Analysis

  • max time kernel
    141s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 04:07

General

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 8 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 27 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 5 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://google.com
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ff9e18bf208,0x7ff9e18bf214,0x7ff9e18bf220
      2⤵
        PID:4580
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1952,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:3
        2⤵
          PID:2728
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:2
          2⤵
            PID:4372
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2544,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=2464 /prefetch:8
            2⤵
              PID:4320
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3504,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:1
              2⤵
                PID:4404
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3512,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:1
                2⤵
                  PID:4564
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=3488,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:1
                  2⤵
                    PID:6052
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5376,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=3620 /prefetch:8
                    2⤵
                      PID:4872
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3584,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=3668 /prefetch:8
                      2⤵
                        PID:5696
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5348,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=3824 /prefetch:8
                        2⤵
                          PID:836
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5416,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:8
                          2⤵
                            PID:3956
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3812,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5360 /prefetch:8
                            2⤵
                              PID:4984
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3620,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:8
                              2⤵
                                PID:4892
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5808,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5816 /prefetch:8
                                2⤵
                                  PID:4728
                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5800,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:8
                                  2⤵
                                    PID:3968
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5800,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:8
                                    2⤵
                                      PID:2692
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5872,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:8
                                      2⤵
                                        PID:5220
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5340,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=6552 /prefetch:8
                                        2⤵
                                          PID:3040
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=120,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5252 /prefetch:8
                                          2⤵
                                            PID:1608
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3828,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5472 /prefetch:8
                                            2⤵
                                              PID:5052
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5388,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5556 /prefetch:8
                                              2⤵
                                                PID:3088
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5584,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=3808 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:3256
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3312,i,5476453874398248987,6708645365294315726,262144 --variations-seed-version --mojo-platform-channel-handle=5504 /prefetch:8
                                                2⤵
                                                  PID:5200
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                1⤵
                                                  PID:4620
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                  1⤵
                                                  • Checks processor information in registry
                                                  • Enumerates system info in registry
                                                  • Modifies data under HKEY_USERS
                                                  • Modifies registry class
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:2380
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9c056dcf8,0x7ff9c056dd04,0x7ff9c056dd10
                                                    2⤵
                                                      PID:3880
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1968,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1964 /prefetch:2
                                                      2⤵
                                                        PID:3476
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1544,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2204 /prefetch:3
                                                        2⤵
                                                          PID:2780
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2340,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2492 /prefetch:8
                                                          2⤵
                                                            PID:4960
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3176 /prefetch:1
                                                            2⤵
                                                              PID:1824
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3196 /prefetch:1
                                                              2⤵
                                                                PID:4108
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4244,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4264 /prefetch:2
                                                                2⤵
                                                                  PID:768
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4632,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4668 /prefetch:1
                                                                  2⤵
                                                                    PID:4476
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5324,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5340 /prefetch:8
                                                                    2⤵
                                                                      PID:3960
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5552,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5572 /prefetch:8
                                                                      2⤵
                                                                        PID:3896
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5652,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5500 /prefetch:8
                                                                        2⤵
                                                                          PID:3052
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5900,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5632 /prefetch:8
                                                                          2⤵
                                                                            PID:3188
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5904,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5764 /prefetch:8
                                                                            2⤵
                                                                              PID:2212
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5568,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5432 /prefetch:8
                                                                              2⤵
                                                                                PID:6016
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5932,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5968 /prefetch:1
                                                                                2⤵
                                                                                  PID:4852
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=6108,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3196 /prefetch:1
                                                                                  2⤵
                                                                                    PID:4980
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3260,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3224 /prefetch:1
                                                                                    2⤵
                                                                                      PID:1120
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=6064,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=6076 /prefetch:1
                                                                                      2⤵
                                                                                        PID:2820
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5604,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5964 /prefetch:1
                                                                                        2⤵
                                                                                          PID:1676
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=3172,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5840 /prefetch:1
                                                                                          2⤵
                                                                                            PID:5172
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=3188,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3276 /prefetch:1
                                                                                            2⤵
                                                                                              PID:1808
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6140,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5972 /prefetch:1
                                                                                              2⤵
                                                                                                PID:4620
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5396,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3164 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:4256
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5780,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3304 /prefetch:8
                                                                                                  2⤵
                                                                                                    PID:2020
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3312,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=6092 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:4444
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=208,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4228 /prefetch:8
                                                                                                      2⤵
                                                                                                        PID:4944
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=4848,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4280 /prefetch:2
                                                                                                        2⤵
                                                                                                          PID:5636
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5696,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4772 /prefetch:8
                                                                                                          2⤵
                                                                                                            PID:5712
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=4264,i,9293046507096380898,3088435910011931247,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3324 /prefetch:8
                                                                                                            2⤵
                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                            PID:4808
                                                                                                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                          1⤵
                                                                                                            PID:4412
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                            1⤵
                                                                                                              PID:944
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                                                                                              1⤵
                                                                                                                PID:840
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                                                                                                  2⤵
                                                                                                                    PID:5056
                                                                                                                • C:\Windows\System32\rundll32.exe
                                                                                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:844
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
                                                                                                                    1⤵
                                                                                                                    • Drops startup file
                                                                                                                    • Sets desktop wallpaper using registry
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:836
                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                      attrib +h .
                                                                                                                      2⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Views/modifies file attributes
                                                                                                                      PID:316
                                                                                                                    • C:\Windows\SysWOW64\icacls.exe
                                                                                                                      icacls . /grant Everyone:F /T /C /Q
                                                                                                                      2⤵
                                                                                                                      • Modifies file permissions
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:4980
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskdl.exe
                                                                                                                      taskdl.exe
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:3300
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c 317981743134971.bat
                                                                                                                      2⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:5236
                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                        cscript.exe //nologo m.vbs
                                                                                                                        3⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:3456
                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                      attrib +h +s F:\$RECYCLE
                                                                                                                      2⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Views/modifies file attributes
                                                                                                                      PID:5980
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:5372
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\TaskData\Tor\taskhsvc.exe
                                                                                                                        TaskData\Tor\taskhsvc.exe
                                                                                                                        3⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Loads dropped DLL
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                        PID:316
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      cmd.exe /c start /b @[email protected] vs
                                                                                                                      2⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:3300
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
                                                                                                                        3⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                        PID:5452
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                                                                                                                          4⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:5020
                                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                            wmic shadowcopy delete
                                                                                                                            5⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:5192
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskdl.exe
                                                                                                                      taskdl.exe
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:3600
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\taskse.exe
                                                                                                                      taskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:2184
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Sets desktop wallpaper using registry
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                      PID:1928
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "rgnacyttyb192" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\tasksche.exe\"" /f
                                                                                                                      2⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:5000
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "rgnacyttyb192" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\tasksche.exe\"" /f
                                                                                                                        3⤵
                                                                                                                        • Adds Run key to start application
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Modifies registry key
                                                                                                                        PID:6044
                                                                                                                  • C:\Windows\system32\vssvc.exe
                                                                                                                    C:\Windows\system32\vssvc.exe
                                                                                                                    1⤵
                                                                                                                      PID:2024
                                                                                                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
                                                                                                                      "C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
                                                                                                                      1⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:1448
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib +h .
                                                                                                                        2⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:4128
                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                        icacls . /grant Everyone:F /T /C /Q
                                                                                                                        2⤵
                                                                                                                        • Modifies file permissions
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:3824
                                                                                                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
                                                                                                                      "C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
                                                                                                                      1⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:2852
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib +h .
                                                                                                                        2⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:1320
                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                        icacls . /grant Everyone:F /T /C /Q
                                                                                                                        2⤵
                                                                                                                        • Modifies file permissions
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:1288
                                                                                                                    • C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
                                                                                                                      "C:\Users\Admin\Downloads\Ransomware.WannaCry\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
                                                                                                                      1⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:2500
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib +h .
                                                                                                                        2⤵
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:1368
                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                        icacls . /grant Everyone:F /T /C /Q
                                                                                                                        2⤵
                                                                                                                        • Modifies file permissions
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:840
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\tasksche.exe"
                                                                                                                      1⤵
                                                                                                                        PID:3928

