Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09-08-2024 05:50

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/raw/master/Ransomware/BadRabbit.exe

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/raw/master/Ransomware/BadRabbit.exe
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9d6893cb8,0x7ff9d6893cc8,0x7ff9d6893cd8
      2⤵
        PID:1348
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1824 /prefetch:2
        2⤵
          PID:2268
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4932
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8
          2⤵
            PID:2292
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
            2⤵
              PID:4120
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:2728
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:1
                2⤵
                  PID:3768
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:1
                  2⤵
                    PID:1792
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                    2⤵
                      PID:4972
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2848
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6056 /prefetch:8
                      2⤵
                        PID:4628
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:1
                        2⤵
                          PID:3724
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:1
                          2⤵
                            PID:3476
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4448
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1720,5468510197433945827,3846803224977916423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:8
                            2⤵
                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2140
                          • C:\Users\Admin\Downloads\BadRabbit.exe
                            "C:\Users\Admin\Downloads\BadRabbit.exe"
                            2⤵
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:2236
                            • C:\Windows\SysWOW64\rundll32.exe
                              C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                              3⤵
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4604
                              • C:\Windows\SysWOW64\cmd.exe
                                /c schtasks /Delete /F /TN rhaegal
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:1532
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /Delete /F /TN rhaegal
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1792
                              • C:\Windows\SysWOW64\cmd.exe
                                /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3330069752 && exit"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:1388
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3330069752 && exit"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:4652
                              • C:\Windows\SysWOW64\cmd.exe
                                /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 06:08:00
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:4804
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 06:08:00
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:2732
                              • C:\Windows\3B00.tmp
                                "C:\Windows\3B00.tmp" \\.\pipe\{C33ADCEC-4065-4D12-9185-402BF884DCD8}
                                4⤵
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:476
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1500
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3968
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:5076
                              • C:\Users\Admin\Downloads\BadRabbit.exe
                                "C:\Users\Admin\Downloads\BadRabbit.exe"
                                1⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:1060
                                • C:\Windows\SysWOW64\rundll32.exe
                                  C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                  2⤵
                                  • Loads dropped DLL
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1204

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                9af507866fb23dace6259791c377531f

                                SHA1

                                5a5914fc48341ac112bfcd71b946fc0b2619f933

                                SHA256

                                5fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f

                                SHA512

                                c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                b0177afa818e013394b36a04cb111278

                                SHA1

                                dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5

                                SHA256

                                ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d

                                SHA512

                                d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                261B

                                MD5

                                2c2e6472d05e3832905f0ad4a04d21c3

                                SHA1

                                007edbf35759af62a5b847ab09055e7d9b86ffcc

                                SHA256

                                283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03

                                SHA512

                                8c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                2eebf80aa53874c89d2d5963f688e1aa

                                SHA1

                                3121813a092e6fae4f8d2da3e78ac0c47bd1fb9a

                                SHA256

                                c5fa09a12a7d774ee5092c538a8ed8178d9aea833dfab533bc5b8906fdd89468

                                SHA512

                                8458fce24a068e4d6e3ea90191c7979720f0cc9d33faa95afdba58b5bc4b87ea4993c6e11e1533fa201460032644c4dc1cbcbb63f2bc1650fe86fb24051d28bf

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                a298411cc41db0b55ac757460d2ce8c1

                                SHA1

                                f2fe184a5ba6bdca6ab86ebffde48a20c11d1555

                                SHA256

                                ff745e5e4c2421f8bde177d04862491b0bfe96c4ebec3fe6d6f79452001393f9

                                SHA512

                                b6cd2e81dde6587f55e8aaddd04f2c62336ebd5df53f98dcbcf15a3d5cad92209c95ce885c33d38621b978d224da05826164379b56735e2d02943c3507a60db0

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                d3c97efda74d27a09582d468700dcbd5

                                SHA1

                                39d9696ccb4b92c8cfcf9cfac72b1e985c535efc

                                SHA256

                                d493c0f03026610deac958a123ddd567cc57fe5577bec39b4cdb81a3aaa226b0

                                SHA512

                                28ea35d18273354af4ae3a3fbb99035f63cd8dc24371a6880280305d62cc4147a22e419539054a9f74bf47cbeb0a3f5cc309586f17868ecbd841ce27306f00e9

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                49a025930cf813a54596bdc98cc20f7d

