ad97984dcc696f040d86be57e721ed0aef1949018cfaab780a6eee65063fa8a876d3aae074c457f2333c953fe57fe

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\00000000.res

                    Filesize

                    136B

                    MD5

                    13328f6d9390c7547f42d0bd3904d899

                    SHA1

                    5cfc3215d6855ce25715920860501d38ea09986c

                    SHA256

                    8b07d9f1f85ed76f2a6300c5e8c05480181980118afa881f8682b8de1fc07ef8

                    SHA512

                    06d388368b7584de5ffb150cb8e053366160fe87d66c023116d19ab6df36dd804b0b9dd5315788f88a925cfda456a56ecd94a6e8fe55803936118667c78e2f20

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\269411733856026.bat

                    Filesize

                    362B

                    MD5

                    fe9561e52b9a2cad33eaa33fbdaee8f4

                    SHA1

                    2bc1b267837017ec84edec64e2ed5ab787a59793

                    SHA256

                    6cf7e177e05490a3326a71f20a6640edef1d92936601969df22b0ea5261b1d44

                    SHA512

                    e734e185a32b0d2109cb666c8bf217096fffb9804578b97d8b108a7edae01ab129c7e6bf20174faf67c5ec493e9ce0e98d85381017fd3b879fe7232a36430261

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]

                    Filesize

                    933B

                    MD5

                    7e6b6da7c61fcb66f3f30166871def5b

                    SHA1

                    00f699cf9bbc0308f6e101283eca15a7c566d4f9

                    SHA256

                    4a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e

                    SHA512

                    e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]

                    Filesize

                    721B

                    MD5

                    1fd92b31ce413bb50a56369f8d3c4936

                    SHA1

                    379c42294c7f1b96136946dbc67f1ad6b035f40e

                    SHA256

                    0dee379b0ea88978206940cdc4ccd5139abdf49ae5b1e0ae3249015c5979e657

                    SHA512

                    390a563abe72612ef66051a7958eed54b5255d65b4c2eeb4615d9327055a89c904c24bdd53d4681776052336b9698909330f4b53f1dcb02b59a846bcd81102ff

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\b.wnry

                    Filesize

                    1.4MB

                    MD5

                    c17170262312f3be7027bc2ca825bf0c

                    SHA1

                    f19eceda82973239a1fdc5826bce7691e5dcb4fb

                    SHA256

                    d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa

                    SHA512

                    c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\c.wnry

                    Filesize

                    780B

                    MD5

                    93f33b83f1f263e2419006d6026e7bc1

                    SHA1

                    1a4b36c56430a56af2e0ecabd754bf00067ce488

                    SHA256

                    ef0ed0b717d1b956eb6c42ba1f4fd2283cf7c8416bed0afd1e8805ee0502f2b4

                    SHA512

                    45bdd1a9a3118ee4d3469ee65a7a8fdb0f9315ca417821db058028ffb0ed145209f975232a9e64aba1c02b9664c854232221eb041d09231c330ae510f638afac

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\f.wnry

                    Filesize

                    584B

                    MD5

                    708912f2fe90f851ac47e18a3b0d4466

                    SHA1

                    d0b21f665d88e0e4e6a8012ba33ebf04b1e6880c

                    SHA256

                    7acee3b586f99639979b1a987fd597103e58c1cea9fd01ba0378ad7560d3dfa4

                    SHA512

                    66d59718cf0fd04a003875a9edccc339668e6f0a72b149ef084ea578b7cbf6cec059520f503506c2f617ea9d5788323686a1e4d9fcf1b37e5be80925224a8dee

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\m.vbs

                    Filesize

                    241B

                    MD5

                    cb8af050def8bd8ff07b6fece0b09530

                    SHA1

                    8faf2a240203f7dc8739952672c788a0fb2df973

                    SHA256

                    c97d8fc0de558b033cbf088ef69122addd364e65a49111aec218465549bf1227

                    SHA512

                    5ccb09d7e199f31e4a9a92621755c6514e8aae6187b6bef8aba2b6644834776941401188646dbf552639a13124285de15b18e6ff12acb57f91cb7d204cafdd57

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_bulgarian.wnry

                    Filesize

                    46KB

                    MD5

                    95673b0f968c0f55b32204361940d184

                    SHA1

                    81e427d15a1a826b93e91c3d2fa65221c8ca9cff

                    SHA256

                    40b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd

                    SHA512

                    7601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_chinese (simplified).wnry

                    Filesize

                    53KB

                    MD5

                    0252d45ca21c8e43c9742285c48e91ad

                    SHA1

                    5c14551d2736eef3a1c1970cc492206e531703c1

                    SHA256

                    845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a

                    SHA512

                    1bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_chinese (traditional).wnry

                    Filesize

                    77KB

                    MD5

                    2efc3690d67cd073a9406a25005f7cea

                    SHA1

                    52c07f98870eabace6ec370b7eb562751e8067e9

                    SHA256

                    5c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a

                    SHA512

                    0766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_croatian.wnry

                    Filesize

                    38KB

                    MD5

                    17194003fa70ce477326ce2f6deeb270

                    SHA1

                    e325988f68d327743926ea317abb9882f347fa73

                    SHA256

                    3f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171

                    SHA512

                    dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_czech.wnry

                    Filesize

                    39KB

                    MD5

                    537efeecdfa94cc421e58fd82a58ba9e

                    SHA1

                    3609456e16bc16ba447979f3aa69221290ec17d0

                    SHA256

                    5afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150

                    SHA512

                    e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_danish.wnry

                    Filesize

                    36KB

                    MD5

                    2c5a3b81d5c4715b7bea01033367fcb5

                    SHA1

                    b548b45da8463e17199daafd34c23591f94e82cd

                    SHA256

                    a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6

                    SHA512

                    490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_dutch.wnry

                    Filesize

                    36KB

                    MD5

                    7a8d499407c6a647c03c4471a67eaad7

                    SHA1

                    d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b

                    SHA256

                    2c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c

                    SHA512

                    608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_english.wnry

                    Filesize

                    36KB

                    MD5

                    fe68c2dc0d2419b38f44d83f2fcf232e

                    SHA1

                    6c6e49949957215aa2f3dfb72207d249adf36283

                    SHA256

                    26fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5

                    SHA512

                    941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_filipino.wnry

                    Filesize

                    36KB

                    MD5

                    08b9e69b57e4c9b966664f8e1c27ab09

                    SHA1

                    2da1025bbbfb3cd308070765fc0893a48e5a85fa

                    SHA256

                    d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324

                    SHA512

                    966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_finnish.wnry

                    Filesize

                    37KB

                    MD5

                    35c2f97eea8819b1caebd23fee732d8f

                    SHA1

                    e354d1cc43d6a39d9732adea5d3b0f57284255d2

                    SHA256

                    1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

                    SHA512

                    908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_french.wnry

                    Filesize

                    37KB

                    MD5

                    4e57113a6bf6b88fdd32782a4a381274

                    SHA1

                    0fccbc91f0f94453d91670c6794f71348711061d

                    SHA256

                    9bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc

                    SHA512

                    4f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_german.wnry

                    Filesize

                    36KB

                    MD5

                    3d59bbb5553fe03a89f817819540f469

                    SHA1

                    26781d4b06ff704800b463d0f1fca3afd923a9fe

                    SHA256

                    2adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61

                    SHA512

                    95719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_greek.wnry

                    Filesize

                    47KB

                    MD5

                    fb4e8718fea95bb7479727fde80cb424

                    SHA1

                    1088c7653cba385fe994e9ae34a6595898f20aeb

                    SHA256

                    e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9

                    SHA512

                    24db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_indonesian.wnry

                    Filesize

                    36KB

                    MD5

                    3788f91c694dfc48e12417ce93356b0f

                    SHA1

                    eb3b87f7f654b604daf3484da9e02ca6c4ea98b7

                    SHA256

                    23e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4

                    SHA512

                    b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_italian.wnry

                    Filesize

                    36KB

                    MD5

                    30a200f78498990095b36f574b6e8690

                    SHA1

                    c4b1b3c087bd12b063e98bca464cd05f3f7b7882

                    SHA256

                    49f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07

                    SHA512

                    c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_japanese.wnry