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Program Files\chrome_Unpacker_BeginUnzipping536_1086824742\_locales\en\messages.json

                                                                                                                        Filesize

                                                                                                                        711B

                                                                                                                        MD5

                                                                                                                        558659936250e03cc14b60ebf648aa09

                                                                                                                        SHA1

                                                                                                                        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                        SHA256

                                                                                                                        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                        SHA512

                                                                                                                        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                      • C:\Program Files\chrome_Unpacker_BeginUnzipping536_1105547466\manifest.json

                                                                                                                        Filesize

                                                                                                                        176B

                                                                                                                        MD5

                                                                                                                        6607494855f7b5c0348eecd49ef7ce46

                                                                                                                        SHA1

                                                                                                                        2c844dd9ea648efec08776757bc376b5a6f9eb71

                                                                                                                        SHA256

                                                                                                                        37c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd

                                                                                                                        SHA512

                                                                                                                        8cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a

                                                                                                                      • C:\Program Files\chrome_Unpacker_BeginUnzipping536_1612134370\manifest.fingerprint

                                                                                                                        Filesize

                                                                                                                        66B

                                                                                                                        MD5

                                                                                                                        496b05677135db1c74d82f948538c21c

                                                                                                                        SHA1

                                                                                                                        e736e675ca5195b5fc16e59fb7de582437fb9f9a

                                                                                                                        SHA256

                                                                                                                        df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7

                                                                                                                        SHA512

                                                                                                                        8bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c

                                                                                                                      • C:\Program Files\chrome_Unpacker_BeginUnzipping536_1612134370\manifest.json

                                                                                                                        Filesize

                                                                                                                        134B

                                                                                                                        MD5

                                                                                                                        049c307f30407da557545d34db8ced16

                                                                                                                        SHA1

                                                                                                                        f10b86ebfe8d30d0dc36210939ca7fa7a819d494

                                                                                                                        SHA256

                                                                                                                        c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54

                                                                                                                        SHA512

                                                                                                                        14f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780

                                                                                                                      • C:\Program Files\chrome_Unpacker_BeginUnzipping536_2110508048\manifest.json

                                                                                                                        Filesize

                                                                                                                        53B

                                                                                                                        MD5

                                                                                                                        22b68a088a69906d96dc6d47246880d2

                                                                                                                        SHA1

                                                                                                                        06491f3fd9c4903ac64980f8d655b79082545f82

                                                                                                                        SHA256

                                                                                                                        94be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88

                                                                                                                        SHA512

                                                                                                                        8c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff

                                                                                                                      • C:\Program Files\chrome_Unpacker_BeginUnzipping536_942797542\manifest.json

                                                                                                                        Filesize

                                                                                                                        79B

                                                                                                                        MD5

                                                                                                                        7f4b594a35d631af0e37fea02df71e72

                                                                                                                        SHA1

                                                                                                                        f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57

                                                                                                                        SHA256

                                                                                                                        530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1

                                                                                                                        SHA512

                                                                                                                        bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360

                                                                                                                      • C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\@[email protected]

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        4ca4ea35c16161b685f4ae13fb6db978

                                                                                                                        SHA1

                                                                                                                        936a32ec3c4cf5b8edc7de9eac89babfdfb8c3a0

                                                                                                                        SHA256

                                                                                                                        e6be07c72bc318d9495e2aeb9b801404c1381ab5c0ba47e48051b354cee5ace8

                                                                                                                        SHA512

                                                                                                                        fe59dc476efa6462f7b19788c53bd65281f290db1785472720a7feaa3395e0743f222b87dc90dce56d811d34e4d8178f41b6d59354c6074b24654e6d069a0fd4

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1cfe0627-01fc-414a-ab88-de30afbbf890.tmp

                                                                                                                        Filesize

                                                                                                                        11KB

                                                                                                                        MD5

                                                                                                                        65f0041d02c9c2f783ae39b2343fc8c8

                                                                                                                        SHA1

                                                                                                                        4c01fe19e6771c201b5af5190433b4bbc1ad92cd

                                                                                                                        SHA256

                                                                                                                        d98625206a03e64d474f8701d35e69fc3ccd7a87b33d0b3781184dd6f90e477d

                                                                                                                        SHA512

                                                                                                                        0e91959df25081844f7f59d65c70ab2ed34811a4541ba1a37623c765d19d2e3c81a841b6168d9e83ef5dfecdd8b44195dfc1370f80e26f7774e4767358116f8d

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                        Filesize

                                                                                                                        649B

                                                                                                                        MD5

                                                                                                                        8be35f867be4ee89acd1220334647d49

                                                                                                                        SHA1

                                                                                                                        d9932adc1e9eb6bbfdac70a6ad05ae2e3d55c589

                                                                                                                        SHA256

                                                                                                                        33bd6f09de665ed83249c36bc12672d3f6c2a844606e3367569de2b128f5d761

                                                                                                                        SHA512

                                                                                                                        a0ee72cbc80e168bde57a398a089b17f67b313399d7c5edcc5277b2601be0b685939432be9e4299bbb75a067531d67fff7006d310649ea71b0a97e1dbb048cb2

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        73ab7544e1c8a443ed506dc07dad37ba

                                                                                                                        SHA1

                                                                                                                        244e97e247e0c63745fcd7e2fe5ebc9ba4bd7fa8

                                                                                                                        SHA256

                                                                                                                        ca5400f7c37bd2b5f0ee98d4f73f3790ba10d881a12d093da2009c430685f3e0

                                                                                                                        SHA512

                                                                                                                        784c7562fe28a0506db348cb83b955eae3b7c45bfee3e0db4654a5e28b572b5e2d08eb3e945c3d76dbf347d8005db664a381585781f3a2ac40e771fc4b37e35d

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json

                                                                                                                        Filesize

                                                                                                                        854B

                                                                                                                        MD5

                                                                                                                        4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                        SHA1

