Analysis
-
max time kernel
1025s -
max time network
1016s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2025, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
Decoding Shakespeare’s.pptx
Resource
win11-20250313-en
General
-
Target
Decoding Shakespeare’s.pptx
-
Size
26.7MB
-
MD5
c0d157a70f8da22f3606392c60419bca
-
SHA1
7ccca32337a71c5c3429bcff29771bf070625cd3
-
SHA256
ab9741d643dd577756def8f497aa23aa95ecb9833f6433ac4a3d5c79bf2c39e4
-
SHA512
aa0d8e46e40890607a29ab36fdc6894bba9e18ad818dc5e5fa8e2a2e8139dc10e88e810269989435781fcf73caf8e336c78e9e182e4d550b888caba64134f069
-
SSDEEP
393216:V+DjyULN9bBGWNMbD+ascJIxXkLjaJX85TjjAw4+MpajxbZipkMmTH0jZSmKdEku:V8PN9NTeuC8UkX1pEBIpbu4gBdSDN
Malware Config
Extracted
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Windows\\Error file remover\\fatalerror.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Windows\\Error file remover\\fatalerror.exe" msiexec.exe -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDB429.tmp [email protected] File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDB430.tmp [email protected] -
Executes dropped EXE 18 IoCs
pid Process 2912 taskdl.exe 124 @[email protected] 5220 @[email protected] 2756 taskdl.exe 5024 taskse.exe 5152 @[email protected] 1916 taskdl.exe 5648 taskse.exe 5232 @[email protected] 3840 taskse.exe 4124 @[email protected] 5424 taskdl.exe 1940 taskse.exe 5592 @[email protected] 5564 taskdl.exe 1864 taskse.exe 3796 @[email protected] 812 taskdl.exe -
Loads dropped DLL 32 IoCs
pid Process 1472 [email protected] 1472 [email protected] 2972 MsiExec.exe 2972 MsiExec.exe 2972 MsiExec.exe 2972 MsiExec.exe 2972 MsiExec.exe 2972 MsiExec.exe 2972 MsiExec.exe 2972 MsiExec.exe 2972 MsiExec.exe 2972 MsiExec.exe 5460 MsiExec.exe 2972 MsiExec.exe 1472 [email protected] 2972 MsiExec.exe 3788 [email protected] 3788 [email protected] 1600 MsiExec.exe 1600 MsiExec.exe 1600 MsiExec.exe 1600 MsiExec.exe 1600 MsiExec.exe 1600 MsiExec.exe 1600 MsiExec.exe 1600 MsiExec.exe 1600 MsiExec.exe 1600 MsiExec.exe 5288 MsiExec.exe 1600 MsiExec.exe 3788 [email protected] 1600 MsiExec.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4360 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\jmnnaiwukuh022 = "\"C:\\Users\\Admin\\Downloads\\MalwareDatabase-master\\MalwareDatabase-master\\ransomwares\\WannaCrypt0r\\tasksche.exe\"" reg.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 255 2972 MsiExec.exe 256 1600 MsiExec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: [email protected] File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: [email protected] File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: [email protected] File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: [email protected] File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: [email protected] File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: [email protected] File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: [email protected] File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: [email protected] File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\Q: [email protected] File opened (read-only) \??\I: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: [email protected] File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: [email protected] File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: [email protected] File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: [email protected] File opened (read-only) \??\N: [email protected] File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: [email protected] File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: [email protected] File opened (read-only) \??\B: msiexec.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 144 discord.com 174 discord.com 175 discord.com -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows\Error file remover\fatalerror.exe msiexec.exe File created C:\Program Files (x86)\Windows\Error file remover\Windows Logoff Sound.wav msiexec.exe File opened for modification C:\Program Files (x86)\Windows\Error file remover\Windows Logoff Sound.wav msiexec.exe File opened for modification C:\Program Files (x86)\Windows\Error file remover\fatalerror.exe msiexec.exe -
Drops file in Windows directory 47 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIE53B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1CE2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D03.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF96D3553E06F45FCE.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI1DC2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1E21.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFAFB7E88E2809867D.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Installer\MSIE46B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE56B.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF0786764297589B45.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFB22A38BC6ECB3FDE.TMP msiexec.exe File opened for modification C:\Windows\Tasks\sys.job MsiExec.exe File opened for modification C:\Windows\Installer\e63e393.msi msiexec.exe File created C:\Windows\Installer\e63e38f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE4D9.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFC2F49D2DC3271483.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIE56C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE57E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE765.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE40C.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF959C607D5AC887C1.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIE57D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE62B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1C32.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1CD1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D42.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1F0C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE51A.tmp msiexec.exe File created C:\Windows\Installer\e63e393.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1CF2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D92.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1F8A.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFB543F4F23DEB0FB9.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIE52B.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF2A36EA475A576D8D.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI1C71.