Analysis

  • max time kernel
    323s
  • max time network
    323s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-01-2025 14:57

General

  • Target

    https://webtinq.nl/getorbitalxploit/index.html

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMyMjkzMDUwMjc4MDQ1NzA0MA.G-Oknz.TO4nTCOESqqwzv5-Ob_qYyDtcT60GdqwykyyMQ

  • server_id

    1322930371872165898

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 5 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 24 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 12 IoCs
  • Modifies registry class 40 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:632
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:468
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{3d7b1e4b-7363-48b4-98ef-3d72debfe3f8}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4552
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:696
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:992
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:352
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1028
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1128
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                  1⤵
                    PID:1156
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1248
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                      1⤵
                        PID:1260
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1304
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1372
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                            • Indicator Removal: Clear Windows Event Logs
                            PID:1464
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1500
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2232
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                1⤵
                                  PID:1536
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1572
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                    1⤵
                                      PID:1688
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k NetworkService -p
                                      1⤵
                                        PID:1696
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1752
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          1⤵
                                            PID:1804
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                            1⤵
                                              PID:1860
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1876
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1900
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                  1⤵
                                                    PID:1988
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                    1⤵
                                                      PID:2020
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:2080
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2252
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                          1⤵
                                                            PID:2380
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                            1⤵
                                                              PID:2436
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                              1⤵
                                                                PID:2444
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkService -p
                                                                1⤵
                                                                • Drops file in System32 directory
                                                                PID:2492
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                1⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2552
                                                              • C:\Windows\sysmon.exe
                                                                C:\Windows\sysmon.exe
                                                                1⤵
                                                                  PID:2596
                                                                • C:\Windows\System32\svchost.exe
                                                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                  1⤵
                                                                    PID:2616
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                    1⤵
                                                                      PID:2652
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2684
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:988
                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                          1⤵
                                                                            PID:3092
                                                                          • C:\Windows\Explorer.EXE
                                                                            C:\Windows\Explorer.EXE
                                                                            1⤵
                                                                            • Modifies Internet Explorer settings
                                                                            • Modifies registry class
                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SendNotifyMessage
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:3316
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://webtinq.nl/getorbitalxploit/index.html
                                                                              2⤵
                                                                              • Enumerates system info in registry
                                                                              • Modifies registry class
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:3368
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffddaba3cb8,0x7ffddaba3cc8,0x7ffddaba3cd8
                                                                                3⤵
                                                                                  PID:716
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:2
                                                                                  3⤵
                                                                                    PID:3572
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:3
                                                                                    3⤵
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:3068
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:8
                                                                                    3⤵
                                                                                      PID:3036
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
                                                                                      3⤵
                                                                                        PID:1144
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
                                                                                        3⤵
                                                                                          PID:2644
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:8
                                                                                          3⤵
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:1892
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:8
                                                                                          3⤵
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:1104
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                                                                                          3⤵
                                                                                            PID:3304
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:1
                                                                                            3⤵
                                                                                              PID:3356
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:1
                                                                                              3⤵
                                                                                                PID:3920
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:1
                                                                                                3⤵
                                                                                                  PID:2164
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:1
                                                                                                  3⤵
                                                                                                    PID:1044
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:1
                                                                                                    3⤵
                                                                                                      PID:5048
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1164 /prefetch:8
                                                                                                      3⤵
                                                                                                      • NTFS ADS
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:1456
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,13377863643515159039,9010947618978733223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1220 /prefetch:2
                                                                                                      3⤵
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:1748
                                                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_Orbital.zip\Orbital\open me password.txt
                                                                                                    2⤵
                                                                                                    • Opens file in notepad (likely ransom note)
                                                                                                    PID:2148
                                                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_Orbital.zip\Orbital\instructions.txt
                                                                                                    2⤵
                                                                                                    • Opens file in notepad (likely ransom note)
                                                                                                    PID:4620
                                                                                                  • C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalXMain.exe
                                                                                                    "C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalXMain.exe"
                                                                                                    2⤵
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:3580
                                                                                                  • C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Orbitamain.exe
                                                                                                    "C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Orbitamain.exe"
                                                                                                    2⤵
                                                                                                      PID:952
                                                                                                    • C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Fixer.exe
                                                                                                      "C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Fixer.exe"
                                                                                                      2⤵
                                                                                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1016
                                                                                                      • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                                        "SCHTASKS.exe" /create /tn "$77Fixer.exe" /tr "'C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Fixer.exe'" /sc onlogon /rl HIGHEST
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:1432
                                                                                                    • C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Orbitamain.exe
                                                                                                      "C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Orbitamain.exe"