                                                                                                                        fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                        SHA256

                                                                                                                        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                        SHA512

                                                                                                                        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                        Filesize

                                                                                                                        8KB

                                                                                                                        MD5

                                                                                                                        ee62c8c7c816c0b1fdfc172fd5b6cf25

                                                                                                                        SHA1

                                                                                                                        d6ef43d4d64834a92c5620bc631f7658d2817e50

                                                                                                                        SHA256

                                                                                                                        2c1542ec694b37ef1a0ae3624e7cab0c06cff1cf9dea5aea8e29906e7c6f4988

                                                                                                                        SHA512

                                                                                                                        019029f8f36f935a67b339e103622e758904317dc8777fb4f4bb81299ac342639c62d4371c3bde598c4d734786cb7791578f1baa2ff88171a6897e896eb70a90

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        12KB

                                                                                                                        MD5

                                                                                                                        63277e4fdb6cb67b2aee9c2ed0c2b1d6

                                                                                                                        SHA1

                                                                                                                        9e060f0ece37ac9445e6f6c67ba94d5b15af1161

                                                                                                                        SHA256

                                                                                                                        187aa570d4f40c82c65e33f81f586fb851c96b0fc57692eb2d29bba1d44e7ad5

                                                                                                                        SHA512

                                                                                                                        aed74d7a7d18785cd04fa7b6e3d58bbd9a4eed55f8dd4052642ab7fde3a26b6e8b8a2dfac6820fb395c8b157e6147c66310c9b23b1f1e7280842df80e5a0493b

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        12KB

                                                                                                                        MD5

                                                                                                                        26c0cb7487d99310c4d37acd0ce3b693

                                                                                                                        SHA1

                                                                                                                        edd0bdf283ada6a73124db845c2e7af754687ee5

                                                                                                                        SHA256

                                                                                                                        8b67b5f9a2915975c0b5fb3e0d5866ceb6e69ede9b78f9361cfe8adee655d19c

                                                                                                                        SHA512

                                                                                                                        9807f2574c347b762732a9c9f86124ddf63c96c40e059d8e9ec236bfcba8e0190f951c6baed2c0e9f8bfc1e1f0869d2a7bf172af4747f2d7de9832423d3c3465

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        11KB

                                                                                                                        MD5

                                                                                                                        11ebf4d1d6713bdfbcc3a350c2a0246f

                                                                                                                        SHA1

                                                                                                                        52a19232bc86ecc4e3219af39c5c952fc146dc18

                                                                                                                        SHA256

                                                                                                                        7a152120ccce969fd16c415ccd0ff0ea4de73c0f6ecc35600b914225971bb948

                                                                                                                        SHA512

                                                                                                                        9006193f172014c462be0f0447dcf0d665eb8377f22bb557bf00694420972f82ce4d4158dcb4eb0330bb0ffc6771f979f32fa3003cdc29c48ddb4d4c7f8893d7

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        11KB

                                                                                                                        MD5

                                                                                                                        cded9e4d79d480aea1a1d07fdb46f69c

                                                                                                                        SHA1

                                                                                                                        463f141822c106125e765f13b1144bfd80515413

                                                                                                                        SHA256

                                                                                                                        0978c01eff7dab2eadd0fdae64eee1c52ea259f12fd804c6549bd294ddc62226

                                                                                                                        SHA512

                                                                                                                        bc58f33c3e3990a9722e06dbab3d38ccf935e5970ac5090a5fc35fe227381b32cceab454df0132d4b4d186531d1524bb5ae56c75d2f7e0ee18efaf47c7048c5c

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        12KB

                                                                                                                        MD5

                                                                                                                        75ebb10fbb7afb98e9aa577f8a5db059

                                                                                                                        SHA1

                                                                                                                        2a5d0f6d1c52d77027d0f675e185aa57027c6f06

                                                                                                                        SHA256

                                                                                                                        1cc29b5961efaf7906a677fa8140f6016fe3aa02121162db8a664e1353e960cc

                                                                                                                        SHA512

                                                                                                                        701e1a09fefa7f79025d205af61d30aeb3089f623092b3d7fc3d09d755c81bc098ce4850642a87beb58fac1e43b11fa18859ec93e3c6fbeb55bb27192ffb4ee1

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                        Filesize

                                                                                                                        18KB

                                                                                                                        MD5

                                                                                                                        b5ac741a59eb99554468db0e0e17c352

                                                                                                                        SHA1

                                                                                                                        d8bea186b54552ea4358c3dcd88958c8d909c807

                                                                                                                        SHA256

                                                                                                                        605f0ffbd130370ae2aed2137bc5a73fe6b01d16b5fe09880e24f08efaef889b

                                                                                                                        SHA512

                                                                                                                        c0a36db1f2b699c4dd3570cdee45e2d3f967558e56cad45ae872074fb5e0a48189bf75528abc2ab23cf6e749d88ab250d86ad43d818887693fdbff549e6f92bf

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                        Filesize

                                                                                                                        15KB

                                                                                                                        MD5

                                                                                                                        e1ec3e0d5d598f0de831aa35ff0525ee

                                                                                                                        SHA1

                                                                                                                        5c96aa80be1666284cbad4e39f0b204e26a48eb5

                                                                                                                        SHA256

                                                                                                                        0dd6a162794162c6ef0773d2dd51126047107c5f004f5ffa7b1a77f92311dd4a

                                                                                                                        SHA512

                                                                                                                        956ddf91fafeb7c4f038212de5581e8f2a791f73028b459cd3ba94aace37c3e8e5d7cfd8be533d778305d6ee53b586055a70fe68a5d54757f1d2557b394ae349

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                        Filesize

                                                                                                                        72B

                                                                                                                        MD5

                                                                                                                        8704b3a6386b91216a7bacb7def3e436

                                                                                                                        SHA1

                                                                                                                        5af81ee0a8e2ff7cc6228b742a84c488064edb3a

                                                                                                                        SHA256

                                                                                                                        5847c7f77cfa427e604fdad5a15512982a33737ce692f754b62ff58a679e5a1c

                                                                                                                        SHA512

                                                                                                                        13edb7ce8853e37a8812eab3d5ef114ff1308c2a9396b0010c9b9269270b5306cc4173de749787d46979c9aa5d6d991b068113d00d4a8552f904264f9613780f

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                        Filesize

                                                                                                                        72B

                                                                                                                        MD5

                                                                                                                        aaedfff5a5903c8a365c7a31ef746641

                                                                                                                        SHA1

                                                                                                                        9400e4f48e6495def155f6323ec8b048110a1d8d

                                                                                                                        SHA256

                                                                                                                        b06b5756af3319e02ec880ab8f725fd31cb9cc82a359e7ec4414c73f663c268a

                                                                                                                        SHA512

                                                                                                                        406f88d85c9fae1220de32159bd4041b988000a33d7982facc912b2551139bd86f42f7bf18c69969706171e602888ecd1071d01b4f49537a6b5d906a340be1c5