                                SHA1

                                5be2035d607ca4ee2eef98857e00fc8a55b9bd2c

                                SHA256

                                c6e18b241dc2f9de78252bf50c0730be0457483d482fba3999f660b8f17319ba

                                SHA512

                                8fd2929fff320353e5e7e6b70829d1844ed895e864ce1982ea33dc5dda197b470a3a0fdf3b183977fd033d2e49ee368fb50ff830fe3dd22ad0a09cff74382780

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                5ed3ba3b8e9a108d30c8306f2f2f31c8

                                SHA1

                                a7c21d20cff7b89b9c49d56c52dce743e8f4871a

                                SHA256

                                d2dc2dc6538def355b075069af2a5c107d4f08d80ba95201345dd0a42bf68bb7

                                SHA512

                                a3436a35c2ed7ea1d7990a2a71a6d2f95c52b25e482cae1b50c89011f7fe6e9131da37c61f8539f6f45d44efacf0f29e521dee25c487c844ffa737001093ec0e

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ebd5b164-75d3-43b6-a2c7-7780e29ed492.tmp

                                Filesize

                                11KB

                                MD5

                                89de3084df8ff02cc09a551c100e5b0d

                                SHA1

                                de3fa4deac0b1d9baad3728c2ff0f1a8a9d204f2

                                SHA256

                                735e28863c579bfa6e9caef7c0f8549b90049b8d6be17f963f2a47267e760397

                                SHA512

                                57c0760a93a83abfd56b536d4115036c02325188b0f8731cb5a0a845f4757ce9a9d9ffc1bd3b4681c327865bea5817631aa1719011ba43c1a24501cff27aa4e7

                              • C:\Users\Admin\Downloads\BadRabbit.exe:Zone.Identifier

                                Filesize

                                127B

                                MD5

                                3b4e29fc5f64397c1503cd214e32bb83

                                SHA1

                                bd1e0082173bb4c234c11934b3d9a9096443bf5d

                                SHA256

                                a697fb35628fda70bc62d08283ca4d3e071dc0f33bc1f54118b76e9521d1a729

                                SHA512

                                1291ba03698bd14ea0938c02130355de5c26b8d5911e89984f7d1cc815c6f8de497b3c502621d0071600cca861397231deaeb61860678d8c528be5e1d0f1bba8

                              • C:\Users\Admin\Downloads\Unconfirmed 99275.crdownload

                                Filesize

                                431KB

                                MD5

                                fbbdc39af1139aebba4da004475e8839

                                SHA1

                                de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                SHA256

                                630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                SHA512

                                74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                              • C:\Windows\3B00.tmp

                                Filesize

                                60KB

                                MD5

                                347ac3b6b791054de3e5720a7144a977

                                SHA1

                                413eba3973a15c1a6429d9f170f3e8287f98c21c

                                SHA256

                                301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                SHA512

                                9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                              • C:\Windows\infpub.dat

                                Filesize

                                401KB

                                MD5

                                1d724f95c61f1055f0d02c2154bbccd3

                                SHA1

                                79116fe99f2b421c52ef64097f0f39b815b20907

                                SHA256

                                579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                SHA512

                                f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                              • C:\Windows\infpub.dat

                                Filesize

                                401KB

                                MD5

                                c29d6253d89ee9c0c872dd377a7a8454

                                SHA1

                                46be3800684f6b208e0a8c7b120ef8614c22c4b0

                                SHA256

                                03f4198a279ea4c36a62cd271d3b2d796547013548666006fbef45e20bb920cb

                                SHA512

                                50141de5e0a827688251161353932b677c85e0d6e6831293c9a0044543e541fe8bd4e62fa403abc06df9d220fd843aa58ff9cc37abf46be3e06ae14905c24a5e

                              • memory/1204-161-0x00000000023A0000-0x0000000002408000-memory.dmp

                                Filesize

                                416KB

                              • memory/1204-169-0x00000000023A0000-0x0000000002408000-memory.dmp

                                Filesize

                                416KB

                              • memory/4604-103-0x0000000002720000-0x0000000002788000-memory.dmp

                                Filesize

                                416KB

                              • memory/4604-111-0x0000000002720000-0x0000000002788000-memory.dmp

                                Filesize

                                416KB

                              • memory/4604-114-0x0000000002720000-0x0000000002788000-memory.dmp

                                Filesize

                                416KB