                                                                                                      2⤵
                                                                                                        PID:664
                                                                                                      • C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Orbitamain.exe
                                                                                                        "C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Orbitamain.exe"
                                                                                                        2⤵
                                                                                                          PID:6852
                                                                                                        • C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Orbitamain.exe
                                                                                                          "C:\Users\Admin\Downloads\Orbital\Orbital\OrbitalMain\Orbitamain.exe"
                                                                                                          2⤵
                                                                                                            PID:6960
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                          1⤵
                                                                                                            PID:3456
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                            1⤵
                                                                                                              PID:3504
                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:3820
                                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                1⤵
                                                                                                                • Modifies registry class
                                                                                                                • Suspicious use of UnmapMainImage
                                                                                                                PID:3884
                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                1⤵
                                                                                                                • Modifies registry class
                                                                                                                PID:3936
                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                                                1⤵
                                                                                                                  PID:3996
                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                  1⤵
                                                                                                                    PID:4176
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                                                    1⤵
                                                                                                                      PID:4432
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                      1⤵
                                                                                                                        PID:3648
                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                        1⤵
                                                                                                                          PID:2664
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                          1⤵
                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                          PID:1080
                                                                                                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                          1⤵
                                                                                                                          • Drops file in System32 directory
                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                          PID:1324
                                                                                                                        • C:\Windows\system32\SppExtComObj.exe
                                                                                                                          C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:1512
                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                            C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                            1⤵
                                                                                                                              PID:2844
                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                              1⤵
                                                                                                                                PID:2504
                                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                1⤵
                                                                                                                                • Drops file in System32 directory
                                                                                                                                PID:2092
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                1⤵
                                                                                                                                  PID:4148
                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                  1⤵
                                                                                                                                    PID:4228
                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                      PID:5032
                                                                                                                                    • C:\Windows\System32\rundll32.exe
                                                                                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                      1⤵
                                                                                                                                        PID:4524
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                        1⤵
                                                                                                                                          PID:4748
                                                                                                                                        • C:\Windows\System32\svchost.exe
                                                                                                                                          C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                          1⤵
                                                                                                                                            PID:4956
                                                                                                                                            • C:\Windows\system32\werfault.exe
                                                                                                                                              werfault.exe /h /shared Global\67660ae6e7744ef2b1ef630fad0fc417 /t 1216 /p 3580
                                                                                                                                              2⤵
                                                                                                                                                PID:4036
                                                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}
                                                                                                                                              1⤵
                                                                                                                                                PID:4872
                                                                                                                                              • C:\Windows\system32\ApplicationFrameHost.exe
                                                                                                                                                C:\Windows\system32\ApplicationFrameHost.exe -Embedding
                                                                                                                                                1⤵
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:5276
                                                                                                                                              • C:\Windows\ImmersiveControlPanel\SystemSettings.exe
                                                                                                                                                "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel
                                                                                                                                                1⤵
                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                • Checks SCSI registry key(s)
                                                                                                                                                • Checks processor information in registry
                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                • Modifies registry class
                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                PID:5924
                                                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                1⤵
                                                                                                                                                  PID:5720
                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                                                                                                                  1⤵
                                                                                                                                                    PID:5232
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc
                                                                                                                                                    1⤵
                                                                                                                                                      PID:5396
                                                                                                                                                    • C:\Windows\System32\oobe\UserOOBEBroker.exe
                                                                                                                                                      C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                                                                                                                                                      1⤵
                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                      PID:7564
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                                                                                                                                                      1⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:7628
                                                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                      1⤵
                                                                                                                                                        PID:7644
                                                                                                                                                      • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                                        "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:6008
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:6260
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:6296
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:6644
                                                                                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                                                                                        C:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}
                                                                                                                                                        1⤵
                                                                                                                                                          PID:5984