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b9ea.TMP

                                                                                                                        Filesize

                                                                                                                        48B

                                                                                                                        MD5

                                                                                                                        f67d36f29e16e8242ff3a0651a5d30f6

                                                                                                                        SHA1

                                                                                                                        2add1fddf6547334b37703ab6a309f55023eb1cc

                                                                                                                        SHA256

                                                                                                                        7d3d570ae5b6587e08b50d27ed3cd9cd7c0072b832056f2c1a196f53a5154968

                                                                                                                        SHA512

                                                                                                                        869c7cc75afd26d4cb70f76052afe83f5176c500736f42b5e41aa009be67dbc6da23b510651adf1a31ca85fc71c165006b6c77e39bd35a6f225a44943118d8d6

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b787c19c-a637-405e-a5a7-3bd3fb07abca.tmp

                                                                                                                        Filesize

                                                                                                                        12KB

                                                                                                                        MD5

                                                                                                                        9ae54afcac73456cf52149d4d0848543

                                                                                                                        SHA1

                                                                                                                        c8859d60b3573ca38fc537e04ce6d4f30749b7ab

                                                                                                                        SHA256

                                                                                                                        7a93f0205ecf5633be113a267e0c3f51c867d8d85c3565ffe52f7ea534004070

                                                                                                                        SHA512

                                                                                                                        db3b43cd93ae5d85ab63a9683aeeccd659921721c8b4e1b0ecd8859b0c09d6d32ce618cf0f8ba54b6472505f14bbaed441715f852e478f32b784312419c06aaa

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        155KB

                                                                                                                        MD5

                                                                                                                        dbe7b46bf989229388cbc8e58b595c3f

                                                                                                                        SHA1

                                                                                                                        2be91f95268d7d5b372b36d09def33d6708d5c5a

                                                                                                                        SHA256

                                                                                                                        6de691b1c70c31c8d98a21f8b379a19343c25ce0593bc3ce04e20c2619429dbc

                                                                                                                        SHA512

                                                                                                                        5fcfdbfba36999f9348478cf26fc37c3c7f166ceb4b9cecd3ab464b4f7730f123f7dc966fae668338be77e89aff8e39bbb071553ffe6c376ef875fe64126c4cb

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        79KB

                                                                                                                        MD5

                                                                                                                        1967bbc814acbc4d9a17f57c14e1eac1

                                                                                                                        SHA1

                                                                                                                        c99c6e7cc4e95bc4dfb83a6d97f9ae44b821ecb9

                                                                                                                        SHA256

                                                                                                                        a7ea8289b9e9a1f65fe33f71395cabd9004cea4e0ae6d58bc339d1f8365c29ee

                                                                                                                        SHA512

                                                                                                                        8f49185c153d46f01a3af4470641f92e7c524eefac762abcca14817086b38848a27ded4ed7c3cdec4cd86deb551ef13ad34770ac218555f9a5572f84e726e4e5

                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        155KB

                                                                                                                        MD5

                                                                                                                        3c64d005c7dee0083d00bfb5c69e2013

                                                                                                                        SHA1

                                                                                                                        c761a7fda26e09f6162cc72eeb00f8172d689a73

                                                                                                                        SHA256

                                                                                                                        6a1d938350db7d18e63aecc15dec68cfeb7ec9ab11c5991326c2b5a3172a38d4

                                                                                                                        SHA512

                                                                                                                        48381494b936a2bcd7086d18cf1a178e0e1abe7d96bff00651518f6669d544ec14e4ec92f7f6bb634a654091e25e589ea66973da120d3e58454dcf0b2dadb985

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        f9fd82b572ef4ce41a3d1075acc52d22

                                                                                                                        SHA1

                                                                                                                        fdded5eef95391be440cc15f84ded0480c0141e3

                                                                                                                        SHA256

                                                                                                                        5f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6

                                                                                                                        SHA512

                                                                                                                        17084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                        Filesize

                                                                                                                        280B

                                                                                                                        MD5

                                                                                                                        8625e8ce164e1039c0d19156210674ce

                                                                                                                        SHA1

                                                                                                                        9eb5ae97638791b0310807d725ac8815202737d2

                                                                                                                        SHA256

                                                                                                                        2f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2

                                                                                                                        SHA512

                                                                                                                        3c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\AdPlatform\auto_show_data.db\CURRENT

                                                                                                                        Filesize

                                                                                                                        16B

                                                                                                                        MD5

                                                                                                                        46295cac801e5d4857d09837238a6394

                                                                                                                        SHA1

                                                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                        SHA256

                                                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                        SHA512

                                                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        fac93a11f9f6c5a3d32ce79f67ad012d

                                                                                                                        SHA1

                                                                                                                        471988a500db4fa439b9edf01b775cd585529777

                                                                                                                        SHA256

                                                                                                                        f4ff0502286b853a4fd9fbddded3dc98ef3d31117fa71dc5dcbdeebee837d783

                                                                                                                        SHA512

                                                                                                                        39b369d546a1212dbde9f63cc6e128c320d7346c640aa5cbc8fb2e4286fa3e4e3801e77e17968e1ca437d3a14e3ec94b980e9859132eea4c84924a9d3571a38e

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57cb2f.TMP

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        ff41c591f3c8b8cb029da8b634f3d25f

                                                                                                                        SHA1

                                                                                                                        136f61772635b31bf451ffdc2f63b095cb67704d

                                                                                                                        SHA256

                                                                                                                        7294ec0be468d60e276f810910be677af35e33140879613d203983b51ff3aa4e

                                                                                                                        SHA512

                                                                                                                        3c1f43463b281c25edfe98437a17edd6de7720aca3021f57e6dbe852cffec0d05b840b74600a2c96c4c8893e59b7f6b85e0d13e0aaff87e4f425a6e61a872212

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                                                                        Filesize

                                                                                                                        2B

                                                                                                                        MD5

                                                                                                                        99914b932bd37a50b983c5e7c90ae93b

                                                                                                                        SHA1

                                                                                                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                                        SHA256

                                                                                                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                                        SHA512

                                                                                                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\_locales\en_US\messages.json

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        578215fbb8c12cb7e6cd73fbd16ec994

                                                                                                                        SHA1

                                                                                                                        9471d71fa6d82ce1863b74e24237ad4fd9477187

                                                                                                                        SHA256

                                                                                                                        102b586b197ea7d6edfeb874b97f95b05d229ea6a92780ea8544c4ff1e6bc5b1

                                                                                                                        SHA512

                                                                                                                        e698b1a6a6ed6963182f7d25ac12c6de06c45d14499ddc91e81bdb35474e7ec9071cfebd869b7d129cb2cd127bc1442c75e408e21eb8e5e6906a607a3982b212

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                                                                        Filesize

                                                                                                                        107KB

                                                                                                                        MD5

                                                                                                                        40e2018187b61af5be8caf035fb72882

                                                                                                                        SHA1

                                                                                                                        72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                                                                                        SHA256

                                                                                                                        b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                                                                                        SHA512

                                                                                                                        a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        cef5f35a654abfc1d4023239b3d057a4

