Resubmissions

11-01-2025 16:57

250111-vgpnrstpfy 6

11-01-2025 16:49

250111-vbvb3atnfx 10

11-01-2025 12:33

250111-prnxbssjal 6

11-01-2025 12:28

250111-pnkeqsyqfv 7

11-01-2025 11:49

250111-nzhvls1meq 7

11-01-2025 11:43

250111-nvw7faylay 6

11-01-2025 11:42

250111-nvdebs1lhk 6

11-01-2025 11:40

250111-ns1f3s1len 6

11-01-2025 11:38

250111-nrxc2a1ldk 6

Analysis

  • max time kernel
    88s
  • max time network
    80s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    11-01-2025 12:28

General

  • Target

    https://github.com/kh4sh3i/Ransomware-Samples

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/kh4sh3i/Ransomware-Samples
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffc8c5c46f8,0x7ffc8c5c4708,0x7ffc8c5c4718
      2⤵
        PID:4216
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
        2⤵
          PID:3396
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:332
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
          2⤵
            PID:852
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
            2⤵
              PID:4500
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
              2⤵
                PID:1456
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:8
                2⤵
                  PID:4516
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                  2⤵
                  • Drops file in Program Files directory
                  PID:560
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x118,0x110,0x14c,0x114,0x7ff7b8a35460,0x7ff7b8a35470,0x7ff7b8a35480
                    3⤵
                      PID:420
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2012
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6076 /prefetch:8
                    2⤵
                      PID:3856
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:1
                      2⤵
                        PID:2392
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4760
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:1
                        2⤵
                          PID:3820
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:1
                          2⤵
                            PID:2256
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:1
                            2⤵
                              PID:5188
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17157628804446509743,1327573935745933576,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6900 /prefetch:1
                              2⤵
                                PID:5196
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1180
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:5000
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:2552
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:5760
                                  • C:\Users\Admin\Downloads\Ransomware.Vipasana\0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe
                                    "C:\Users\Admin\Downloads\Ransomware.Vipasana\0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe"
                                    1⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5876
                                    • C:\Users\Admin\AppData\Local\Temp\0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe
                                      "C:\Users\Admin\AppData\Local\Temp\0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • Drops file in Program Files directory
                                      • System Location Discovery: System Language Discovery
                                      PID:6040
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5344
                                  • C:\Windows\SysWOW64\mshta.exe
                                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Downloads\LimitFormat.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                    1⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:6056

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    b03d78ec6b6f6bfc8ce2f6e81cd88647

                                    SHA1

                                    014cb7dc4aa1bc5d2cb4ec25ec58470baf5b6741

                                    SHA256

                                    983928a84fcf0791614cc3d17d92d62ffbed0bf0f141d7544d0cc762977a3905

                                    SHA512

                                    4699916bdfa5776d72ad2643fad072a7a19783900608290bd1246a19624d61b58a1d80eceb74215b7198aaf04c526fa8703d38f3c5fdcc1add19b87508685ce0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    95ba0df0c4c417ae5a52c277e5f43b64

                                    SHA1

                                    7c3bf3447551678f742cc311cd4cf7b2a99ab3be

                                    SHA256

                                    fdaa82c65558793b81117a66acd5645d4072f6b71f164ed2717a17cab6e727ea

                                    SHA512

                                    fcb35a1949664f218ae40c25fd6eaefc4ba6417034a522f0800c50ee78e530c33080faa73ff9ea82f35749d404d6b9c94fc7e8e224689503e699a5ec2b0d5abb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    1KB

                                    MD5

                                    f1981cf1748a0725cbc59bff577c8373

                                    SHA1

                                    4b60db9a8bc59f0a2d79449db7721185db628776

                                    SHA256

                                    470b5ed42c7a528c4c8bd49728bebc12ba5d94a607bcd2ef5a565455f72cb85d

                                    SHA512

                                    7688b0c104599ea95c254f946ea765f628a5cecc8d86c454d5fdfd3da9a694cf8292ac3ae92b8ab67818526e0b73decd8a9fa5617fdd773e47418df5e12013f0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    48B

                                    MD5

                                    763bee87c176c606900ae0ae4c23b628

                                    SHA1

                                    43d20c3106cc880f4e3270aace8f00e3f512ceca

                                    SHA256

                                    9b557bb01fc1e075eba98fde9a6df8f6523a2e2fbbc33d82aff36fc30e898281

                                    SHA512

                                    9f63fe4714c5dbf89368fa36f0840bd365579217ac938aaecad3de114b96727d39b48f875bd0b58f8e7751b77718ce4958f6fbbabc303d119d88d62ab7858226

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                    Filesize

                                    70KB

                                    MD5

                                    e5e3377341056643b0494b6842c0b544

                                    SHA1

                                    d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                    SHA256

                                    e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                    SHA512

                                    83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    579B

                                    MD5

                                    46fa4f5f7344089589d117bd7599b3a9

                                    SHA1

                                    b6cc1fe19e527d4a372c97e4d195ed94eee40030

                                    SHA256

                                    223280d95a13f1af6af06459bbf230874500c212a2e16f63914eff3f22e8b57a

                                    SHA512

                                    6b680aedde7e806802652aab9ab31cb21438bc8756b063955e6f03bbbdf1273f7d47c40ec1a19fe27537afeb8d6cc219a246d31f7c6822b481649fe296e2a45c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe5884ac.TMP

                                    Filesize

                                    59B

                                    MD5

                                    2800881c775077e1c4b6e06bf4676de4

                                    SHA1

                                    2873631068c8b3b9495638c865915be822442c8b

                                    SHA256

                                    226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                    SHA512

                                    e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    88070a96efe6bb57d45b717c60b2e6c3

                                    SHA1

                                    0985ea987006be4c20bbb660e262f270d0036889

                                    SHA256

                                    0d7e86b61530f9498f5be189f08338c44089c674ce1fc01f5dd57e5a3e945595

                                    SHA512

                                    58156a7b02670f05883e065e119b895424d3cf65447fd7d8f0f25d742216833b2fc85c925bf5d1b13a0425a74148fb01aba3f33b2d9e960307a5e072334bda03

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    2292a469df4695e8072eeeea5bb76742

                                    SHA1

                                    01258f837599365e53ee158f98cb39d23ed7eb76

                                    SHA256

                                    26a1ec501dd49ac944df552908aa5ff72842d1f647ec7c17595776056ed84556

                                    SHA512

                                    b374325363d17767322ecbd31612531c3f682941e66b9692359bc918a9ec90427e195763c2ac1add4d8498671fede9d3423cf91cccf543bfdd9032cd23b9422c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    c731a49cd5ee428cd2217f92c0d078cc

                                    SHA1

                                    2a816bda9767a70fe46aadf85c510446c78eb226

                                    SHA256

                                    97f0ead043d7a7d1083ba044caf795c5f3b372eb85c1b1fef7e143bb7c23bd16

                                    SHA512

                                    6d07c539f1197a8b31e263e57c51d65a85337819a1ebd2e984bf5956907fcd008c5c60a1cb18dbf716a37a8bd8994f70218294ca976c7dbde63a4864ce3c44b4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                    Filesize

                                    24KB

                                    MD5

                                    0493f44576fd7d9b6216b7387a26543e

                                    SHA1

                                    47d35c7f2990ec4668ecf1c01e0e5f623153a3f3

                                    SHA256

                                    0679b6900e2118e17164159f449fdc1f6bf20c0cc0b056cc9aedfae42a830ca8

                                    SHA512

                                    a519962ffb281d471bcf63c0bf75bed19d4eeac591cf6bf8565af14dde1d57fe8cabfc05bec52b2087ce8c6f637dbefb438ce22054895dc116b31bffa18e9cd3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                    Filesize