                                                                                                                                                        Network

                                                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                                                        Replay Monitor

                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                        Downloads

                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D

                                                                                                                                                          Filesize

                                                                                                                                                          400B

                                                                                                                                                          MD5

                                                                                                                                                          b14a19d72b1e8dad569764e6c075c0cf

                                                                                                                                                          SHA1

                                                                                                                                                          17ae4e58d1a78c1c7b64bbc018f9e78892cd946a

                                                                                                                                                          SHA256

                                                                                                                                                          aae97bfdaed97bad69f05f0f5dbcd86bc8dbf1dbdae2f8d98246658724b069c9

                                                                                                                                                          SHA512

                                                                                                                                                          1f6f33869cee91e6d83726097e140975546b09fd65d3104aa43bc878bb7751b2a6f2872ef38685aa68f04a6da668daf5587a6dd9500066f299bc9456efb097d3

                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                                                          Filesize

                                                                                                                                                          328B

                                                                                                                                                          MD5

                                                                                                                                                          ff28fa1b1351ce4e782e3d24b4a49aaa

                                                                                                                                                          SHA1

                                                                                                                                                          bc90c5487596704f48dfc7d84ed59c3f18ee1883

                                                                                                                                                          SHA256

                                                                                                                                                          793b5e3f9374bdbb17c8d2dfdf8591ef5442bd23d08ac77ab95a7e1ecd25e0ad

                                                                                                                                                          SHA512

                                                                                                                                                          56d2b696ee6042b8b4de91d92670612743cd5d8f148a9aa59ea5a1a544cc047d22789327bd119283253e6ac62a928277fcda66cabba6d64d0c3be88d400f3e83

                                                                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                                                                                                                                                          Filesize

                                                                                                                                                          412B

                                                                                                                                                          MD5

                                                                                                                                                          abdcc07acfce691be41733af0e8b196e

                                                                                                                                                          SHA1

                                                                                                                                                          3f0f04b0ae3d003b3b5dae1de62e70f9b095c2f9

                                                                                                                                                          SHA256

                                                                                                                                                          6ccfcab6141442c4d8d0efdbbef41292cd5527d42111521c95098cbd343d6281

                                                                                                                                                          SHA512

                                                                                                                                                          cf29783083bd809a17bc5c0aebe7dbfff976927a6ed2e562b96256184f9c83a6b3a3ab88ca376822562299e6bf2e38a75fd6697b7dae3f8e5d556ea46af78f13

                                                                                                                                                        • C:\Users\Admin\AppData\Local\D3DSCache\d1045fa42060dcaf\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                                                                                                                          Filesize

                                                                                                                                                          64KB

                                                                                                                                                          MD5

                                                                                                                                                          b0a40f6847934b610c24822c5c1e60b4

                                                                                                                                                          SHA1

                                                                                                                                                          7a984562d0765a185ab4af0f6b574b326410e7eb

                                                                                                                                                          SHA256

                                                                                                                                                          baa3c6350471601390dda37570a20a23567c582df132eb0fbe997f36ac831da2

                                                                                                                                                          SHA512

                                                                                                                                                          05453981b9bd66438c4e707a2763e00f58929f41bc2802f01ba240f3d7d46a6f2a7be9c28192ba783ef42c33d0f1e50766a70edbd61e8c48f299e0da75712a8f

                                                                                                                                                        • C:\Users\Admin\AppData\Local\D3DSCache\d1045fa42060dcaf\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                                                                                                                          Filesize

                                                                                                                                                          4B

                                                                                                                                                          MD5

                                                                                                                                                          f49655f856acb8884cc0ace29216f511

                                                                                                                                                          SHA1

                                                                                                                                                          cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                                                                                                                          SHA256

                                                                                                                                                          7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                                                                                                                          SHA512

                                                                                                                                                          599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                                                                                                                        • C:\Users\Admin\AppData\Local\D3DSCache\d1045fa42060dcaf\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                                                                                                                          Filesize

                                                                                                                                                          992B

                                                                                                                                                          MD5

                                                                                                                                                          2e286dd0367aaf12ac7a61923b48c1e6

                                                                                                                                                          SHA1

                                                                                                                                                          6757cfcc28a86552fa5d535bd8e2c247ef7b722d

                                                                                                                                                          SHA256

                                                                                                                                                          d33e3afd37e7150f69f78c16355a039925bb53b624587ef37727f8954c801973

                                                                                                                                                          SHA512

                                                                                                                                                          c347fd6731e59da059863918e3bafa07bd50ea8f3e6f88ad8837b3301c3971376a0665d081df3d8501ae5538a306a97f06e237e679ea3bd725256cb497307511

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                          Filesize

                                                                                                                                                          152B

                                                                                                                                                          MD5

                                                                                                                                                          e9a2c784e6d797d91d4b8612e14d51bd

                                                                                                                                                          SHA1

                                                                                                                                                          25e2b07c396ee82e4404af09424f747fc05f04c2

                                                                                                                                                          SHA256

                                                                                                                                                          18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                                                                                                                                                          SHA512