                                                                                                                        SHA1

                                                                                                                        f3be31e1e623c7a7b92924445d8265fea08e2ed1

                                                                                                                        SHA256

                                                                                                                        54242dd1a1a63a61af31fde7aba6cd94384f8713fccf0bce27b65ea8619affb5

                                                                                                                        SHA512

                                                                                                                        161ea8cfb737e5d4c14daa4de70a12183e1562d988349e915c90f905854f46c6b47ce9d283f7a645b8a3dc741c0fe20d2a20ccb865a000807b78aaa68535a7bc

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                        Filesize

                                                                                                                        3KB

                                                                                                                        MD5

                                                                                                                        778e7b2af2803fdaceb06d6ba416bdff

                                                                                                                        SHA1

                                                                                                                        1b5931ffe1bb8e126deffafa0246aacf32684596

                                                                                                                        SHA256

                                                                                                                        50bdabcd0560d23b047810572c02ce449ef3563b982d07706c4c69defadb0927

                                                                                                                        SHA512

                                                                                                                        32772687938503e3d4e6ac1926aab6df3b259be40d56dd14d4aeabcecee5b3618c8f9f890eb066a58c6711db1458613b67da5153c0e67e3901ae4ca2418995ae

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                        Filesize

                                                                                                                        2B

                                                                                                                        MD5

                                                                                                                        d751713988987e9331980363e24189ce

                                                                                                                        SHA1

                                                                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                        SHA256

                                                                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                        SHA512

                                                                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                                                                        Filesize

                                                                                                                        40B

                                                                                                                        MD5

                                                                                                                        20d4b8fa017a12a108c87f540836e250

                                                                                                                        SHA1

                                                                                                                        1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                                                                        SHA256

                                                                                                                        6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                                                                        SHA512

                                                                                                                        507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        16KB

                                                                                                                        MD5

                                                                                                                        0717a1de5d408d52c1a6366cb5bce414

                                                                                                                        SHA1

                                                                                                                        59427cc7f6f6816fe8f561d4846b245738e145c9

                                                                                                                        SHA256

                                                                                                                        a4d3f7bcf9320faa5cbd50454406d58fd61d9bedc4c052162da9fe6360d800c1

                                                                                                                        SHA512

                                                                                                                        acedeaaec5f5b0060c6fe39296ef77628e5cdea9af4bb3a66b443bc60f50a557d3e7e5abe7b4e74e8aff542050b69e8c83e812a5ead08e17b53082c550873ad5

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        16KB

                                                                                                                        MD5

                                                                                                                        7037af9f42923f95a16b1a4c00fd5906

                                                                                                                        SHA1

                                                                                                                        b3e14e739851f50529e45fd70dc543dc86159e6c

                                                                                                                        SHA256

                                                                                                                        9a4cb7fc26031419906f18db992e1878d6535a37738ed987aeeffd6bb694e906

                                                                                                                        SHA512

                                                                                                                        81bde658f5a54014e51d910a8060678b72a02c8618cfd8d098ff40f11f7cf60aa62f3c697c51ecbf1512e5b7aac9ae10403d76c02dae7ee93a593fd0a2985469

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                        Filesize

                                                                                                                        16KB

                                                                                                                        MD5

                                                                                                                        678dc836fa9a36eeaaa7cf6544e3d540

                                                                                                                        SHA1

                                                                                                                        534f4761faf3e624017b60266ddb0f52b189b373

                                                                                                                        SHA256

                                                                                                                        f54b81381ef08d64fe7315acfed392ba73eaeb7b0f64efc5b48bbd3dffc0137c

                                                                                                                        SHA512

                                                                                                                        473790e1f2c653a4c147a6c3db75e5e3e5c6d85d976a0e423507a34b65191dacf6e25d19af90cb655a0e0c57c384110d86a4515caaf737a35f7a5fb14eba57de

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        e4694d7ba17bab196fbe5c497148c382

                                                                                                                        SHA1

                                                                                                                        ab5eb213e75c7d06a72929b8f3b87b3199ba8a95

                                                                                                                        SHA256

                                                                                                                        c9705c9d3c87545ddfec7d98c5df25bbe235547950b75b63da88c61694e99a9c

                                                                                                                        SHA512

                                                                                                                        7bb28eb5889fd4e8eca632013ab37a4273a891c885f0712d66c9a78177216f2bd77ebb698ac9dae27870639622bc504d7874e07c9c527876f85b89fe5537a99e

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                                                        Filesize

                                                                                                                        22KB

                                                                                                                        MD5

                                                                                                                        1b686ddc44bb3ef63535a6c573368c62

                                                                                                                        SHA1

                                                                                                                        b3b2f6bbf158057b1397a8ba06716bd74badea66

                                                                                                                        SHA256

                                                                                                                        9e14c957b9734161b0104405f826c1ec0bdb2fb1e22b77a3015960b209b8fb2c

                                                                                                                        SHA512

                                                                                                                        285a810be82c9cc1dd8d103918ce9a688621022e697a9c24d9803b33d0573f2974f88447f2664fcc84fac0c742fe67aa93c81c4cc2fefdd2de06bf7e75cc42ae

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\EADPData Component\4.0.3.10\data.txt

                                                                                                                        Filesize

                                                                                                                        113KB

                                                                                                                        MD5

                                                                                                                        60beb7140ed66301648ef420cbaad02d

                                                                                                                        SHA1

                                                                                                                        7fac669b6758bb7b8e96e92a53569cf4360ab1aa

                                                                                                                        SHA256

                                                                                                                        95276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985

                                                                                                                        SHA512

                                                                                                                        6dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                        Filesize

                                                                                                                        23KB

                                                                                                                        MD5

                                                                                                                        9a684816af6fee997fd77c51993a56b3

                                                                                                                        SHA1

                                                                                                                        9398ca52f911d5c8a0cf71b8ac95421208b4833a

                                                                                                                        SHA256

                                                                                                                        013c0635c157c04d87c7ad5b0edf11526ea853ff7a2d560cefa6fdf393021225

                                                                                                                        SHA512

                                                                                                                        e661e82f4c08046e6bfaacc41ea70fce20e2f2c6bcfb6458f47e201775c7e364303ddc0d82a1e2e971f21100e8fdad3ad871fab34803c21ccc3f512e58989a29

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                        Filesize

                                                                                                                        465B

                                                                                                                        MD5

                                                                                                                        471ddb57f0b96c58eb1821387922fab9

                                                                                                                        SHA1

                                                                                                                        78e57860bc3b0d59c68c7276623516e7f2f8259d

                                                                                                                        SHA256

                                                                                                                        90d4d42e8dd3147410d2f4e04922a6c7ee6d9129ad79acd36519c8e86c135750

                                                                                                                        SHA512

                                                                                                                        3158f8cd831fcab4b9bc35515901751ec36149003b2cc96cad11da9611d2518e92f10293ab4733d1199d5e0709e5726df06ff8574a59bcc28787118b910709b6

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                        Filesize