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1CA1.tmp msiexec.exe File opened for modification C:\Windows\Installer\e63e38f.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIE509.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C452D4E2-DE24-48B6-B5C3-ACB240A01606} msiexec.exe File created C:\Windows\Tasks\sys.job MsiExec.exe File opened for modification C:\Windows\Installer\MSIE6C8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1D53.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3528 4824 WerFault.exe 136 1948 5912 WerFault.exe 140 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YouAreAnIdiot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YouAreAnIdiot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875369605220736" chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\29 msiexec.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-994669834-3080981395-1291080877-1000\{9950A7CC-DCA8-4883-BDDC-9AA746F2619D} chrome.exe Key created \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\DisplayName = "Chrome Sandbox" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Moniker = "cr.sb.odm3E4D1A088C1F6D498C84F3C86DE73CE49F82A104" chrome.exe Key created \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Children chrome.exe Key created \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-994669834-3080981395-1291080877-1000_Classes\Local Settings chrome.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3320 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\MalwareDatabase-master.zip:Zone.Identifier chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3848 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 4772 chrome.exe 4772 chrome.exe 3608 msiexec.exe 3608 msiexec.exe 3608 msiexec.exe 3608 msiexec.exe 1808 taskhsvc.exe 1808 taskhsvc.exe 1808 taskhsvc.exe 1808 taskhsvc.exe 1808 taskhsvc.exe 1808 taskhsvc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3848 POWERPNT.EXE 5152 @[email protected] -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: 33 1776 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1776 AUDIODG.EXE Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe Token: SeShutdownPrivilege 2768 chrome.exe Token: SeCreatePagefilePrivilege 2768 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe 2768 chrome.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3848 POWERPNT.EXE 3848 POWERPNT.EXE 3848 POWERPNT.EXE 3848 POWERPNT.EXE 2016 MiniSearchHost.exe 3848 POWERPNT.EXE 3848 POWERPNT.EXE 3848 POWERPNT.EXE 5220 @[email protected] 5220 @[email protected] 5152 @[email protected] 5152 @[email protected] 5232 @[email protected] 4124 @[email protected] 5592 @[email protected] 3796 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2768 wrote to memory of 1836 2768 chrome.exe 83 PID 2768 wrote to memory of 1836 2768 chrome.exe 83 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 4924 2768 chrome.exe 85 PID 2768 wrote to memory of 4924 2768 chrome.exe 85 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 5108 2768 chrome.exe 84 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 PID 2768 wrote to memory of 3496 2768 chrome.exe 86 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3860 attrib.exe 2552 attrib.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Decoding Shakespeare’s.pptx" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3848
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2016
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd569fdcf8,0x7ffd569fdd04,0x7ffd569fdd102⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2028,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1432,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2124 /prefetch:112⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2360,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2392 /prefetch:132⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3296,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4196,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4220 /prefetch:92⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4560,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5304,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5316 /prefetch:142⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5552,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5560 /prefetch:142⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5572,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5668 /prefetch:142⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5756,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5772 /prefetch:142⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5668,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5812 /prefetch:142⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5960,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5792 /prefetch:142⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5672,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4148,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5752,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3640,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3652 /prefetch:122⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5580,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6512,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6508 /prefetch:142⤵PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6376,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6544 /prefetch:142⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6488,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6532 /prefetch:142⤵PID:5596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=3696,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6180 /prefetch:92⤵PID:5620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5492,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:5924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6368,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6420 /prefetch:12⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=4264,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:5288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=876,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6540 /prefetch:142⤵
- Modifies registry class
PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=6740,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6668 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6972,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=1192 /prefetch:142⤵PID:5988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=3204,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6468 /prefetch:12⤵PID:6092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=6816,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=1192 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=6640,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6380 /prefetch:12⤵PID:6000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=6468,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=3096,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7128 /prefetch:12⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=6292,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=3580,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:1332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4696,i,949514276287028589,8412931717216165981,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3324 /prefetch:142⤵
- NTFS ADS
PID:5680
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3704
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:436
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004C41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:5340
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1064
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\trojans\YouAreAnIdiot\YouAreAnIdiot.exe"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\trojans\YouAreAnIdiot\YouAreAnIdiot.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 14522⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4824 -ip 48241⤵PID:3428
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\trojans\YouAreAnIdiot\YouAreAnIdiot.exe"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\trojans\YouAreAnIdiot\YouAreAnIdiot.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5912 -s 14242⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5912 -ip 59121⤵PID:5368
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\Winlocker.VB6.Blacksod\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\Winlocker.VB6.Blacksod\[email protected]"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\Winlocker.VB6.Blacksod\[email protected] SETUPEXEDIR=C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\Winlocker.VB6.Blacksod\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:5552
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3608 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0DB59F802AB6641DE956846FDF3510D52⤵
- Loads dropped DLL
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4981987AA30AC7D6971B51F85DEB24D1 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5460
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8C5E799FADAF5A3DB968D9174EB9028A2⤵
- Loads dropped DLL
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7E8EDA90368A4FC89B30CF94CEA505A9 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5288
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\Winlocker.VB6.Blacksod\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\Winlocker.VB6.Blacksod\[email protected]"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3788 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\Winlocker.VB6.Blacksod\[email protected] SETUPEXEDIR=C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\Winlocker.VB6.Blacksod\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\[email protected]"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\[email protected]"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3860
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4360
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 315761743064206.bat2⤵
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs3⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2552
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:124 -
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b @[email protected] vs2⤵
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5220 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- System Location Discovery: System Language Discovery
PID:3792
-
-
-
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskse.exetaskse.exe C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5024
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5152
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "jmnnaiwukuh022" /t REG_SZ /d "\"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\tasksche.exe\"" /f2⤵
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "jmnnaiwukuh022" /t REG_SZ /d "\"C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3320
-
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskse.exetaskse.exe C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5648
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5232
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskse.exetaskse.exe C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4124
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5424
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskse.exetaskse.exe C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5592
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5564
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskse.exetaskse.exe C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3796
-
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5ace2d7c25e905c3de05e4870b793e42e
SHA1638ed150d0b6e0d21482a6ba11e0154fe3662054
SHA2561b0b28adb7f20f45c1cde5f22cfa0058a34bafb1c7c1c7cb062ecb7e31d8ad43
SHA5123b0d120b876ada39b8830e054a4d8bf0fe66fff30146f443b90f015868e8c6e46c1bd6f5a46085387e8b4f769b587caaa7fd4bd19c865e366702cf322cb95782
-
Filesize
101KB
MD5d6718aea8b92e0b087aa2e1479f846be
SHA14ff36f8be8603a9d016fec4e5895298c3a7ce32e
SHA2567a6eb6e906c5e786b8aaa8096835137a3f0ccafe817a42a7669a172d1e1350c1
SHA512a69c5e1ad56865bb903ca83b76e1f8cbbdf417c9154fd89091d0cc02b4a6f78e7366bd497459eb3d62435e9f7996d9095f4e8c40d82ae27ed86216df00476fe9
-
Filesize
724KB
MD5bab1293f4cf987216af8051acddaf97f
SHA100abe5cfb050b4276c3dd2426e883cd9e1cde683
SHA256bc26b1b97eeb45995bbd5f854db19f994cce1bb9ac9fb625eb207302dccdf344
SHA5123b44371756f069be4f70113a09761a855d80e96c23c8cd76d0c19a43e93d1a159af079ba5189b88b5ee2c093099a02b00ea4dc20a498c9c0c2df7dc95e5ddd49
-
Filesize
24KB
MD5e579c5b3c386262e3dd4150eb2b13898
SHA15ab7b37956511ea618bf8552abc88f8e652827d3
SHA256e9573a3041e5a45ed8133576d199eb8d12f8922bbe47d194fef9ac166a96b9e2
SHA5129cf947bad87a701f0e0ad970681767e64b7588089cd9064c72bf24ba6ca0a922988f95b141b29a68ae0e0097f03a66d9b25b9d52197ff71f6e369cde0438e0bb