                                                                                                                                                          fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                          Filesize

                                                                                                                                                          152B

                                                                                                                                                          MD5

                                                                                                                                                          1fc959921446fa3ab5813f75ca4d0235

                                                                                                                                                          SHA1

                                                                                                                                                          0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                                                                                                                                                          SHA256

                                                                                                                                                          1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                                                                                                                                                          SHA512

                                                                                                                                                          899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                          Filesize

                                                                                                                                                          72B

                                                                                                                                                          MD5

                                                                                                                                                          68a8f1d9d10be68673daf45ec03d23fc

                                                                                                                                                          SHA1

                                                                                                                                                          60b79884b4afcfaac4aa09b982cfc0fd840c11bc

                                                                                                                                                          SHA256

                                                                                                                                                          08c9dbaf5204af9fdd7fe466d1e4b255c3921b0fc2b62e8d31d2660dbf839f89

                                                                                                                                                          SHA512

                                                                                                                                                          bc065dbc989c19e83a07c782dca9ba8ec92ab5d586aa3194a429b3fe3c8ad392332bf7d9acd09eb963cab2698341da98ee002a383f4cbab77792a4345517adba

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          63281958a6506f9562f9035af3630e7b

                                                                                                                                                          SHA1

                                                                                                                                                          965ca382ccddcfb22c2ef5fb4fe02dd1dcfeb017

                                                                                                                                                          SHA256

                                                                                                                                                          73ba6c1e501d099663adba47f38b0f381d8bbbe7482c9481d21598d8ead64ad7

                                                                                                                                                          SHA512

                                                                                                                                                          80ee82319198f2a553341d38620c5b44d77962200a2d308183d153fae19214ae88c4753e694357d5f2993f51c85497387af4f3c612550b05d90673c633f1efdc

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                          Filesize

                                                                                                                                                          719B

                                                                                                                                                          MD5

                                                                                                                                                          23fc28ba429bcf8231cebbc351f290cb

                                                                                                                                                          SHA1

                                                                                                                                                          5244cf61a27697298c30eb44b76abdaae420d2b9

                                                                                                                                                          SHA256

                                                                                                                                                          a98fa8268a5e33f7e378e27b1eaf74fb68a31e71b5fbef6f1058bda728e7d917

                                                                                                                                                          SHA512

                                                                                                                                                          fd6244dd495e27b76a652812f773cac594f01ebe73e8fa46b0fc7ebb5547de9995b6b1beb29d88acdfee737841a11feb42e63d2dbb54f250ee31ad9acc7cb78d

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                          Filesize

                                                                                                                                                          5KB

                                                                                                                                                          MD5

                                                                                                                                                          c9a61bcc2e5dc46ee754fd9bf4033f2d

                                                                                                                                                          SHA1

                                                                                                                                                          3a208a5b491b06bb636fac76dee6d49154d68c54

                                                                                                                                                          SHA256

                                                                                                                                                          c70de4a3923b59a6d806d088b105978c8eeb014cecf0317fae019eba1abcf27e

                                                                                                                                                          SHA512

                                                                                                                                                          e64cc165dded063cedeab930409f27b3f9177e21c317af621554d21c8f9fcaa71dc87b6c53adff831c3f3d8756090b98c6414d7963a5b00d8b3e78810e30aa7b

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                          Filesize

                                                                                                                                                          6KB

                                                                                                                                                          MD5

                                                                                                                                                          5505a2cf9900081da9609aa88951144f

                                                                                                                                                          SHA1

                                                                                                                                                          a46bb307498005a274bf43fd7a3b33e61f3eef32

                                                                                                                                                          SHA256

                                                                                                                                                          8676dbcf50ed1c649d6347e79160c836d454f1549079e28db20455d6a2de36e2

                                                                                                                                                          SHA512

                                                                                                                                                          f354a4bf0063e81d21266f20cd13d88dbcf551bbc5ae7c061daffd15c8099013c074ce598da1a70d6993d1dcb65e8150b96ce4ebd1bf9e50f20b9cc8f7a1a38f

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                          Filesize

                                                                                                                                                          6KB

                                                                                                                                                          MD5

                                                                                                                                                          7d08a42b07710de480ab5096277b2dd8

                                                                                                                                                          SHA1

                                                                                                                                                          4ab4c9dffd422744b6dfa6273d45932b6934cc97

                                                                                                                                                          SHA256

                                                                                                                                                          24a8eaa684934fcf447759a4f6c0c22da965b05236e3e3588c1018c506540c08

                                                                                                                                                          SHA512

                                                                                                                                                          39d374aee55e0e28d06f61c51f17a4a0e4a540546f11067b59b1b28d94dafa33ad6e7e647667c7c9b6d1bc25fba93fea2fae0bef6cc5f70b8c32c85abb12cc7b