                                                                                                                        896B

                                                                                                                        MD5

                                                                                                                        e6e07b0365e2b95adcfac7c66f81553d

                                                                                                                        SHA1

                                                                                                                        624cb56cbfff9b6d3daa9ab454e3f1922f74c1dc

                                                                                                                        SHA256

                                                                                                                        2ddcbfa7b62949a58715fffdaa207b257d2ee2815a56eb25dde828b4160eebd4

                                                                                                                        SHA512

                                                                                                                        30cb5326b7c573dbc0d0e46d4d0d49c24a33df771de8f31d429388cdca33fb20086be3ecf0eff52b065b05227b25c82b75cb8a4a37f77838ead5ea5d60d2516f

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                                                                                        Filesize

                                                                                                                        19KB

                                                                                                                        MD5

                                                                                                                        41c1930548d8b99ff1dbb64ba7fecb3d

                                                                                                                        SHA1

                                                                                                                        d8acfeaf7c74e2b289be37687f886f50c01d4f2f

                                                                                                                        SHA256

                                                                                                                        16cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502

                                                                                                                        SHA512

                                                                                                                        a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        50KB

                                                                                                                        MD5

                                                                                                                        e276569f88ead5b417de494b8352bc41

                                                                                                                        SHA1

                                                                                                                        ae61d737112c5990bbaf81dd6a256e3d72c96232

                                                                                                                        SHA256

                                                                                                                        af2616e15e1cd3325903a5b20d51ab536a0322afcd9fe555e4d94e67006c4b15

                                                                                                                        SHA512

                                                                                                                        311dcf07dd9d9239e9cad0a2b083201a8f9cf566b5e1afe4fbac326121a0da6eb9c93d6e2f652042c45abfe3fd5d3b1055c5eccece1b10a998e2ee4b3aaa04ef

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                        MD5

                                                                                                                        e7bbd254f9f8a244beb9829b42a4d7ac

                                                                                                                        SHA1

                                                                                                                        251695ada7070697d1abd80ea8484412ce37d4c3

                                                                                                                        SHA256

                                                                                                                        3372e9dedcaf7d7e6ce1a098fb3cdb32e86ca56a2ef296a749958ad94923c7dd

                                                                                                                        SHA512

                                                                                                                        9494842d6c6ffd2bbde44d16634fa3e6409678ed68fc08a8ac9e4a80e8ec614e26b8b51052e7c7a92bf9f24ec19ac9388ecf646d2d661de320a30f997d990bbd

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        41KB

                                                                                                                        MD5

                                                                                                                        3783c6c339b51a64da7f85bb5985177e

                                                                                                                        SHA1

                                                                                                                        0329c524d71eb4131eec01eea7abf419b77dbc5b

                                                                                                                        SHA256

                                                                                                                        d1f65db3dc3f8b617040dfaea087da1f1f07430eda2d0f709e5a6f0af5a54514

                                                                                                                        SHA512

                                                                                                                        e1c27e01f8ec721d565bfd91ee5a3831b4fc610f9c19f2bdd5843bf396f938ed20546f44ac2e25351dad0ccab63c856e13a4444f1803f7b566ca0e61cf314227

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                        Filesize

                                                                                                                        41KB

                                                                                                                        MD5

                                                                                                                        878495e93f591b3fbbafc5df0143799c

                                                                                                                        SHA1

                                                                                                                        a75a6e868b310891ed7ecd64401fd14a1f03a1f8

                                                                                                                        SHA256

                                                                                                                        8439c7a78fcf19ba2e081cee9c069dc0eea1d5ff7a46d2d317e2176409fdb018

                                                                                                                        SHA512

                                                                                                                        e92d81c1a49424bcfc1b4a6483c39de302202c61d0da8432394049aa6bb442c61a5c9439c771aecb5bca1ffff4b317050e47e10580b590bd40a8b815115e7b9f

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json

                                                                                                                        Filesize

                                                                                                                        6KB

                                                                                                                        MD5

                                                                                                                        bef4f9f856321c6dccb47a61f605e823

                                                                                                                        SHA1

                                                                                                                        8e60af5b17ed70db0505d7e1647a8bc9f7612939

                                                                                                                        SHA256

                                                                                                                        fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5

                                                                                                                        SHA512

                                                                                                                        bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c

                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                        Filesize

                                                                                                                        2KB

                                                                                                                        MD5

                                                                                                                        6fad79277bc43558e07086266c4870e2

                                                                                                                        SHA1

                                                                                                                        a53eaa4e8942d7e5d39fb7bb0b54b41fac33e263

                                                                                                                        SHA256

                                                                                                                        56738b2194de61ade8c6eaa1f81d145d387a7e3f47406042c4b52e26721b04d2

                                                                                                                        SHA512

                                                                                                                        68aac3c0b97db2a788619544d992dbba9b077a3efca9b029e69aaba4e9aeac3c43a71160aa24d2c0174f615657dd5f1a0e86109e08c6dd14febf0caa5662477d

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]

                                                                                                                        Filesize

                                                                                                                        933B

                                                                                                                        MD5

                                                                                                                        f97d2e6f8d820dbd3b66f21137de4f09

                                                                                                                        SHA1

                                                                                                                        596799b75b5d60aa9cd45646f68e9c0bd06df252

                                                                                                                        SHA256

                                                                                                                        0e5ece918132a2b1a190906e74becb8e4ced36eec9f9d1c70f5da72ac4c6b92a

                                                                                                                        SHA512

                                                                                                                        efda21d83464a6a32fdeef93152ffd32a648130754fdd3635f7ff61cc1664f7fc050900f0f871b0ddd3a3846222bf62ab5df8eed42610a76be66fff5f7b4c4c0

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]

                                                                                                                        Filesize

                                                                                                                        240KB

                                                                                                                        MD5

                                                                                                                        7bf2b57f2a205768755c07f238fb32cc

                                                                                                                        SHA1

                                                                                                                        45356a9dd616ed7161a3b9192e2f318d0ab5ad10

                                                                                                                        SHA256

                                                                                                                        b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25

                                                                                                                        SHA512

                                                                                                                        91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\TaskData\Tor\tor.exe

                                                                                                                        Filesize

                                                                                                                        3.0MB

                                                                                                                        MD5

                                                                                                                        fe7eb54691ad6e6af77f8a9a0b6de26d

                                                                                                                        SHA1

                                                                                                                        53912d33bec3375153b7e4e68b78d66dab62671a

                                                                                                                        SHA256

                                                                                                                        e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb

                                                                                                                        SHA512

                                                                                                                        8ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\b.wnry

                                                                                                                        Filesize

                                                                                                                        1.4MB

                                                                                                                        MD5

                                                                                                                        c17170262312f3be7027bc2ca825bf0c

                                                                                                                        SHA1

                                                                                                                        f19eceda82973239a1fdc5826bce7691e5dcb4fb

                                                                                                                        SHA256

                                                                                                                        d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa

                                                                                                                        SHA512

                                                                                                                        c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\c.wnry

                                                                                                                        Filesize

                                                                                                                        780B

                                                                                                                        MD5

                                                                                                                        383a85eab6ecda319bfddd82416fc6c2

                                                                                                                        SHA1

                                                                                                                        2a9324e1d02c3e41582bf5370043d8afeb02ba6f

                                                                                                                        SHA256

                                                                                                                        079ce1041cbffe18ff62a2b4a33711eda40f680d0b1d3b551db47e39a6390b21

                                                                                                                        SHA512

                                                                                                                        c661e0b3c175d31b365362e52d7b152267a15d59517a4bcc493329be20b23d0e4eb62d1ba80bb96447eeaf91a6901f4b34bf173b4ab6f90d4111ea97c87c1252