-
Filesize
649B
MD5aa3b516287c3d7e8636c649cafc3a25c
SHA197727162fa42d4dce87ad603ac40ee323a2bb3bc
SHA256524ef289ea39c438dcb4145bcdf2410a9f79c5b762e66d8ef921a35f4fb444a8
SHA5120ac9867ebe054fc1a928aedbcfc6870ffc36bf272b7368552883be861484db4471c3798e3f0df9563429218b4a19afae943f4e024b0f72cb8c7f99f9a021e539
-
Filesize
63KB
MD51901d2bcbbabee4bbb9804c30642ae2b
SHA1f31774bc12614be681c0b0c7de3ac128f0e932db
SHA25615eba349e5829f11363614b8f3dd9c3d04994586601d3c4c4d8069e0f5655310
SHA512bdb94d7d8cf47b239c61559545b1dd26e05da909fec05d215471388545879cd8ec9e1fea51c04ed43927e2b07b5b80a74f09eb9038c8d9045e4161ea69df215f
-
Filesize
38KB
MD5f53236bc138719b68ccd1c7efb02a276
SHA126b7d3eea5d3b12d0b0e173ebf2af50a7d7e56d6
SHA256787c14f8cc865430c03c96a345044b7c5b8dc8a032511a500d4a42228533acd8
SHA5125485bc7ccce8ec75f60bca3be846086a4bd4466009c8e22da9cdd16bb1154529af2fb2667cd3a97485cc4f6635fb79ac0fdda4f3e1f39f25f6196f708a92d740
-
Filesize
38KB
MD59436affc97843765a966b3568fa7e5ec
SHA17bfda74bb30589c75d718fbc997f18c6d5cc4a0b
SHA2567165713d3e1a610399471a5e93d5677508f62ef072c1151e72273bf4bd54f916
SHA512473ec3a843c33e18d6d194651fe11353fcd03a7959225faeabf8c77484155ea6a7bccb72dbaf2093ed53c408faa3be9f6fc907f7a5ddf8223375f9d09b504456
-
Filesize
72KB
MD57b85ce6d64312e6f0d8f712897a45a66
SHA1431224de66f74e70ae5b37a67260b795352861eb
SHA25603a79fc56e2b58121ca2fe5938be882582ca7c26cc4208ebf777de6220f59fe1
SHA512b22d7680c82a5a45d0094dc16b0983ff59c5e3e0567d2854be14cde6a56af63729a1c4e041223fe26569e92961c49a80d603136e88d60f8f7b78ca1999b4fb3c
-
Filesize
1024KB
MD52f0a611bc468c2cdca8cf36e4c8a6f9b
SHA15f83fcd290ba75e1770da79a5d94d2eb7683a077
SHA256b7e66e90d41137986e948fe0b38bf7d91a62f715199ae4291ee5c5bb4e3ee337
SHA512e33153a07d9cda3014d5877bee8788f3f0204ef0424cb0a0376b265488d8606519bb303739d240427f10cb94e3ab4aa539ebb8ee54b8fe98ef14476981afe48b
-
Filesize
1024KB
MD52a77f614ea89002a0dd61ac267d9b3b8
SHA16cafcf18962230f45b54e7bdb2da3c2d27d176ad
SHA25646dfb6454c0fdd2d9bc390afed8b75240de0bd6999c78e5feb225559868753dc
SHA5122669d513c3b2e3e6e71c147dd1d6b574f511b94933b6c87a273eeab5d17a5053d1d69f534e564f4f52cb25ecdea542e3924afcc2efa7f53d844cffd9ca07b805
-
Filesize
1024KB
MD5c2b8af6e9d4cf866b57f835f0871c68c
SHA1c3ab6289a0d9c4a13aa648a434c6625c57c7c856
SHA256f8f2e261390c2e818d831e78c316b7d3714a893f424759bdab619fcc3717d64d
SHA512f5695ff56fe9294603cfd563657d26d392b8a14fc110f575d6a6124607a8c77c2d55dbc303b9f04f38ce8a635cb989daa656163a27de17e5449ce2a35f22664b
-
Filesize
55KB
MD5fdf2600d905a0faa060d691e0212e1a7
SHA162550f0993a219e265ff9a0795a4d9f49b28748f
SHA25652a37b3a78eb5b59df3bdb129b9115c6fed9bec6ca62b55ae56d8c2701de5972
SHA5127118d2ea3aafe3d77709842da20acbe3faaf4c6c92a50ab05ecd4986916bbb92fe297a1b00357572683b02c61762cdf31dc425f03221dd169803252db5f04f7f
-
Filesize
1024KB
MD5a7cd0b934bb40294f63920a08052886d
SHA129ac008fc9d23b04c1e0e5c9b4cba546a2261ab4
SHA2566e10caa135b30004b836a9c05482a0ff78ee318d003d8503a6f1a43f0863f841
SHA5121715798222a6e4b90a9ac26423c68f3d4072e985cbc203922cf44d7710c17fc4f1c99afc63e1d35d46a102ef782d54b4caa2005719b63f72341bd579fbc008f8
-
Filesize
55KB
MD5302a6f756c471f71e2a8b338fd6e1418
SHA1607b020b4a85ce037fd9e4fb91ad771ea98e1d4b
SHA2561f844da2b387f0d4d3867516dfa5f0feb222afcff022fc7d83475aef77e9f2e6
SHA512d0f6de13a6cd529ddcf7b94e13c1ac37eb06ec32c67e3733505caceadbecba35a8e86fc9ec991f142a7faaf44126a5364b86f959179140a4553244ec9960de29
-
Filesize
1024KB
MD5104c3b1bd9f27ca434cb579dfea7140e
SHA1864bb08b066b0481d5413234875fbd5e3aad322b
SHA25610119023989bc3a38983094082d3399862c65caecc86c2f339295a88f764bfb6
SHA5122b2ae8f59d27eb4e01cd87793843d6808eaa5649cd0e2c30a51db00e008b35a38ec70dccc14e22367482f7360170b91d257f3525e925ed920b3bfa66f3bd16f8
-
Filesize
7KB
MD5b5cb19f05ef702a001630fd302284d44
SHA1f7fc1594df4ab3f50f0e916ead315eedd4047c51
SHA256920e02fbc51156c630ffd9a8dda869815863a229583936be0c7d5dc159e57587
SHA512af28b6d89c77558ed1f70416bb5526a4211b6557928b04f01066dd1e1209d4614300aa8c3c4fb10900ed260efcee17737771c8651a6c08812eaa09d20e63e28a
-
Filesize
9KB
MD57e555ce4b7d1fbb92a6a6d9a0a33d4bf
SHA11a632d0f49c76e3f7ed90c3580c5ac4db02219b0
SHA2565aa3a721ff3c38c9c50f43e000769d3f9c976810772009ad9acde9782ef987c7
SHA512fbb0bf1d34988db5d97280e9ec776a08416326d451e9dd5d2694d1725fef81884abef7c5902f44e4f75c9ef8b7c667cccc8547772615036f8e02df31dc1953dd
-
Filesize
4KB
MD5dc1498d4244384d65fa65a375f16c8e2
SHA12894a38770559c9c2e8d58a3971149af7d767be8
SHA256e318ce867d1526a01465ac92cfe6d5511ac2bfb9bc9431a0695c814d4cd91e45
SHA512e32b74c44e11a28462f9503ef813dac08893dba83105a0888937bba856dcc9c01c1ab3d9b19135ce27afe34fd5f77c531ea2575c80bf5ca2836b64242e781803
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
7KB
MD578573f84a7d3f0a79588d4e0017d5417
SHA178f50d883f50d8a04eff8d3516e0c24700ec33a7
SHA2569394a326ca2577b669dd62ed60d580b07c4863a249d20ad1110134d0a79de49d
SHA512a714f92d5cb4d19cb115d6e17d0a4d68869c50c908dac3fc1380c2d5506d8987b0f91348ef0de59fc3670e632bb2578424c533bebe980df331f47c0dd9bf6b02
-
Filesize
12KB
MD5e8e06f678fae5106ac4fdf23f2f52d7c
SHA13e4ff1b66602e2be3d30fca1277ce127cb468218
SHA256a78d4e3c282db7453a12a27e376213c6159dbf67f1e279137effd4b69ebe308b
SHA512b51f0ee086916fedeea99bc3d1e11f45affa68e6bcd61ab99b40e961bd1bb927e8e213e850cf291fe7b1392f57c961041b194ba9e0be6313e4d20be5a12c5493
-
Filesize
13KB
MD51fa0cc98bf2e13347c48e6318564e290
SHA169b2a95b1a585d8b0e5fb998172f51139db35bec
SHA25624b6867feea056b863428659b9428c6be88ffffb36f8e598ec371c86e344af22
SHA51238583b4abe6f78990f555b45e19098c493e974e14814365c1c4962331af66acad20adcac8906727b6601e3b783ba7c66691043e2fa8061fa43b1ab13c0113e46
-
Filesize
12KB
MD579d3e3653afcdfb8a2ac15b9d4392a05
SHA13e39b711e280e6ee3c3ccc7eba9df509133cc406
SHA256c02f0c60a788532cbfa02ef8f538f00ba7dcca5e19057ce8a06b0ca89d5d1d05
SHA5128194002a90a19aacc8fa824eeb1767f823d4a1c9d512aad570228b599f39a7c43804212d5aaffb7b22d3b38c5cfaf7d2c983e6baffd5284c6412b652f826c953
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
4KB
MD5bdeb4a9ce01f4502e7b0a942df9949dd
SHA1a4c8279cce2df60355b96b5e124c7830ec79918d
SHA256a9b08606e26806c0e0b3f08cdf667ae5f7c8e92b73658ce78cac5abe6dd207ec
SHA512395dd7e3ababeceaa6863977bbc7aec746dcd7287e21883ce53dc30f0be65668b64d9cb3699a60ec3129421cef392ac4534e6ba02717d92f3af3611630fec3f4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
12KB
MD5a6351c5056ba04b84d7d17201253f212
SHA1285138772d382d4bbfbe992aca0b6103d7f8377d
SHA256a2f10f7bea90862fcaab9c9e273746535459f85356cc000f1815dbcac529dab4
SHA51214876de46fc7fb442052e1a99658ec3dcb89c6033d3c0abc1576e3e2dee42480e30b2d9dc73152afb82186b58b0f9fcd24986523b0b538dcae9db8fb8ddd9fe8
-
Filesize
13KB
MD584d98c3ee3883467eddd8471090e8e12
SHA1564ddf9269a4274667484c6d6bf7a6a22a6009fe
SHA256e119e9cebfcaea672b7997ca72a54c92bfb7944727358df2debd3eac61d09e77
SHA5129c59f72e54b8019e9ceebf39af88d83477885d7f13b3ea398e46de88d78f3aa433fd5b267b9eb173ca9f6609ce5fc78547252bb33a52d84feb8046147e50e28c
-
Filesize
12KB
MD5d584258c61e325ba0861536c37d7e674
SHA1e09d0879d7a9e5b87dffcbb7079c137b6f6990a0
SHA256b5f48c8568b4fdceea418402adf7c1ccd8c0c4742ee407daa90ae43e05ff5d15
SHA512461db7dffa549acbff7ea9f05fe570be33ea9333f291e1dc5583629b86ccc742a374f26e5e60da122cd8799089f9b19c326fd40ffe941b859bcc058ce768714f
-
Filesize
13KB
MD5889088efe16e265e5515d5cb73f56f15
SHA1a49dc14244e1d2de0d5d752437bb22dce54d5e53
SHA256c89e38a626c822bd802cb6b1dc0ae9418697f94726371d049e058f51298d622b
SHA5129783ede1af0ccfa8563f78c3cbdd3fe2eae5b1eb78679cb8236dd77ab4f7167a5c7601fdd9d79d3041bd067d471a1213cc7402ace7fa80351b2e52999a1deb8a
-
Filesize
11KB
MD5e678c3095ec071bf8c7c12da27feb4f9
SHA1784e1a8139a8e5a74dfe029a6391c905a50bc5b4
SHA25672a4a5195075bf64f9f5356f7e240a377b307ead1dddd70822b4d0d608159c11
SHA5125c77fe49affbaeb767f00b51fca5146a5e0a076940d68a65b8feaa6c2b958cc8f31cf14f138741508cfaee98bb54fc2181d85126903e90e1321ec370b510eb55
-
Filesize
12KB
MD5caa811ecb55be8514a18471644b10012
SHA12327af8524d550c1d8c742458ca799689ab95d5b
SHA2563ead3f4dad961868910b25d13cd262734dc3a7e3fbc0d88ed7a718e933bbe330
SHA512a80ec6bd4a54e6830f663c7468f9fb9bb7db05b9ef55f30802e03e99f49448c190f7dfa51f898d0645f8f372fd82d3a249c382a7827e2045953a52836504553c
-
Filesize
12KB
MD5e6987d9757f2bd5f7f55b45c41b04703
SHA1a161dd60a3e35c94de21b5f71516ced06f3ad760
SHA25642ead65d44c3264839a68c9ceecf13e045c676311f2e3a9fab26ff16a7840b33
SHA51237d09bc56c9ff114243ceed1731fa8283e211ee460b4e527d013dbfd76597da2858a5d23ab3c5a3ed7f31fea3faf5a64af3d96e3c04fa6da5112396608e5643d
-
Filesize
12KB
MD5496a595e810e2389248e0720a817cf1a
SHA1bca3263c4b09ac56e659c3f8b6f09c8e3585fa1d
SHA256c1c0ee70066e071686585d400b15e41c307b400f57f9d16ecbd23b9ec6f414cc
SHA51207064766d794a43abf6095ec652881b67116e13bc7bfecd866ba253883c1b02091f4b165d54f775ea8c4206de467ac718a0b9060d71e49b7eddcc8ae45ef035c
-
Filesize
12KB
MD53c02b22ad26693136115558af0b5eb0e
SHA107397d97c6a2972cdd3ecc64577f546d041b1ec3
SHA2569d517bc6d5aabaaef1547da3f6981f4b3fa816d8757f1da4123c65bc4cb5f797
SHA512d2bfcca03a045332fe2f0eab1dc4cf675878bccafc977494f4d33832aa695a4a6f30aa754bc9ca28068beb4adf4dc4b6ef54e952a156ff6307f25c9f9e1b41bd
-
Filesize
13KB
MD5259053b87935ba1d0d80c854c11a3912
SHA1759a15fb2d9276c39eb38318fde54ffcafbd7c72
SHA256a36b6ccb359281f60f3f6901fd16bcee0dccc402565c6ba15ac6cf4f508cf7ee
SHA5128ad223c6714d722803917cc569e0a0e20aa8a6f4a3a719f5bca17b7fcb478a0373d10e30f1cbfc2293ad0c5368c9470695b48b17169086161b95b12e181e09da
-
Filesize
13KB
MD5ade506dc7c621490eacc43e3ad58ac14
SHA1af152c2f8fd71b57ec38e708a61d8a40d17a6c72
SHA2567cd5227d84810431e6319c232e49e719184a424bed9153223d11d3e8975e293a
SHA51207314648dca4c28c9a889c859db4cf693683cd9469c2caa79a059e504d6ab55e3d74a177c51db056d3e16bcb6610905ce812c4f2f6eb665c1e6c761187f905a6
-
Filesize
13KB
MD5057cd059d536e418c9995f51848aeed9
SHA1ffaeb85b187fca1c5d8a23498db8008687bd9773
SHA2565ead5ed704ba35f5f9d902415bbbdc554c845dc81c57a374908e306328e98afe
SHA512b89e07a45ea3e5364a2f96c8b8d15f4da9338a32c2d8b8dc1c9290f78b09d341d22aa32b3a179911495479d294abbc5ca09ee90df53390d367db605e144a59f1
-
Filesize
10KB
MD50ce35f6cdf639c559cc6f93f068c5c87
SHA1510c3e66c7cce75043951d3026a036936171edf9
SHA256e2261816c1f011e6f3e1cd14e047ea3cf162f50f8aa33b15e8fc4e5a656fbf38
SHA51227a2fb3ff0dacd287f2cf64ba785a65359c39fce789ca262ace4fbcc8a25a8d3028b0d6c374a4e32f48b76de6e2552bf8dd2f354a4de5c08856238e16cddeba8
-
Filesize
13KB
MD55a350442e834cb7079878729354df30e
SHA11fc01a1e5d8a58aba08a7ba24cc340c391f0e00a
SHA256c5e4958cf46dbb2588264659a8101af979de67d36e66368cc85ef57203b1eb85
SHA5126d6110026fd185e2084206290b6bfe313802768e5f998db835f7acc31f341194981d50ee09fc51ef3fdf518f9ed4e005e345e394ad8b3c476aac369898674dc3
-
Filesize
12KB
MD583116fd30bad624cd7502345c375be5d
SHA1262f4d5a7543a9e998d3376f9f53d6ee00d2f9eb
SHA256eb5a7c92eb10d6b22a9f92ac2c3fa32b6c74951f79b6553e11451ee6ce31ff3c
SHA512f9859837833f00f8418cb40870f200e70c6a932b4db3836a04c2b51bfad384129c43f793b7975b2d3b3ad19ea033e15bd774e06ff896a8fffdeb59c2b612db2e
-
Filesize
12KB
MD5099c6271c23de31c56261665c56a7031
SHA1663af577c0ff4525b2be780c4453098bce8b6a5b
SHA2568f370d79745517e9ee1f53405ed07bc44cebc5ee189e40dbdfc830d98135d630
SHA51285393a9de644ae7ed2259912ca3d2b44c05f280b83ca67bb0bbe0ec700ac774eccb2c5839f810dc31a722a5aa918ca1bf5a1b0dc1937cb3a5523bb04635f1c08
-
Filesize
18KB
MD5e540346d1cdbdcc3955e830756b0204d
SHA15073ebf6353e42c2514ccc32a4e57caef2a67bc4
SHA256f34c26a1e774e7daf7ed5817c182060264eeeb2e6d872d206b354c9c160a2a87
SHA51220954766caea3b1c9617064c328e40d3cd8efbdd7efc87430fb1fa54c87fdb1f63dd551a7e0fc49ad2b87c4c9de66ed0b08ef83004a5717a8b74ab39bc2873b8
-
Filesize
15KB
MD5ae8fa9f1aeae1b26e2ec18f7b0e9b391
SHA122a74848cc2d627ff2fdff17ea7fd8c1342dee9e
SHA2565e8d7cbd826ed550bf825d3bef629bf17ada5764db04d89948bdbd877f1c54be
SHA51244184f82d8dde911ce1630347a6b19a0d923ad7c9e64a625d60a0029d2caa2f114dd2dc1bfe00105a3050db9dd4617fd68844619c74d62cfe2070d753b0efb50
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index
Filesize72B
MD519c71a2509a4af47010ea1abc1ee31e2
SHA14988f3bb3f837f35d0b108b7f8855ed71e457be7
SHA25627c1e425e2c280fe579c288451146a8f78836356f5d7a14670c33578ab3b449f
SHA512d10a5b5c3d4e7ce1322f956b1d896d0075787f3adfe5e4ff9c950f85a0f1ed7249835e5f1af3b92e585ae0846624a5bb65e82464f593225deffb4fde00e92e8a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index
Filesize72B
MD562dcfbdaa8ad9871cee29eb4fee95d51
SHA1af0a3178ffbec60a41b862e2e38d79e62e791005
SHA25691ad8aed2cc8cc1cdb0559a1c2831cfc67ae3e3cc460e71c417d6a5e1416b761
SHA512b7b10c4ada6c4ecf5fc7e391ae45b0b428da82ea86cccf77a55d506d1c153fe8904c9b27bc7cc4d79ca8cf40588bd875a88e6b77da94aa3d422e033e464c252b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index
Filesize72B
MD5030891d0b6773e1da231b6b79d4543e1
SHA15a5ecfca6e42685db58e1da7d9e76247aae3bd34
SHA256964062ea944fe3950662a29e647d93897edd8ccb7ef74c4658d65364539f5b4e
SHA512d93a5d84e8e270cb6cea0c06417dcd71d48b4f9e846c0eb3d98aa8e623e75d9650ee8c0064efef326050ac247093c1a3b0437c0deb73c678de6d4cc79f71f4c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index
Filesize72B
MD570d5b919e2d542db4df76e0521276d97
SHA1bd9a8b905d2a3014f7d08f0a7c3e6c3bcb00bb62
SHA2568fc5d11579d701dfecae0b5fc280f89f40e6433908c64158703083e47e808acd
SHA512b34051173479ad0b29e5830e50587d801cc72bfedce95e4e1b6334ea4ec53eef00b9c0bce2e343df70e51a8194dae16af68c1b42bbbb720925ecab21ef3a9fd8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index
Filesize72B
MD583ca55e6261256f8908a51f9294ee928
SHA1f8098b3968223365023a555c28d6cf47e1e79c8f
SHA256523b734362a753befa5bc29cf162ce7acc9d78bca367c86b4e1162c61813ba96
SHA512b0f479fb262a93015fcebbf6ae5c679e622d1f999f0d81444cbd3f856fe5bfa5faaff1d61f9301771ef8098619e6055a9dd56ce68342001165d9a36f7f98a4ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index
Filesize72B
MD55381cb6a878842fec31d6fdcb664cd19
SHA1e1e012306275c504c5920572a017f389591c8947
SHA256ea6cb29aae28fede70c27a9e001c62b90a0d93a07b80005e0bc54a0ad8b29371
SHA51279062e57d3a1adfea9d428ab46ecc5d059b46a920d543e430b5a64f8f91eda8528b576e07b848b45dd2f068324ca9ed97663c3c6138a5016d146e1627f567bef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index~RFe584541.TMP
Filesize48B
MD5f56d89b806e5b121e03964080f21c168
SHA1fa2ff24bedf3df7c39d91c18b3648a114531eb0d
SHA256c08e1d3ee0e6713fa9a5ab2284d4bd1da62399851b75009723e0caf8b90e17e3
SHA512492d928c00239e3ef0eba5531413582a7e17d147ed66420d458c71bddbec9cedb6ad00361221280fb3ed18f80cdae738ee46d1a283c361920d5ff21797ae0477
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index~RFe5a2a2e.TMP
Filesize72B
MD5d77cf3f5b787fcc0648fb9faf1e7bdec
SHA1ca9c44c8c2c76e96303a36787513e7cc0771e296
SHA256a195290f19dbb6c205eeb92e5546d73ece5c3ffee14b57c3fc6fbfaeaea0d522
SHA512e2f19fd7c00256ee969a0441950283f80e0bd01aeb7fb7edc1b1931a6f5530d29fa0ace3f1eb88854f1ef2986b12c1ec01cf096a0bd84291cb773f418c3fbeed
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index~RFe5bd771.TMP
Filesize72B
MD58cff3a0960445998f7c533079733afb1
SHA1ade2d193bbebbf12803422b4c38ef43f1be0ae66
SHA25687545942b0bf931ec3b3f10b7911a3e495413be77e3efc2820ba6a6101d6d245
SHA51268c9efa63ca172311498b792abc00c493802620aaf1730984a3e5d8bd956cf8f0326e342641d277c2aa93c0edaf711cc831f8f0a37eb0e4cb94e754e5af0ba5c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index~RFe5c7854.TMP
Filesize72B
MD51300cbf8443b468d5967b03aaa14194b
SHA11b8d27eb3cbe5b0678900fd1a06bec286af0d7cc
SHA25698c0ca99446eed7b1da6a79c3e61e74851414257c8764a1bc505261a3acdb899
SHA512274b7e730cc1613504fbb01b42aa4bdae9b6cf32f03e49a5d0cfba4be1472326357aaeaf5305c8c70d071dac238626ee69603f36072eac4376756b6c30555b22
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\393c8b89-8aaf-4999-bc43-148734d7fd61\index-dir\the-real-index~RFe5dd3cd.TMP
Filesize72B
MD56c0108b7a8ef0180f7b662df928dafb4
SHA1f9f5a2daba70c3e71b703d4cf53a529741128d68
SHA256f66d1224748c7762a0c26cd3ca05d0ffccef8bbe5cb55fea6fd5ceb341317687
SHA51290997967b8aa9f18b397bb64fe20ffe53d4df38dfb72780b0b9ed66ac4cbff72858f143fb062d05d60cfece2bc3847ab98b573b2cb283e95a37056753ffa0f17
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\a8836a99-b233-4bdc-89e8-d3b1d2c19290\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\a8836a99-b233-4bdc-89e8-d3b1d2c19290\index-dir\the-real-index
Filesize456B
MD5e7b2c68fccd2c195883c52c0f21411c5
SHA1fcb5e331e09ec192990de295ef28aa089316bcbb
SHA2562b6fcf3077614864280c930de1720bbbc9ffe60a4b967149864f0f87e932882b
SHA512ae9b62824c63afc87925c5f1449c37dbabce3bcd6232148449f0341b5c53a70a501ea755ea57114388380209dcdec94b3f0bc505d6c2622bfe21fd3ebaf24540
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\a8836a99-b233-4bdc-89e8-d3b1d2c19290\index-dir\the-real-index~RFe584acf.TMP
Filesize48B
MD529a6634306c49fc01e6a6defc200fce4
SHA16b67cc2451424a3a0b46d59f42fa586e9d3c6baa
SHA25660ff83788b52eaf3b555fe7cdc50dba9d478b3e038bb01587f9e203f379435cb
SHA512960fa24f855cd30d258bde35da89a98c66c2e058a091b2e14b111a1e9f133f1ecf446129a777e6388fd506c1733c9e0fde715e2563c87118ce599a5efcdab5d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\index.txt
Filesize197B
MD56ff9b53f7fb709b6926f3efc58e137e1
SHA1232e6837bbc0b8af607e8d3af240cf53356e9236
SHA2566b82a54a3a98f598d5b27f5d854b1cb70bd47896207ed4dadd7bf6b9a7c41b03
SHA51265ddb87cdb34acbc41dc431d0fa24761c2334c11f84182191396a8490cebbcd9db31d53ca4d7aa10f28443a868bb8780fa08ada34ef0338253d0a92ada409a47
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\index.txt
Filesize193B
MD5f5396698bda936491d27052f34fbb7af
SHA1e408f60d5bc727cba8661e846f256c47642608a4
SHA2562ff7209a98bc5f47b3b5d075d4442525292d5a41a999e6518e4d7b1ee23f09f4
SHA51289d8be23ef145bb59bc01025c362afdc8fd6f036d5e5e755ddcf4a8ae38fdd38266e6faa90c8ebfd56b6e8fe6ec62702cd6fb7be3088a6136f78037e0d9eefba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\4cc699dd486af2551d01b1a74abd5337c6e052e5\index.txt~RFe57f712.TMP
Filesize131B
MD5131bc2b17752d3f2105fed26e9c53f3f
SHA155773fc0400aa56311fe2c4465101b811c8b765f
SHA2565becfb603454d2ba8eba96706e4109188e2467695128a5a2cc9fa17b8f2a299d
SHA51294228180ef6a5b2106a75a5afc47f94ff433cae5c069778f59f0404a5bb20e6e0a84063bf3d2ff371fdb5399eb11d8192598c9f95437c956adcc9b0d4d509153
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\013888a1cda32b90_0
Filesize5KB
MD596b68910ae01518c94092782a5c66540
SHA1c49b146debd3559f6105490874a665a3e64aab1d
SHA256fba36c2eacf0e55a022ea5f8b00e5e70ecfa21e65d15ab88e86d4982525d4e61
SHA512fc68eb519f1ea32695a55e757608a04ec189806278ae9f34a9e8a49cf5e0fe97fb815615da69e28751661c963c822ebe022c6b7e0b33aece584377d12729ae2c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\013888a1cda32b90_1
Filesize14KB
MD53bf2a7dccad073687d9125e1f117effa
SHA137cc149be80dfd34a66395e2621eac748f7be5d9
SHA25694724188358bdfcbe2abda91e52fca0fac2770cd02fcc0e7e9c79f1196bd02c1
SHA512d130f1b84551fbb8f0f29ce933a74fd973d1923063c563cc20dfee1b363226d257ad4abf32e0de2c85ae77df8e79fa45279c044e44382f82483810025d95cb5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\08b99d499107ba17_0
Filesize3KB
MD5b208abb6c3abadbe59f077bb28db130e
SHA1154367e2878738d87829828605007be14b8ff1c2
SHA256f5fb172bf9cf969ecb39f343095e2cf6e6a4f2a214af135993d12df2747113f7
SHA512ad539ae95394a400b212935d1a9725904cac18f6aa12c44f09f85fd453d2d5eb60ad2a1b7b93b1ec6e798a9b27d204cb4743344ff5b8820e1a4615c9e6e94921
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\08b99d499107ba17_1
Filesize10KB
MD5858efbed2c12666f3a95a6690458c153
SHA184e0b6b4739cec744355dbc27f722e1c95a6cc6d
SHA2563ff490a85ba2881d859b19a8073d8d643707a07fe1eb375847bd768ea6fd90c5
SHA5126b9b3d6c70eb227dc95ccbccbc12c8cbec3ca140ce12a499543e3b8f6a0fb0a3e5087e5981d60c2a066bce6222f0500bac4a4cc18278dcdf6205fded890466a0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\297ecea5cebb5dfe_0
Filesize4KB
MD5227dddc8bdc1809441965208ac5009cd
SHA177ec5bb4932cb7921fea0302f0ce6c41da9ba524
SHA25683333841a8b93502d76e2a65ccb98259dce378868a3589fc110e6aeb2914deab
SHA5123cd69c0f1725222d359c5f61b16db0ed7b944af35dc13a17aab7742102d9a3505deb52b4c0174aea00195c76da514b3e3ecdda4e513d1850b7d4804aa023c795
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\297ecea5cebb5dfe_1
Filesize11KB
MD53547a40694d859ca441ec74b980e0ea2
SHA177e01355af26a159413c1d360b232df40ac18783
SHA25680289a1ec6cfd1b7874e8e83846dc51e8e8f3ea6f7bddb33c889c908787cec74
SHA5121ac069e2462da9ac55200444fbec20c9675d5f74df4617ccb5d83e26c28c71b53b837fea1a0f181def10db9a45c3947c313aab154a061de8239c3d739575636b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\67a473248953641b_0
Filesize15KB
MD5fa21435feec5c329812617ebc2838f1c
SHA19a5e8ff90c4e8f6a564853172d250f6b64e88ddf
SHA256e216c073593926b2b17af43b3739e73c6dcf0a981cf189c77c5d414bed3cacdc
SHA512723aa0c0d8a8c760d3f07769f08bbe88526d60cd6b28d51edfa233957234c4bd3da4f0304eef8bc4d03b70f0cf703ce02ebf6b9ac8e09d49abb8646008acafc5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\67a473248953641b_1
Filesize38KB
MD5cb99734f18d46f9b8a9b14e2069be835
SHA1b65e88cdeaeb64a2f8aa8f98dc858e81c721cfbc
SHA25654574a203771ea0159db524b5fb2ded54ed4ef6466f4c59536f0ffc6ef77f349
SHA512564bc9b315603859e94b605d2cc3c16396fe2e63ad5dfd0f63b52b718d7ed04ce2d721b2820720f987432217acf721c7a6086ddfca33ee646844afaa302e69ef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\7b4fd8111178d5b1_0
Filesize1KB
MD56d266ef29c1e9c4089b1e647fea323ee
SHA1e14fcc3173febb3a881f6627a1befdcbea963519
SHA25682a389121f711988b46f8e21a57dbce18bae8b375dadd0bed0947c17b2fe7c01
SHA51266afb30441104c073a318753d19cd005544ca019fc37fe99db3b5124cf9e75ae450da88a7dc1ca798db9464e16857017016a95751a64db705de24ec92ebe0758
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\b6c28cea6ed9dfc1_0
Filesize6KB
MD5c2c64d4b048f1d41bd86b97a4e4375b7
SHA14c9149ad52a61fe38621dd5bb39c6a9e759eb3c1
SHA256d10e128b1c512a5d547188afb5a870d696476a65665825bd3a30551a957ed1a1
SHA512e9e4455568060aa10ff9f70835c755de44cfde64d270c3174de481ccb482f98318a98ba2cd126d28ca48b7c2c80ea483f2a508367ce31beb02274eb13f0c57d5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\b6c28cea6ed9dfc1_1
Filesize23KB
MD55e13ffda8eceaf43219be84d4daed4b2
SHA14c6a087bdcd18527f582c22180d160c455bd4f84
SHA2565745d5322c79ccf692258c77100f33921948e4777eb880ff4fa8898c84336e9f
SHA51246988c7d6a5ccea2b1d00545a8f06d0b17e9a17970ae243bfdefa6ba9f69449ad84939de22f8d4ed2f5f9678fc3e7a8b54af2e5b91f695c4a2e505549d7627d9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\ba23d8ecda68de77_0
Filesize7KB
MD52ca32028e74f6f4d4a75e766db5d8101
SHA13ce1554e85a68a0f2321cbe83935200198acd639
SHA2563459b82a21be3a248b159291c0476365b0efc23127024f933722bb6b3a3e3878
SHA512e5688d18d0ba0739d755324602f11994bd9e55397d78e71ec8acc4da8944ecb7de818d0dd9585e5ee95527ec113c3e1f3863bb3df1b3afc6057e8d0399e41704
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\ba23d8ecda68de77_1
Filesize4KB
MD595a0f288af9b5f2f5fd4318dfb8f0c57
SHA16ee83919532b924981a0145d1b00e03c3740bdcc
SHA256378aed9cf460b938225f226dde5509698fbfb17d8d82993e2d479cb0ca064d4d
SHA512609bce1a5d8f7a21c5ddc9563d137fad462107c951b415a5cc628b482e6c46b3a585cd1e0ec4c0a3738b7c8caba2037ed37010de31c3bfcadd3d47edb0603c5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\d0757ff92c7cde0a_0
Filesize5KB
MD57d45ab01a1f1cfcd4bad2b04f9e1cca7
SHA186be8908aaa26c3700660b3dc1accc05845fa2ba
SHA2560397b3dfc7d33b2f44698669a67df0d36ce1a08cc6c1556afcad852983a01bf1
SHA5129aa5084dc931b4cdab0127f9f74b792e64ee29572c5baf881a667b9b43bbf8818764b3adbf13f05649d8ec2e38d3212d61b5161ec146fe775a99f715a5d78917
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\d0757ff92c7cde0a_1
Filesize12KB
MD5cf81aeb92a1b6ccf560b9cb1e3d3d4cd
SHA17d872b5210a85f01e7c154d850cb67fb1110b428
SHA25652efd34124612ef52703ab2b90ce23af4205adfa2d97baef1a48a6e9db1615e3
SHA512088b7177bafc754ab619a89563b3b5537917effed634cca3de11b54b3c434ac5407b26fe10ffd36f8e5af79f48686c02a4d65dedbfcdc7aeeb0dd9513efc1b8f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\fa813c9ad67834ac_0
Filesize2KB
MD5ff627bcee37504eee059e4416d27cc27
SHA148827e8cd7e1a8e525d6b0a7d3b6bba6fb43d053
SHA256f092a8af2c0d2c64d09099f5377d5b29ac2fb9cf30884948102b00dc05b8e11b
SHA512e4c7cd47ab4fd6e38b417be7543e77854535c3f284074fa4cc07a4964a8c13358bf1671a696638c0a27135c1d12b3be2f8a50b1cde76acd489aa73f173054a47
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\fa813c9ad67834ac_1
Filesize3KB
MD595725499bf047b2d8489233bd2f10eab
SHA1d035826a7e1c3d561ba3c9a21da9e485d417c7bb
SHA2568b8c9dcdccd665280a95226961bc0ea6e9baa326747710da7919277ff7021920
SHA5128778beff27f8f206fd4f38d973af45e5c351918c3704217b95d7694b760708f41ed588907ee26a528fbfa300972a7e2c37b3a6d3dd46dfdd745b4d7616d5f9f2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize288B
MD598bc0059209b2b2041eef697bd6e69ae
SHA131a9bfdc8b1089d7cc4a4044e958cb150a0980e9
SHA256454fe3dff41be719e1ad180d3df130d49234799b0d71410de6dbba4804b8eaed
SHA51251f095f9a9d7c0502d0b9c4f2c72670c200da473ad8a030ca234c8c9f3bc007956c8412635ffffceef8397041dd554987c3da0dcfeb7a199ccff0637a7c58151
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58849c.TMP
Filesize48B
MD5b982395c8d6f35b0fdc4bb8955927dd5
SHA188d65e395b493b303e5f30eae2d936e8f25edcc0
SHA2566e9a29deda4e442f0c5e990c0d25aa3fe5a841fe027c71e36a4e45a0fb7c6bbe
SHA512590e20b3fb899e9ac1372fb6e1da036f79e5483fa7cc0bc4345dd498a1c7c1a670790789999f7f047305bacfd3483a33d72df02669dd9a44c0e394ec98a6d041
-
Filesize
154KB
MD5d4b4e629403e48c581a54fa81a63815a
SHA1e91f846b3bcc2e035d10b18b9b9429a32ab03509
SHA25625384732adb9e81d671dc140edcdc2a5a62ac9a59624f2c73c764b82445eadb2
SHA5121d5a2ad446841cef1686acdfca3395121ea97b8b9c1eabcfee8098496cf702d205243d352c8e8c3d52e4a7cc4ef9a526ccf6b96be0f5b842d0e99bd8e39e6a42
-
Filesize
155KB
MD53ffadf97377fcc1ed6e2b07a5f24c669
SHA14c5975e7ba98877e68d06a54279b3327b1a0c337
SHA256540beab7b90f7a2ed03271a31d7ca549af37f24dc5510b8e7cd29f6a8cfd6850
SHA5124a2de8973736e3bb1b128ab5a0f425caf8f239c9773fef5ab1278540abf858461c31d53e123f2939d2ea9ba2082d08bed1c14e04ac3bc3877037757aec169bd8
-
Filesize
80KB
MD511dcb698350b598f32b294d1c2d1e066
SHA1f28a45d9e358daf3b123e01ee02f2585902b784f
SHA2568eb75cb61d6bb7f194ab9891fe7f04d0975b185f3ca57d1aa4185fdd86c77601
SHA512167e4b2529de84c05e2b70469a9acc82d8da7498a13efa535e3aecc13269d2ec27b7a95101f72a4d02103f78948652438b916ede5645a176375b486b1cf430fd
-
Filesize
154KB
MD5267e774470ed5644f649c55952ff5617
SHA110031c3c1a1514f02741746d1ea337a7a064b58f
SHA256590d8da7c5d8885c19f3165acc1b5b38bc5ce84e6579618b5d93b30fbd7dce8a
SHA51294d7d7f139a617a211a0307f21a21d04a062f6b800588f9271497ac6a68851ad665aa876116560d466adcbfd33b27004332c1f851fce79228699944bcdbe8d29
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize22KB
MD588ae3e5ae5d8f07d6f2da60942cc50dc
SHA1cdb4aed3ec05fbd6aa3221c92f27d286b519b267
SHA256b009fccb5d7af1a8668dee153e52901b28ec85fca99bd8d5795de73c4f72e968
SHA51210f5e8482886e9be888db5190d87ce9070183ece74d8f61fa4b8e1714d9d12d6d152c108f1ca78cb121aeb2d3344be4b3c05089b83a0c149d2d0b7d2529664e0
-
Filesize
84B
MD547e2215ffb3bdf396f53ecdd23256241
SHA106a14c8068eb7c6335843210aaab633733ec52e4
SHA256502bd24292c2e80960931338e0960ed6e914430dc22587603fc4e83ebb81d64b
SHA51265cff6e88963b41df20ce9183233d162fb6d2b26a0152292638e8f9b761b88fd768341ae4b45f9a8c819078255477918ca5f553cbcc062a6c35fc3656a82cf75
-
Filesize
84B
MD5567111d5656f96d70e3a7e1c3261c12f
SHA134c5bf4c9653e75df71a2a55d1515a4dba6fc4e2
SHA256ceddb6c1aa1e508b6345c0f646317c368137b34367547eede0f3774c0262be04
SHA5120b2e68ce507556c819de4969951af1ddcbb1e413814d802e627fb1822f7ba2975dbdd3d2890e59b136c453f2ec021d4c45aa736aa93509181383f002f76d9495
-
Filesize
84B
MD59f165836167d4d6e991bf23b192fbb25
SHA1bb9c9c39f2fb966b8561bbdd027745849a17e4f9
SHA25644196398324947166d998a29a90ef9bae01df429e2a124d7e023816cdd70ee43
SHA512e1b60a3814206ce4c48094deaeef46cce5d8cd91ecfda579e5e7bb3cd241037a3cdfe695ea20f2c4fea6bb6c83922312b5acfddb4005756be17766c06d18c847
-
Filesize
84B
MD53f133bb14d053707339a061e7df72acd
SHA1bb2956fbf6760065d51401505a191ef00e88b84b
SHA2564c7a670a3f2443a7724f0ac75bc77983de9fad220b355bae31df93efedc88506
SHA512c7a0856edc1f2232320dbfb497a7fc96bb7a4aad8a5da515c5667b1adbadfaa06d883c3a4c2d8795bf7b87e54f226842a3082637e61fca77b11916584c4e3239
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{25E60990-C2AC-430E-A9FE-4A84A374F9DB}.session
Filesize4KB
MD5d9e7f1b416c774f908a832aad8473328
SHA10687d3d1cbba7c352fb0dbe6ac1984279e2f3c39
SHA256119f5393b966aa7a231015edaa28e2c3ef6e341964353cef0e1fa3cd7d8b568e
SHA512d188759195cb2308fcd745e83d8361f0a60992390d7ce97a94d01dad081d282b4e20c8cd7daeb4c7a4fe82be0f1431140205138f6d19a74b6a46112994da39a9
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{FE72B33A-13EF-4923-B010-6AE45A61B524}.session
Filesize3KB
MD5d502fa491a7e1b6ed10221a36205fdd4
SHA1edb64124f31f7763420238c6a106a390b104e11c
SHA2565d7362848a2a7d9c026e7bf55bdbf874a5db89fff454d6a5fa7f78812d4b6e0a
SHA512e6f79ab309b832f8e30f59f3b4c7d0fc39d8e9707a1cb8ea0b88c4fecade3c23e58d2828d762d12d55d35c2553404a74baf64515065208542286201856f6dbdd
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{FE72B33A-13EF-4923-B010-6AE45A61B524}.session
Filesize4KB
MD5afeae9fcdbfd4cf26f0b09c2b086eac9
SHA11c2f9a18d1b4de9ff272a60e2a0539f0d4070456
SHA256c25090b15c682d5bdfd2826d3f2658213778fb31c955ee88f82f72ab915d2389
SHA5123c502361332df52b28192bdc040f1c488766d82c5baa1ab31666270c50fdd73d31c602732d7d75acf0cb7b333480ae08cdf7be38adeaecd935281e7c5132ea32
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
3.4MB
MD5b5b6aec8ad531f3d05a3db60f6a6ef6d
SHA1894b0afe1435a314332e139ac34e0484e83b15ff
SHA2563ad943fdc99b66365bd323fd59a3db6477a0b2692347e0ce26b4f0578ae99502
SHA51207d2a90b21214e5d6d3dcb269beab5f9cabf181a54c76b0d9bcff4e7608d92a17b9e297da968848a506ff896a337b934c2e308b0a41675726780513838b44715
-
C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi
Filesize1010KB
MD527bc9540828c59e1ca1997cf04f6c467
SHA1bfa6d1ce9d4df8beba2bedf59f86a698de0215f3
SHA25605c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a
SHA512a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848
-
Filesize
126KB
MD53531cf7755b16d38d5e9e3c43280e7d2
SHA119981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA25676133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA5127b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd
-
Filesize
26.5MB
MD52b1b8476b8e9e29ee2b528fef6f4b2b9
SHA1186fa77deef4fd9118dfa007a50553df51380311
SHA256d819f2244b83eeea01c3bd8ed351769cdeb18cb04b88afe443b475d63459b4c3
SHA5123f28dd46eb36aad9cd17a476243c5c472cd915121d0cc51ee3be58357cfaef8ffa90afc216d2f6b287c8005a664d6f7cbd5ee926ec3826fbb323490bb0486147
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\@[email protected]
Filesize1KB
MD5a4c3b5c84de7c4463e0f251a19397d4d
SHA14073edc4680aaad0357d3e05f70889208f34863f
SHA256d7dae371d640c94f2b79158b13b00ae273937a506ebb09ea827a85b2376c144c
SHA5120f6b48f9c814c546ccd2259756137c4144adea8317dc8083464007f4aa5e75b31ea3b286e445d38a9bb474cef9d623b05982e282d03185282f9f84e670d8b2d6
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]
Filesize933B
MD57e6b6da7c61fcb66f3f30166871def5b
SHA100f699cf9bbc0308f6e101283eca15a7c566d4f9
SHA2564a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e
SHA512e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\@[email protected]
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
C:\Users\Admin\Downloads\MalwareDatabase-master\MalwareDatabase-master\ransomwares\WannaCrypt0r\msg\m_finnish.wnry
Filesize37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
C:\Users\Default\Desktop\@[email protected]
Filesize1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
Filesize
88KB
MD54083cb0f45a747d8e8ab0d3e060616f2
SHA1dcec8efa7a15fa432af2ea0445c4b346fef2a4d6
SHA256252b7423b01ff81aea6fe7b40de91abf49f515e9c0c7b95aa982756889f8ac1a
SHA51226f8949cad02334f9942fda8509579303b81b11bc052a962c5c31a7c6c54a1c96957f30ee241c2206d496d2c519d750d7f6a12b52afdb282fa706f9fee385133
-
Filesize
180KB
MD5d552dd4108b5665d306b4a8bd6083dde
SHA1dae55ccba7adb6690b27fa9623eeeed7a57f8da1
SHA256a0367875b68b1699d2647a748278ebce64d5be633598580977aa126a81cf57c5
SHA512e5545a97014b5952e15bb321135f65c0e24414f8dd606fe454fd2d048d3f769b9318df7cfb2a6bf932eb2bf6d79811b93cb2008115deb0f0fa9db07f32a70969
-
Filesize
96KB
MD53cab78d0dc84883be2335788d387601e
SHA114745df9595f190008c7e5c190660361f998d824
SHA256604e79fe970c5ed044517a9a35e4690ea6f7d959d21173ebef45cdd3d3a22bdd
SHA512df6b49f2b5cddebd7e23e81b0f89e4883fc12d95735a9b3f84d2f402f4996c54b5fdea8adb9eaa98e8c973b089656d18d6b322bd71cb42d7807f7fa8a7348820
-
Filesize
128KB
MD57e6b88f7bb59ec4573711255f60656b5
SHA15e7a159825a2d2cb263a161e247e9db93454d4f6
SHA25659ff5bc12b155cc2e666bd8bc34195c3750eb742542374fc5e53fb22d11e862f
SHA512294a379c99403f928d476e04668717cdabc7dc3e33bcf6bcad5c3d93d4268971811ff7303aa5b4b2ed2b59d59c8eba350a9a30888d4b5b3064708521ac21439c
-
Filesize
312KB
MD5aa82345a8f360804ea1d8d935f0377aa
SHA1c09cf3b1666d9192fa524c801bb2e3542c0840e2
SHA2569c155d4214cebda186647c035ada552963dcac8f88a6b38a23ea34f9ecd1d437
SHA512c051a381d87ba933ea7929c899fb01af2207cb2462dcb2b55c28cff65596b27bdb05a48207624eeea40fddb85003133ad7af09ca93cfb2426c155daea5a9a6db