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          e64ec6524fe4e9e5f13af224b2c972fd

                                                                                                                                                          SHA1

                                                                                                                                                          daf7dd104c172a2045fcbb10e9b626f9960c22dd

                                                                                                                                                          SHA256

                                                                                                                                                          3dd4c1efe6a8dc8aacac8c4834d4628d3c52488fa1221752b4a9747895c5ec86

                                                                                                                                                          SHA512

                                                                                                                                                          3683a358dd2db5c2b0dc994038ccf3fd9099da2777c2a3324f2e813d363e1752201ab652cc277aa6ea2d56f6e210e421229ce1a7b5f4d2a8ba314e3b5b24eedb

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58395b.TMP

                                                                                                                                                          Filesize

                                                                                                                                                          372B

                                                                                                                                                          MD5

                                                                                                                                                          57b56cd6714ee326f40569e04d9fdc33

                                                                                                                                                          SHA1

                                                                                                                                                          eb001045b3228c84c40ea37d358ba9797146c1da

                                                                                                                                                          SHA256

                                                                                                                                                          536faf2f6fd50fef03f932d85ceefe1a757065f32b7f9b88d6bf2dbd349377a1

                                                                                                                                                          SHA512

                                                                                                                                                          55cb36848fa8f996d3e5d6e9a3fcfb107c591d970ab7dd0e8ae963a8b8b6b05cb6d31f59896b1a0c77366feb45865f43b28dda409ca0a7a867182e20fb7f208b

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                          Filesize

                                                                                                                                                          16B

                                                                                                                                                          MD5

                                                                                                                                                          6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                          SHA1

                                                                                                                                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                          SHA256

                                                                                                                                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                          SHA512

                                                                                                                                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                          Filesize

                                                                                                                                                          11KB

                                                                                                                                                          MD5

                                                                                                                                                          3eac4972b22b5108fadffe9f8d14c955

                                                                                                                                                          SHA1

                                                                                                                                                          aeb6a50d013c451aec2406b621bec3b6567b0aad

                                                                                                                                                          SHA256

                                                                                                                                                          a523000b0944ddebb34b9e380c6d6941aa5784f68dea1ac3bd4b28ede14426dc

                                                                                                                                                          SHA512

                                                                                                                                                          5deef816257c5fefe21c56aa9f3d54a97df74918673e00f19ea21f67e2738e90318f212fd0ee3524030ed98f2c548fbc7587174e5a4d08ee108aaa6d5f4ea00e

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                          Filesize

                                                                                                                                                          10KB

                                                                                                                                                          MD5

                                                                                                                                                          c177a794e0a83de226ffe44a1bddacdd

                                                                                                                                                          SHA1

                                                                                                                                                          fcfb38a592d4decd76cc204aa53375f4ca855589

                                                                                                                                                          SHA256

                                                                                                                                                          fc3d613d931fc6e269995d6177e348ad5820591e463b84fb84d33a9ea4ac6c54

                                                                                                                                                          SHA512

                                                                                                                                                          db184266d29e9ff8b79f81d4de51cc59201bf49d9359328431e49d8167920daca314f9404761928d4c2f53581f8b7ad509f9db586192d82580a3abe7727e50ae

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          76f78e3e5c1037907fb39472ed929f93

                                                                                                                                                          SHA1

                                                                                                                                                          05a3b3be7efecee2adcc7e3dc3da2a48173ddc64

                                                                                                                                                          SHA256

                                                                                                                                                          2a340d9f2006a1c4a7aab982e7d873581492bc9e48e5cb8bcc6e90b9250eb241

                                                                                                                                                          SHA512

                                                                                                                                                          3b99e6c4a7255429c90cbe8b467b9150830f5741b043610713f02c410afabf083566f9e36dafab5e8ce349132272524689a5b27d6eb6c69021673f73353d3bd1

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          48b0eaf1bb162151984a1a5e8f42f5d2

                                                                                                                                                          SHA1

                                                                                                                                                          1b76807636ca871614f8a6651b69db7f4d321c4c

                                                                                                                                                          SHA256

                                                                                                                                                          80cce177d970965bb35cb376bb1c4e9f8da4a4f131286f2a3279ee3e8aa52260

                                                                                                                                                          SHA512

                                                                                                                                                          dd047d6e834769783bd1fa285b9d09e37ef6cb30acc57a0079ebb95e6a595faa2da854fc0d9d14e22dd300328ceb0ff7a54c5b6f1ab542f25f8ad02be844b32d