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_bulgarian.wnry

                                                                                                                        Filesize

                                                                                                                        46KB

                                                                                                                        MD5

                                                                                                                        95673b0f968c0f55b32204361940d184

                                                                                                                        SHA1

                                                                                                                        81e427d15a1a826b93e91c3d2fa65221c8ca9cff

                                                                                                                        SHA256

                                                                                                                        40b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd

                                                                                                                        SHA512

                                                                                                                        7601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_chinese (simplified).wnry

                                                                                                                        Filesize

                                                                                                                        53KB

                                                                                                                        MD5

                                                                                                                        0252d45ca21c8e43c9742285c48e91ad

                                                                                                                        SHA1

                                                                                                                        5c14551d2736eef3a1c1970cc492206e531703c1

                                                                                                                        SHA256

                                                                                                                        845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a

                                                                                                                        SHA512

                                                                                                                        1bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_chinese (traditional).wnry

                                                                                                                        Filesize

                                                                                                                        77KB

                                                                                                                        MD5

                                                                                                                        2efc3690d67cd073a9406a25005f7cea

                                                                                                                        SHA1

                                                                                                                        52c07f98870eabace6ec370b7eb562751e8067e9

                                                                                                                        SHA256

                                                                                                                        5c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a

                                                                                                                        SHA512

                                                                                                                        0766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_croatian.wnry

                                                                                                                        Filesize

                                                                                                                        38KB

                                                                                                                        MD5

                                                                                                                        17194003fa70ce477326ce2f6deeb270

                                                                                                                        SHA1

                                                                                                                        e325988f68d327743926ea317abb9882f347fa73

                                                                                                                        SHA256

                                                                                                                        3f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171

                                                                                                                        SHA512

                                                                                                                        dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_czech.wnry

                                                                                                                        Filesize

                                                                                                                        39KB

                                                                                                                        MD5

                                                                                                                        537efeecdfa94cc421e58fd82a58ba9e

                                                                                                                        SHA1

                                                                                                                        3609456e16bc16ba447979f3aa69221290ec17d0

                                                                                                                        SHA256

                                                                                                                        5afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150

                                                                                                                        SHA512

                                                                                                                        e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_danish.wnry

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        2c5a3b81d5c4715b7bea01033367fcb5

                                                                                                                        SHA1

                                                                                                                        b548b45da8463e17199daafd34c23591f94e82cd

                                                                                                                        SHA256

                                                                                                                        a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6

                                                                                                                        SHA512

                                                                                                                        490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_dutch.wnry

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        7a8d499407c6a647c03c4471a67eaad7

                                                                                                                        SHA1

                                                                                                                        d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b

                                                                                                                        SHA256

                                                                                                                        2c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c

                                                                                                                        SHA512

                                                                                                                        608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_english.wnry

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        fe68c2dc0d2419b38f44d83f2fcf232e

                                                                                                                        SHA1

                                                                                                                        6c6e49949957215aa2f3dfb72207d249adf36283

                                                                                                                        SHA256

                                                                                                                        26fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5

                                                                                                                        SHA512

                                                                                                                        941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_filipino.wnry

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        08b9e69b57e4c9b966664f8e1c27ab09

                                                                                                                        SHA1

                                                                                                                        2da1025bbbfb3cd308070765fc0893a48e5a85fa

                                                                                                                        SHA256

                                                                                                                        d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324

                                                                                                                        SHA512

                                                                                                                        966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_finnish.wnry

                                                                                                                        Filesize

                                                                                                                        37KB

                                                                                                                        MD5

                                                                                                                        35c2f97eea8819b1caebd23fee732d8f

                                                                                                                        SHA1

                                                                                                                        e354d1cc43d6a39d9732adea5d3b0f57284255d2

                                                                                                                        SHA256

                                                                                                                        1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

                                                                                                                        SHA512

                                                                                                                        908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_french.wnry

                                                                                                                        Filesize

                                                                                                                        37KB

                                                                                                                        MD5

                                                                                                                        4e57113a6bf6b88fdd32782a4a381274

                                                                                                                        SHA1

                                                                                                                        0fccbc91f0f94453d91670c6794f71348711061d

                                                                                                                        SHA256

                                                                                                                        9bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc

                                                                                                                        SHA512

                                                                                                                        4f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_german.wnry

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        3d59bbb5553fe03a89f817819540f469

                                                                                                                        SHA1

                                                                                                                        26781d4b06ff704800b463d0f1fca3afd923a9fe

                                                                                                                        SHA256

                                                                                                                        2adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61

                                                                                                                        SHA512

                                                                                                                        95719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_greek.wnry

                                                                                                                        Filesize

                                                                                                                        47KB

                                                                                                                        MD5

                                                                                                                        fb4e8718fea95bb7479727fde80cb424

                                                                                                                        SHA1

                                                                                                                        1088c7653cba385fe994e9ae34a6595898f20aeb

                                                                                                                        SHA256

                                                                                                                        e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9

                                                                                                                        SHA512

                                                                                                                        24db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_indonesian.wnry

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        3788f91c694dfc48e12417ce93356b0f

                                                                                                                        SHA1

                                                                                                                        eb3b87f7f654b604daf3484da9e02ca6c4ea98b7

                                                                                                                        SHA256

                                                                                                                        23e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4

                                                                                                                        SHA512

                                                                                                                        b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_italian.wnry

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        30a200f78498990095b36f574b6e8690