                    Filesize

                    79KB

                    MD5

                    b77e1221f7ecd0b5d696cb66cda1609e

                    SHA1

                    51eb7a254a33d05edf188ded653005dc82de8a46

                    SHA256

                    7e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e

                    SHA512

                    f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_korean.wnry

                    Filesize

                    89KB

                    MD5

                    6735cb43fe44832b061eeb3f5956b099

                    SHA1

                    d636daf64d524f81367ea92fdafa3726c909bee1

                    SHA256

                    552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0

                    SHA512

                    60272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_latvian.wnry

                    Filesize

                    40KB

                    MD5

                    c33afb4ecc04ee1bcc6975bea49abe40

                    SHA1

                    fbea4f170507cde02b839527ef50b7ec74b4821f

                    SHA256

                    a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536

                    SHA512

                    0d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_norwegian.wnry

                    Filesize

                    36KB

                    MD5

                    ff70cc7c00951084175d12128ce02399

                    SHA1

                    75ad3b1ad4fb14813882d88e952208c648f1fd18

                    SHA256

                    cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a

                    SHA512

                    f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_polish.wnry

                    Filesize

                    38KB

                    MD5

                    e79d7f2833a9c2e2553c7fe04a1b63f4

                    SHA1

                    3d9f56d2381b8fe16042aa7c4feb1b33f2baebff

                    SHA256

                    519ad66009a6c127400c6c09e079903223bd82ecc18ad71b8e5cd79f5f9c053e

                    SHA512

                    e0159c753491cac7606a7250f332e87bc6b14876bc7a1cf5625fa56ab4f09c485f7b231dd52e4ff0f5f3c29862afb1124c0efd0741613eb97a83cbe2668af5de

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_portuguese.wnry

                    Filesize

                    37KB

                    MD5

                    fa948f7d8dfb21ceddd6794f2d56b44f

                    SHA1

                    ca915fbe020caa88dd776d89632d7866f660fc7a

                    SHA256

                    bd9f4b3aedf4f81f37ec0a028aabcb0e9a900e6b4de04e9271c8db81432e2a66

                    SHA512

                    0d211bfb0ae953081dca00cd07f8c908c174fd6c47a8001fadc614203f0e55d9fbb7fa9b87c735d57101341ab36af443918ee00737ed4c19ace0a2b85497f41a

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_romanian.wnry

                    Filesize

                    50KB

                    MD5

                    313e0ececd24f4fa1504118a11bc7986

                    SHA1

                    e1b9ae804c7fb1d27f39db18dc0647bb04e75e9d

                    SHA256

                    70c0f32ed379ae899e5ac975e20bbbacd295cf7cd50c36174d2602420c770ac1

                    SHA512

                    c7500363c61baf8b77fce796d750f8f5e6886ff0a10f81c3240ea3ad4e5f101b597490dea8ab6bd9193457d35d8fd579fce1b88a1c8d85ebe96c66d909630730

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_russian.wnry

                    Filesize

                    46KB

                    MD5

                    452615db2336d60af7e2057481e4cab5

                    SHA1

                    442e31f6556b3d7de6eb85fbac3d2957b7f5eac6

                    SHA256

                    02932052fafe97e6acaaf9f391738a3a826f5434b1a013abbfa7a6c1ade1e078

                    SHA512

                    7613dc329abe7a3f32164c9a6b660f209a84b774ab9c008bf6503c76255b30ea9a743a6dc49a8de8df0bcb9aea5a33f7408ba27848d9562583ff51991910911f

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_slovak.wnry

                    Filesize

                    40KB

                    MD5

                    c911aba4ab1da6c28cf86338ab2ab6cc

                    SHA1

                    fee0fd58b8efe76077620d8abc7500dbfef7c5b0

                    SHA256

                    e64178e339c8e10eac17a236a67b892d0447eb67b1dcd149763dad6fd9f72729

                    SHA512

                    3491ed285a091a123a1a6d61aafbb8d5621ccc9e045a237a2f9c2cf6049e7420eb96ef30fdcea856b50454436e2ec468770f8d585752d73fafd676c4ef5e800a

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_spanish.wnry

                    Filesize

                    36KB

                    MD5

                    8d61648d34cba8ae9d1e2a219019add1

                    SHA1

                    2091e42fc17a0cc2f235650f7aad87abf8ba22c2

                    SHA256

                    72f20024b2f69b45a1391f0a6474e9f6349625ce329f5444aec7401fe31f8de1

                    SHA512

                    68489c33ba89edfe2e3aebaacf8ef848d2ea88dcbef9609c258662605e02d12cfa4ffdc1d266fc5878488e296d2848b2cb0bbd45f1e86ef959bab6162d284079

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_swedish.wnry

                    Filesize

                    37KB

                    MD5

                    c7a19984eb9f37198652eaf2fd1ee25c

                    SHA1

                    06eafed025cf8c4d76966bf382ab0c5e1bd6a0ae

                    SHA256

                    146f61db72297c9c0facffd560487f8d6a2846ecec92ecc7db19c8d618dbc3a4

                    SHA512

                    43dd159f9c2eac147cbff1dda83f6a83dd0c59d2d7acac35ba8b407a04ec9a1110a6a8737535d060d100ede1cb75078cf742c383948c9d4037ef459d150f6020

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_turkish.wnry

                    Filesize

                    41KB

                    MD5

                    531ba6b1a5460fc9446946f91cc8c94b

                    SHA1

                    cc56978681bd546fd82d87926b5d9905c92a5803

                    SHA256

                    6db650836d64350bbde2ab324407b8e474fc041098c41ecac6fd77d632a36415

                    SHA512

                    ef25c3cf4343df85954114f59933c7cc8107266c8bcac3b5ea7718eb74dbee8ca8a02da39057e6ef26b64f1dfccd720dd3bf473f5ae340ba56941e87d6b796c9

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\msg\m_vietnamese.wnry

                    Filesize

                    91KB

                    MD5

                    8419be28a0dcec3f55823620922b00fa

                    SHA1

                    2e4791f9cdfca8abf345d606f313d22b36c46b92

                    SHA256

                    1f21838b244c80f8bed6f6977aa8a557b419cf22ba35b1fd4bf0f98989c5bdf8

                    SHA512

                    8fca77e54480aea3c0c7a705263ed8fb83c58974f5f0f62f12cc97c8e0506ba2cdb59b70e59e9a6c44dd7cde6adeeec35b494d31a6a146ff5ba7006136ab9386

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\r.wnry

                    Filesize

                    864B

                    MD5

                    3e0020fc529b1c2a061016dd2469ba96

                    SHA1

                    c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade

                    SHA256

                    402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c

                    SHA512

                    5ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\s.wnry

                    Filesize

                    2.9MB

                    MD5

                    ad4c9de7c8c40813f200ba1c2fa33083

                    SHA1

                    d1af27518d455d432b62d73c6a1497d032f6120e

                    SHA256

                    e18fdd912dfe5b45776e68d578c3af3547886cf1353d7086c8bee037436dff4b

                    SHA512

                    115733d08e5f1a514808a20b070db7ff453fd149865f49c04365a8c6502fa1e5c3a31da3e21f688ab040f583cf1224a544aea9708ffab21405dde1c57f98e617

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\t.wnry

                    Filesize

                    64KB

                    MD5

                    5dcaac857e695a65f5c3ef1441a73a8f

                    SHA1

                    7b10aaeee05e7a1efb43d9f837e9356ad55c07dd

                    SHA256

                    97ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6

                    SHA512

                    06eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\taskdl.exe

                    Filesize

                    20KB

                    MD5

                    4fef5e34143e646dbf9907c4374276f5

                    SHA1

                    47a9ad4125b6bd7c55e4e7da251e23f089407b8f

                    SHA256

                    4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79

                    SHA512

                    4550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\taskse.exe

                    Filesize

                    20KB

                    MD5

                    8495400f199ac77853c53b5a3f278f3e

                    SHA1

                    be5d6279874da315e3080b06083757aad9b32c23

                    SHA256

                    2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d

                    SHA512

                    0669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4

                  • C:\Users\Admin\Downloads\Ransomware.WannaCry\u.wnry

                    Filesize

                    240KB

                    MD5

                    7bf2b57f2a205768755c07f238fb32cc

                    SHA1

                    45356a9dd616ed7161a3b9192e2f318d0ab5ad10

                    SHA256

                    b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25

                    SHA512

                    91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

                  • memory/1552-709-0x0000000010000000-0x0000000010010000-memory.dmp

                    Filesize

                    64KB

                  • memory/2332-2048-0x0000000074090000-0x0000000074112000-memory.dmp

                    Filesize

                    520KB

                  • memory/2332-2051-0x0000000074040000-0x0000000074062000-memory.dmp

                    Filesize

                    136KB

                  • memory/2332-2049-0x0000000073D10000-0x0000000073F2C000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/2332-2052-0x00000000008E0000-0x0000000000BDE000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/2332-2050-0x0000000073F30000-0x0000000073FB2000-memory.dmp

                    Filesize

                    520KB

                  • memory/2332-2060-0x0000000073F30000-0x0000000073FB2000-memory.dmp

                    Filesize

                    520KB

                  • memory/2332-2055-0x00000000008E0000-0x0000000000BDE000-memory.dmp

                    Filesize

                    3.0MB

                  • memory/2332-2061-0x0000000073D10000-0x0000000073F2C000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/2332-2059-0x0000000073FC0000-0x0000000074037000-memory.dmp

                    Filesize

                    476KB

                  • memory/2332-2058-0x0000000074040000-0x0000000074062000-memory.dmp

                    Filesize

                    136KB

                  • memory/2332-2057-0x0000000074070000-0x000000007408C000-memory.dmp

                    Filesize

                    112KB

                  • memory/2332-2056-0x0000000074090000-0x0000000074112000-memory.dmp

                    Filesize

                    520KB

                  • memory/2332-2071-0x00000000008E0000-0x0000000000BDE000-memory.dmp

                    Filesize

                    3.0MB