                                    24KB

                                    MD5

                                    1cc3bc2b1c52831cc0b972d856888e8c

                                    SHA1

                                    9ffa8cf55aa29f6cbdd5ec39b1b33938b29e9990

                                    SHA256

                                    a8f894b23c518e04d94f1bb51343443de8121366171d2f05441283dbb1cfdd2c

                                    SHA512

                                    85bd6789da57c911f9cc35929ab302829614a4f03b3de30e28ab16558279ed02200a7db802c9bcd6b2e5886ea3c323d6a39eb8c3ee309d8b5702be65dab7c3dd

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                                    Filesize

                                    41B

                                    MD5

                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                    SHA1

                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                    SHA256

                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                    SHA512

                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    285853d69707317d721cdfdedbcf915e

                                    SHA1

                                    5f90da22fbb4e640a54e1ed8d88ab26be8e3101a

                                    SHA256

                                    24d063e8bc1700e6e0d8a70c5d030477aac04948359460799d72ccc494c2e87b

                                    SHA512

                                    10793150d289fb9830bda7ade01a347378ffee3a521bc0eea54db016502478711101193ad072e84e5d3f5b12faac834077e21ebd8ba23030fd0467c17a6ff716

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    9faf65b6f43db4341085c432794bfc9a

                                    SHA1

                                    5400489f9ed74cd47bb88a9a8888be721bee623a

                                    SHA256

                                    fef962b1e85f8cbff7845465015ec07f81d9e455ab0a62c49f2e213911dc9aca

                                    SHA512

                                    1379c91a5f19a667077f255146e07c9fcb055fe1d018cd998f0168de6f3f5fc523a274eb43365bcf0555323bf45e6eba9c7e5f6248a3200f52e28c0270c1ec1b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57c63e.TMP

                                    Filesize

                                    1KB

                                    MD5

                                    d0f44c8f3a07ba190610620c00f30bea

                                    SHA1

                                    b15b842c6c0cd24bcb170e4b7817faba7bf78408

                                    SHA256

                                    1d0d674f6b8d51d5d26fdb6454469205499ed8a93e19287de576b50f55a71ed7

                                    SHA512

                                    a486227de0e3035d31be9da1fc14ec78eceaff8a3e825777308aae325b9bba980f0afbe10bd2c13c29edef8faec09b00f4685d16fc262e17626f71026b6cdf98

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    206702161f94c5cd39fadd03f4014d98

                                    SHA1

                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                    SHA256

                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                    SHA512

                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    2dd300b7e47e85ddb9ca12e81a723175

                                    SHA1

                                    718a22a41ec0218004d222086b0a03ba8c9b899d

                                    SHA256

                                    cde93bd629be0b0601f1bddcc51f627cc962f71fdfe626b89de7f0f21b5d0bb9

                                    SHA512

                                    d79790b2a0f8e70a1ea46d8d46d9b38c3fbccccf5ca808942129c29ce68ca89efc92f5353389e9795a6a7defd3f56707930653b74fbbf35847cc7f12ac9bb8aa

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    8KB

                                    MD5

                                    d6a80d164e1440f3ec838997e9ad3083

                                    SHA1

                                    89c40ff483871ce0bdecb49019964e613cd30361

                                    SHA256

                                    08296038e2445055e544e32032d4b00f6103f5fb8104e5f964598882e01f9f0e

                                    SHA512

                                    cee7b24f87e0c51efd1a8ebf375b7f8ae898b4b1e6dc3a6d6cab92d44141015b935d4bd6111e76e91b2116248462735138ce2686849ee96ddf5e8b78d509b298

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    01bbd06c9c705500570dfb412b28bee8

                                    SHA1

                                    57b071502e49ffd893e8d5aa8c6f65e5ea5898ed

                                    SHA256

                                    f4879138c67babfd004d50abc61daa43b490e386d46ace79151f7ded7820f0ca

                                    SHA512

                                    a6165aa08e1a7b0844dba6054a79374543b4bf6dcfc2a0b95abe0c2effc12240b69015cdedd7845baa269eca05c0c97dc5c95916e25a7e378b6374d7de02eb8e

                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{b062d1b0-65a2-48d2-be2f-48414d8b0af4}\0.2.filtertrie.intermediate.txt