                                                                                                                        SHA1

                                                                                                                        c4b1b3c087bd12b063e98bca464cd05f3f7b7882

                                                                                                                        SHA256

                                                                                                                        49f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07

                                                                                                                        SHA512

                                                                                                                        c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_japanese.wnry

                                                                                                                        Filesize

                                                                                                                        79KB

                                                                                                                        MD5

                                                                                                                        b77e1221f7ecd0b5d696cb66cda1609e

                                                                                                                        SHA1

                                                                                                                        51eb7a254a33d05edf188ded653005dc82de8a46

                                                                                                                        SHA256

                                                                                                                        7e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e

                                                                                                                        SHA512

                                                                                                                        f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_korean.wnry

                                                                                                                        Filesize

                                                                                                                        89KB

                                                                                                                        MD5

                                                                                                                        6735cb43fe44832b061eeb3f5956b099

                                                                                                                        SHA1

                                                                                                                        d636daf64d524f81367ea92fdafa3726c909bee1

                                                                                                                        SHA256

                                                                                                                        552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0

                                                                                                                        SHA512

                                                                                                                        60272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_latvian.wnry

                                                                                                                        Filesize

                                                                                                                        40KB

                                                                                                                        MD5

                                                                                                                        c33afb4ecc04ee1bcc6975bea49abe40

                                                                                                                        SHA1

                                                                                                                        fbea4f170507cde02b839527ef50b7ec74b4821f

                                                                                                                        SHA256

                                                                                                                        a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536

                                                                                                                        SHA512

                                                                                                                        0d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\msg\m_norwegian.wnry

                                                                                                                        Filesize

                                                                                                                        36KB

                                                                                                                        MD5

                                                                                                                        ff70cc7c00951084175d12128ce02399

                                                                                                                        SHA1

                                                                                                                        75ad3b1ad4fb14813882d88e952208c648f1fd18

                                                                                                                        SHA256

                                                                                                                        cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a

                                                                                                                        SHA512

                                                                                                                        f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\e81dad52-4fec-4675-b525-88b5a55252d3.tmp

                                                                                                                        Filesize

                                                                                                                        1B

                                                                                                                        MD5

                                                                                                                        5058f1af8388633f609cadb75a75dc9d

                                                                                                                        SHA1

                                                                                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                        SHA256

                                                                                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                        SHA512

                                                                                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir2380_1274609627\09cf7386-fe85-4000-9306-d083c2e1a01e.tmp

                                                                                                                        Filesize

                                                                                                                        152KB

                                                                                                                        MD5

                                                                                                                        dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                        SHA1

                                                                                                                        d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                        SHA256

                                                                                                                        fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                        SHA512

                                                                                                                        65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir536_611148205\CRX_INSTALL\_locales\en\messages.json

                                                                                                                        Filesize

                                                                                                                        851B

                                                                                                                        MD5

                                                                                                                        07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                        SHA1

                                                                                                                        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                        SHA256

                                                                                                                        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                        SHA512

                                                                                                                        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir536_611148205\CRX_INSTALL\_locales\en_US\messages.json

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        64eaeb92cb15bf128429c2354ef22977

                                                                                                                        SHA1

                                                                                                                        45ec549acaa1fda7c664d3906835ced6295ee752

                                                                                                                        SHA256

                                                                                                                        4f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c

                                                                                                                        SHA512

                                                                                                                        f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def

                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir536_611148205\CRX_INSTALL\manifest.json

                                                                                                                        Filesize

                                                                                                                        1KB

                                                                                                                        MD5

                                                                                                                        2a738ca67be8dd698c70974c9d4bb21b

                                                                                                                        SHA1

                                                                                                                        45a4086c876d276954ffce187af2ebe3dc667b5f

                                                                                                                        SHA256

                                                                                                                        b08d566a5705247ddc9abf5e970fc93034970b02cf4cb3d5ccc90e1a1f8c816e

                                                                                                                        SHA512

                                                                                                                        f72b9190f9f2b1acc52f7fbb920d48797a96e62dfc0659c418edbbc0299dccf1931f6c508b86c940b976016745b9877f88f2ee081d3e3d5dcdcc2cc7e7884492

                                                                                                                      • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

                                                                                                                        Filesize

                                                                                                                        7.5MB

                                                                                                                        MD5

                                                                                                                        8bff886397a2661adf2a14778a6bd624

                                                                                                                        SHA1

                                                                                                                        368bec3a2a839b410e7da56aaad0e525b6242a4d

                                                                                                                        SHA256

                                                                                                                        df2cb96d42f316001170386f543cae138a8c71e2315be636fdd32db62ff504dd

                                                                                                                        SHA512

                                                                                                                        bd083685351f73fa2d635ae054f9d170b83f0bf5b862d8d4e0399bfe13ff3d1303f5c301ab497bdab4dbf7f941c985524a7f65b92082efa6a2ab0393ef2d4684

                                                                                                                      • C:\Users\Admin\Downloads\Ransomware.WannaCry.zip.crdownload

                                                                                                                        Filesize

                                                                                                                        3.3MB

                                                                                                                        MD5

                                                                                                                        efe76bf09daba2c594d2bc173d9b5cf0

                                                                                                                        SHA1

                                                                                                                        ba5de52939cb809eae10fdbb7fac47095a9599a7

                                                                                                                        SHA256

                                                                                                                        707a9f323556179571bc832e34fa592066b1d5f2cac4a7426fe163597e3e618a

                                                                                                                        SHA512

                                                                                                                        4a1df71925cf2eb49c38f07c6a95bea17752b025f0114c6fd81bc0841c1d1f2965b5dda1469e454b9e8207c2e0dfd3df0959e57166620ccff86eeeb5cf855029

                                                                                                                      • C:\Users\Admin\Downloads\Ransomware.WannaCry\t.wnry

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                        MD5

                                                                                                                        5dcaac857e695a65f5c3ef1441a73a8f

                                                                                                                        SHA1

                                                                                                                        7b10aaeee05e7a1efb43d9f837e9356ad55c07dd

                                                                                                                        SHA256

                                                                                                                        97ebce49b14c46bebc9ec2448d00e1e397123b256e2be9eba5140688e7bc0ae6

                                                                                                                        SHA512

                                                                                                                        06eb5e49d19b71a99770d1b11a5bb64a54bf3352f36e39a153469e54205075c203b08128dc2317259db206ab5323bdd93aaa252a066f57fb5c52ff28deedb5e2

                                                                                                                      • memory/316-3390-0x0000000073A50000-0x0000000073A6C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        112KB

                                                                                                                      • memory/316-3519-0x00000000736F0000-0x000000007390C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.1MB

                                                                                                                      • memory/316-3392-0x0000000073990000-0x00000000739B2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/316-3391-0x00000000739C0000-0x0000000073A42000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        520KB

                                                                                                                      • memory/316-3303-0x0000000073A70000-0x0000000073AF2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        520KB

                                                                                                                      • memory/316-3388-0x0000000000E70000-0x000000000116E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.0MB

                                                                                                                      • memory/316-3394-0x00000000736F0000-0x000000007390C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.1MB

                                                                                                                      • memory/316-3389-0x0000000073A70000-0x0000000073AF2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        520KB

                                                                                                                      • memory/316-3305-0x00000000739C0000-0x0000000073A42000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        520KB

                                                                                                                      • memory/316-3513-0x0000000000E70000-0x000000000116E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.0MB

                                                                                                                      • memory/316-3393-0x0000000073910000-0x0000000073987000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        476KB

                                                                                                                      • memory/316-3304-0x00000000736F0000-0x000000007390C000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        2.1MB

                                                                                                                      • memory/316-3307-0x0000000000E70000-0x000000000116E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.0MB

                                                                                                                      • memory/316-3538-0x0000000000E70000-0x000000000116E000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        3.0MB

                                                                                                                      • memory/316-3306-0x0000000073990000-0x00000000739B2000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/836-1765-0x0000000010000000-0x0000000010010000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB