Resubmissions

23/02/2025, 00:49

250223-a6ke5asne1 3

23/02/2025, 00:46

250223-a46kkssndw 8

23/02/2025, 00:45

250223-a35lwssncv 8

23/02/2025, 00:43

250223-a3bntatlbm 8

22/02/2025, 22:44

250222-2n3yaszqex 10

22/02/2025, 22:42

250222-2mvwaszqcx 8

22/02/2025, 22:39

250222-2k9axa1mgm 10

22/02/2025, 22:36

250222-2jmqhs1mem 8

22/02/2025, 22:24

250222-2bh3cszncz 8

Analysis

  • max time kernel
    130s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2025, 22:44

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Downloads MZ/PE file 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 4 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa24a546f8,0x7ffa24a54708,0x7ffa24a54718
      2⤵
        PID:940
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
        2⤵
          PID:1996
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:3272
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:8
          2⤵
            PID:440
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
            2⤵
              PID:1860
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              2⤵
                PID:1960
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:8
                2⤵
                  PID:4416
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:116
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:1
                  2⤵
                    PID:2272
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                    2⤵
                      PID:4732
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5796 /prefetch:8
                      2⤵
                        PID:4540
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                        2⤵
                          PID:4216
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6320 /prefetch:8
                          2⤵
                            PID:960
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:1
                            2⤵
                              PID:3300
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6484 /prefetch:1
                              2⤵
                                PID:4888
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1444
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7727491627760989340,2740443939674685056,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5460 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4680
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4688
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:5108
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:3648
                                  • C:\Users\Admin\Downloads\WannaCry.exe
                                    "C:\Users\Admin\Downloads\WannaCry.exe"
                                    1⤵
                                    • Drops startup file
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • System Location Discovery: System Language Discovery
                                    PID:3280
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c 98491740264314.bat
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:716
                                      • C:\Windows\SysWOW64\cscript.exe
                                        cscript //nologo c.vbs
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:400
                                    • C:\Users\Admin\Downloads\!WannaDecryptor!.exe
                                      !WannaDecryptor!.exe f
                                      2⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4956
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im MSExchange*
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2820
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im Microsoft.Exchange.*
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3608
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im sqlserver.exe
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4944
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im sqlwriter.exe
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1352
                                    • C:\Users\Admin\Downloads\!WannaDecryptor!.exe
                                      !WannaDecryptor!.exe c
                                      2⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of SetWindowsHookEx
                                      PID:400
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd.exe /c start /b !WannaDecryptor!.exe v
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4124
                                      • C:\Users\Admin\Downloads\!WannaDecryptor!.exe
                                        !WannaDecryptor!.exe v
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4980
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3352
                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                            wmic shadowcopy delete
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4336
                                    • C:\Users\Admin\Downloads\!WannaDecryptor!.exe
                                      !WannaDecryptor!.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Sets desktop wallpaper using registry
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4916
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4656

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    0d6b4373e059c5b1fc25b68e6d990827

                                    SHA1

                                    b924e33d05263bffdff75d218043eed370108161

                                    SHA256

                                    fafcaeb410690fcf64fd35de54150c2f9f45b96de55812309c762e0a336b4aa2

                                    SHA512

                                    9bffd6911c9071dd70bc4366655f2370e754274f11c2e92a9ac2f760f316174a0af4e01ddb6f071816fdcad4bb00ff49915fb18fde7ee2dabb953a29e87d29e4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    a4852fc46a00b2fbd09817fcd179715d

                                    SHA1

                                    b5233a493ea793f7e810e578fe415a96e8298a3c

                                    SHA256

                                    6cbb88dea372a5b15d661e78a983b0c46f7ae4d72416978814a17aa65a73079f

                                    SHA512

                                    38972cf90f5ca9286761280fcf8aa375f316eb59733466375f8ba055ce84b6c54e2297bad9a4212374c860898517e5a0c69343190fc4753aafc904557c1ea6dc

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1d4baa5e-0be2-4471-968e-3385e0c1ce43.tmp

                                    Filesize

                                    6KB

                                    MD5

                                    ff0972a4dad8d6b6b123777ab7196e7b

                                    SHA1

                                    017bbbc630945cf647f70dc1aa2c7b5c5ecadd49

                                    SHA256

                                    40000308e72b5ddc2f4e015fea3037a3c28546b6d1c6a40fb533dbcf8a4f3722

                                    SHA512

                                    535b0ee0e1b2c6eef21edec8b02162028282f3d47df40d2cb17c4bee8b725a0fbffc8ea1ddcde25520fc6821a29b8745c4627834dfe3469ed050abfc5f18d8f5

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    1KB

                                    MD5

                                    efbb7c681a90a01161cc5c20b8433dd6

                                    SHA1

                                    2037a673df274b78590c30e8543c16207ad58c24

                                    SHA256

                                    cab9508ff2a78817bb9ccb54b9c97dc528ce128480d045ef74daf1be8f64815c

                                    SHA512

                                    5021153b6400eae456436d0117d64edc6185ba62374f42c23e691bad759ea8e25790994fc464c4448a8aac2b31d055b9a0c3d0d7298eea02c93b404bb3d3b731

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    579B

                                    MD5

                                    0170c30b0f125bede7f88c82edc2b0af

                                    SHA1

                                    f6e5afbb5d657f6882b0e285c0cdfeee31c24d76

                                    SHA256

                                    aa9109d46652bfd48f41db8cc18992144b90580d93b2d111f0c6b5954ad71311

                                    SHA512

                                    02b0a5fb22290cd840a416139235128afdea2d612c1266a2813c0e122ba18bd398f3b8bc04f4cf789d5b3a68b26f957c34fa31746c916557f40260c819b42b98

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    efc86784e4a0da56a07371edcd133e13

                                    SHA1

                                    e7b832ed2c0b87b9070ab5185561071cfb83073c

                                    SHA256

                                    43a34e706a9d4f804888774cc705ddba1b3cbdec8b5cbc854820a39ce504e60b

                                    SHA512

                                    159a81e9448df8f36c047514158495e5c593c96caa1679b7b3c1dcf1c33852723f2fbee54a7855013d5d7352833ffe61616b2260f2f11a0e228b79f94359bd75

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    8816a749e052de7074855eeb7cf74850

                                    SHA1

                                    e6918d4d3eea4f96789ef36e97eff043dbbc903e

                                    SHA256

                                    dade306f4b1058835cb8e0cf5fc95a4b96e3de6c3381f449b8faddffa267eac3

                                    SHA512

                                    dd3e5d751e14d98cf67491d840f060adf2972ef9c6487e178147f21ab485396a04a5d78c84cd872e7ccbab7d625452f90a3c602daf2bbfc7927503551ebd7db7

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58b9f4.TMP

                                    Filesize

                                    874B

                                    MD5

                                    d70502b4281d7887bc21f816c2748269

                                    SHA1

                                    6958079319498a5b0572e5f8630059583bd49edf

                                    SHA256

                                    3d0735df010543e0240310cdf9b390fb2d3652fd5444cbc88001d21fb6589c56

                                    SHA512

                                    c32d686e38e5a0b7503ca0882a7c2b654e61ca20af19fc0b6fc4ed43b953bcdd92f514f655b1b71e9ff0c658fcb47e0bb0765887afe107ebc6486d05142afdec

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b38bf074-8361-478f-bc5e-e270173e26ec.tmp

                                    Filesize

                                    1KB

                                    MD5

                                    551abe6b5a9d3654cedc3f639c8a13c2

                                    SHA1

                                    ae028e198ca707fa601319c1ce0cc29e94809ab5

                                    SHA256

                                    bfa585b121efff018a0ed750273632fb6b7ccd50a47e5471ef29e9aa5b8d2669

                                    SHA512

                                    59cc5698462f41fbdd60583231b232d4bd58f64d18cf718d0a112f35e1a4f17ec27506287147096955387a7b64953cd9c04d089618979a8acfd727aabb2d0520

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    ac627ac4896bc9bd2d7f9eaa6f75194a

                                    SHA1

                                    1211226d03a2c3629235ad2a6e3ec09576acacc0

                                    SHA256

                                    ff7fdfd2a2fb85025e743b89b8763dd023032fbd8a1980adc4c3bfb7c4fcde65

                                    SHA512

                                    73eccce1a5c88a48d151624d19bd78554931264e453101bbd7deea1e2ef67564c191035b675359e35700c71c80778d59aa51dcb42aac71385b1f06821e9517e3

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    cfc92a19833facee212a5122c2b65787

                                    SHA1

                                    d3d5b1a4e71f103b0bb1c9f2a499fa7e8257a48f

                                    SHA256

                                    40fc80d882d30bfc1699e78bfc067be850c66ff500eaeb01dcb5112a74fa28df

                                    SHA512

                                    42aef41d971efeb3e791f1d1084e2030303c3a067632b063882ae3fb5e455d3cf5bcf0899465cf2ae402cc2699cea057ec3898ec05c0993e01693036a3c92a0b

                                  • C:\Users\Admin\Downloads\!Please Read Me!.txt

                                    Filesize

                                    797B

                                    MD5

                                    afa18cf4aa2660392111763fb93a8c3d

                                    SHA1

                                    c219a3654a5f41ce535a09f2a188a464c3f5baf5

                                    SHA256

                                    227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0

                                    SHA512

                                    4161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b

                                  • C:\Users\Admin\Downloads\!WannaDecryptor!.exe.lnk

                                    Filesize

                                    590B

                                    MD5

                                    72c4d4e09662b6c0bdb085f7d76c7a1c

                                    SHA1

                                    1a5c4c901b443efbee7bfe9e89ad7400b4ad7dd4

                                    SHA256

                                    bade990b52ed8ea51a3351f5ebfa49cd9f05cf69391a655bcdd2479fa224f917

                                    SHA512

                                    42c28516b6090c49c6bcee5a1b2098a91642d690c44be5994dd587c676047adabb1387c5752acb8c328a554700e90a09fdcdc4326980aeecabaf6e4c84c4a7d9

                                  • C:\Users\Admin\Downloads\00000000.res

                                    Filesize

                                    136B

                                    MD5

                                    0ac9141a1369fa0ff75230d064dae4ba

                                    SHA1

                                    70c24dd498cc3dd6927d1ff4e2b8d5b7f663703b

                                    SHA256

                                    b51b7a7249540394f15979bd9bdcf22852c4d401160587b69a7db7dd4526e9b6

                                    SHA512

                                    8bf9d82b36122167b0681d2661cc8f8e45a55f953b058e8cc3adf387f3feb66864db1cfe632773ee294cc806fe6a3fdadee6de87129b8a1c11bed06f4548545a

                                  • C:\Users\Admin\Downloads\00000000.res

                                    Filesize

                                    136B

                                    MD5

                                    f5a0c3eddc90e31ec9a24b6c8af8c158

                                    SHA1

                                    4f4fa22360d067640719f54e07bb51b9167958d9

                                    SHA256

                                    8e777fc7b4b541542c3ea903bb76fb3b0cd069026be29b1eaa8b67c851136643

                                    SHA512

                                    be32ad128461a563699afc3ab905857ff7c65eb6ba5fe72f9e1ca60fe266a1d65f4dddbd4bd924fd7465527bcbc4bb9ecc8f33e0f0eea279817a4bc778f11d94

                                  • C:\Users\Admin\Downloads\00000000.res

                                    Filesize

                                    136B

                                    MD5

                                    373ed078c2d736cd3e7938466b7d5633

                                    SHA1

                                    7f990b9026ccddd4c5c3f804e6b42f7cc9f3638e

                                    SHA256

                                    20ac6db5542236eacc39404bb3d7dcf35c1ba0f2f556a6383771c69d7d654f5e

                                    SHA512

                                    37f28279de292c84d8647c60d447cfcf5ddb2a5045bc47b412ee96c9e2c7504776d41865a3c9aad8b5298908cdf044af044a969188358ea057ebb3c45989f0d0

                                  • C:\Users\Admin\Downloads\00000000.res

                                    Filesize

                                    136B

                                    MD5

                                    5aa78f6431659af9fe8be8818da64eb1

                                    SHA1

                                    329152d8505523b16adb2e680dfb116a9fe86d63

                                    SHA256

                                    6424b3a3ba8016505a28e3016b283804eb6851c9966b9a32cc215ce013e45a7a

                                    SHA512

                                    72b11583fe662db10d9eb43cf2576dcc8411f1a2b2e5b392c860f4d4ea4f9b935a1d584dfe09566b31c98a320d4619a46236a4349fe190e082d095aececc3891

                                  • C:\Users\Admin\Downloads\98491740264314.bat

                                    Filesize

                                    318B

                                    MD5

                                    a261428b490a45438c0d55781a9c6e75

                                    SHA1

                                    e9eefce11cefcbb7e5168bfb8de8a3c3ac45c41e

                                    SHA256

                                    4288d655b7de7537d7ea13fdeb1ba19760bcaf04384cd68619d9e5edb5e31f44

                                    SHA512

                                    304887938520ffcc6966da83596ccc8688b7eace9572982c224f3fb9c59e6fb2dcaa021a19d2aae47346e954c0d0d8145c723b7143dece11ac7261dc41ba3d40

                                  • C:\Users\Admin\Downloads\Unconfirmed 854195.crdownload

                                    Filesize

                                    224KB

                                    MD5

                                    5c7fb0927db37372da25f270708103a2

                                    SHA1

                                    120ed9279d85cbfa56e5b7779ffa7162074f7a29

                                    SHA256

                                    be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844

                                    SHA512

                                    a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

                                  • C:\Users\Admin\Downloads\c.vbs

                                    Filesize

                                    201B

                                    MD5

                                    02b937ceef5da308c5689fcdb3fb12e9

                                    SHA1

                                    fa5490ea513c1b0ee01038c18cb641a51f459507

                                    SHA256

                                    5d57b86aeb52be824875008a6444daf919717408ec45aff4640b5e64610666f1

                                    SHA512

                                    843eeae13ac5fdc216b14e40534543c283ecb2b6c31503aba2d25ddd215df19105892e43cf618848742de9c13687d21e8c834eff3f2b69a26df2509a6f992653

                                  • C:\Users\Admin\Downloads\c.wry

                                    Filesize

                                    628B

                                    MD5

                                    0afc04bf1f0011400bd845eb689f297e

                                    SHA1

                                    641dd50995cb475722d26116b7d7b16b91aa2b61

                                    SHA256

                                    b4f816d111084193cf046ddbc0c2bb9d8660ce4f332c6f2dd4ea2b1d31770133

                                    SHA512

                                    9b7994ae3d701755fb766f664ceda3bcc4bfd5b50dfb76035ef70e9c9a31e837bb46fd1a4871aaecbdf8ebcfea0a37fd0087db24c45017b0ef5a090d055ea61d

                                  • C:\Users\Admin\Downloads\m.wry

                                    Filesize

                                    42KB

                                    MD5

                                    980b08bac152aff3f9b0136b616affa5

                                    SHA1

                                    2a9c9601ea038f790cc29379c79407356a3d25a3

                                    SHA256

                                    402046ada270528c9ac38bbfa0152836fe30fb8e12192354e53b8397421430d9

                                    SHA512

                                    100cda1f795781042b012498afd783fd6ff03b0068dbd07b2c2e163cd95e6c6e00755ce16b02b017693c9febc149ed02df9df9b607e2b9cca4b07e5bd420f496

                                  • C:\Users\Admin\Downloads\u.wry

                                    Filesize

                                    236KB

                                    MD5

                                    cf1416074cd7791ab80a18f9e7e219d9

                                    SHA1

                                    276d2ec82c518d887a8a3608e51c56fa28716ded

                                    SHA256

                                    78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df

                                    SHA512

                                    0bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5

                                  • memory/3280-248-0x0000000010000000-0x0000000010012000-memory.dmp

                                    Filesize

                                    72KB