                                    Filesize

                                    19KB

                                    MD5

                                    2518e99f79725ebdf59d8c42d42f0c1f

                                    SHA1

                                    9e079d1dfa863ace083ab3d8416357216f88bb5e

                                    SHA256

                                    8f5193f4cefbe6962e959c32e7bebf5a520b43ff5c83ed992355df6423b9bd96

                                    SHA512

                                    346b739cbbc47534d3804a7ddf98f37f62f93e5bf36b35193510a870a68a6cdddaeeeae9cd9041e13632dcc9dbf28ffa94f64ffaca223922e1c7d5b897c1aea7

                                  • C:\Users\Admin\AppData\Local\Temp\0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab.exe

                                    Filesize

                                    370KB

                                    MD5

                                    2aea3b217e6a3d08ef684594192cafc8

                                    SHA1

                                    3a0b855dd052b2cdc6453f6cbdb858c7b55762b0

                                    SHA256

                                    0442cfabb3212644c4b894a7e4a7e84c00fd23489cc4f96490f9988e6074b6ab

                                    SHA512

                                    ea83fcb7465e48445f2213028713c4048ac575b9c2f7458a014c495bddb280be553a22b1056284efad7dd55c2a7837096755206581c67bb0183e4ac42160011a

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                    Filesize

                                    3KB

                                    MD5

                                    13624fb19cf2057201098bc76fdac664

                                    SHA1

                                    5da10cfbbf4b89f046d6bc4f6f853f5f3d97f255

                                    SHA256

                                    cfe303a253bcbe1b6696cfaf3b84f51890ba6d5bf0b96963884514f055c9445e

                                    SHA512

                                    34401570619926a1c2a502f57f846dc18727d33017686d9db65fa27f0d94922012e622f7d461c251f99d03b540739629d1d2565a64b3a898832df4d95b9fc7e0

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                    Filesize

                                    3KB

                                    MD5

                                    50ec97c52d4d9da5988b6f05bede713f

                                    SHA1

                                    611a618401787c55de6074858afc896a039366e1

                                    SHA256

                                    7f4cc5e11083726730671c1cb73889e39d6578e5cd53fe42c4ba31ea9cfe5884

                                    SHA512

                                    6008fc870252c2c5a5701727f7bf461ac10af8c6aea605f05c3805f8942b5d3ba8de67dfb8427426f2d926b55debe800b846a4250de22307f725cb133f4b74c0

                                  • C:\Users\Admin\Downloads\Ransomware.Vipasana.zip

                                    Filesize

                                    638KB

                                    MD5

                                    8d2c4c192772985776bacfd77f7bc4d9

                                    SHA1

                                    3b923b911d443e321e551f26c9588b16a994d52e

                                    SHA256

                                    1733b199a7063443c167e3caeae7dda2315f590341ea2152a9b132e1ad8e94a8

                                    SHA512

                                    6c24f2fe498cf38e3f3d66b62915e6fbc8c2746a1d4c3c3de270f994b02e1369b9540099c12d150712574ececbe63c8c9f28877d8aa4557fbbb7890d5a0de6c1

                                  • memory/5344-427-0x00000215C5A10000-0x00000215C5A11000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5344-426-0x00000215C5900000-0x00000215C5901000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5344-407-0x00000215BD560000-0x00000215BD570000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5344-391-0x00000215BD460000-0x00000215BD470000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/5344-425-0x00000215C5900000-0x00000215C5901000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5344-423-0x00000215C58D0000-0x00000215C58D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5876-389-0x0000000000400000-0x0000000000464000-memory.dmp

                                    Filesize

                                    400KB

                                  • memory/6040-808-0x0000000000400000-0x0000000000464000-memory.dmp

                                    Filesize

                                    400KB

                                  • memory/6040-1361-0x0000000000400000-0x0000000000464000-memory.dmp

                                    Filesize

                                    400KB

                                  • memory/6040-1671-0x0000000000400000-0x0000000000464000-memory.dmp

                                    Filesize

                                    400KB