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          af4a155ac3f8681f96a9497a8e4d466e

                                                                                                                                                          SHA1

                                                                                                                                                          f54c6751fb0e0e6d7b07d8c1a9045a80884d717a

                                                                                                                                                          SHA256

                                                                                                                                                          9339ace77cb337d1a875653e1b470d2c463420dd9a92c9a57c5d7a1430702c46

                                                                                                                                                          SHA512

                                                                                                                                                          d992b730e4f71c2afb7dd7540afba754e7dc177bab65616c0d94ac515f5d9f2e961de214a2e57ca2c3549768d092a5de43141e808e90a8dc2df98a7a93f02263

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          68c2368f8350fdfbfbf520a18aa6e322

                                                                                                                                                          SHA1

                                                                                                                                                          ed2c15bc40db6f3f7383900a9b20cffe270414db

                                                                                                                                                          SHA256

                                                                                                                                                          ff72162a5b7c5d0110202de3ec68eb24749a98e6b9176061e0be5165846fbefb

                                                                                                                                                          SHA512

                                                                                                                                                          4630a9cce40457bfead01b62d6b23064a5a08aee98dde35fe22085615af3013d521e3c252456ff3617fbc7208adb1610095ff7f2fee6c94e788069a81be5974e

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Themes\Custom.theme

                                                                                                                                                          Filesize

                                                                                                                                                          1KB

                                                                                                                                                          MD5

                                                                                                                                                          81beda1216d86da86d46e6722cc52902

                                                                                                                                                          SHA1

                                                                                                                                                          1f67adcd43502b0e1a4b2441b58120be4395696e

                                                                                                                                                          SHA256

                                                                                                                                                          13743ee7f4bb850512a4705376f9cae963cea98f77009642d1b034a6dd910f60

                                                                                                                                                          SHA512

                                                                                                                                                          cae9ba2e8a244a7faf577fa4ee8d5007a575f934a2329caeee3a2f3601a2c2157f3011ce89648426a4f6b1e62826f7ec67dc19e454644a94e9142d8755f384ae

                                                                                                                                                        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\8fbe8623-1c42-4217-b1af-2ae82869260c.down_data

                                                                                                                                                          Filesize

                                                                                                                                                          555KB

                                                                                                                                                          MD5

                                                                                                                                                          5683c0028832cae4ef93ca39c8ac5029

                                                                                                                                                          SHA1

                                                                                                                                                          248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                                                                                                                                                          SHA256

                                                                                                                                                          855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                                                                                                                                                          SHA512

                                                                                                                                                          aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                                                                                                                                                        • C:\Users\Admin\Downloads\Orbital.zip

                                                                                                                                                          Filesize

                                                                                                                                                          263KB

                                                                                                                                                          MD5

                                                                                                                                                          c4ccd9c5e716ef71827dc5d040ef17bc

                                                                                                                                                          SHA1

                                                                                                                                                          4125c4b181bf88fb6ce973db1c6bc9561a9271aa

                                                                                                                                                          SHA256

                                                                                                                                                          63a121192cf416ac3d3fcadbe4fdd47528791dc1a4292b766ba4d4bc0a7c260e

                                                                                                                                                          SHA512

                                                                                                                                                          86eec5d8d3c70aea560bace1323048b1f503938cfbc048ff2f25fa3db4e4bf8d10e7b8dd87dcedc54d5698dc45ca077002f28339e4f1d08c4f27261087f75f30

                                                                                                                                                        • C:\Users\Admin\Downloads\Orbital.zip:Zone.Identifier

                                                                                                                                                          Filesize

                                                                                                                                                          626B

                                                                                                                                                          MD5

                                                                                                                                                          3fb89c7dbaaaa8b7f97e392adc38ea2f

                                                                                                                                                          SHA1

                                                                                                                                                          581c3b2434a1228b0faf482d9dbe5bf2277974c7

                                                                                                                                                          SHA256

                                                                                                                                                          4a6308a758d24dbea45c11bd9de9afbe7a627ff2630d9f2a6a83446877e11fdc

                                                                                                                                                          SHA512

                                                                                                                                                          45e92a8ba9696ee211c8f919a40f1bf202e6740819bf4912bbea5c485f001993e62dda0b9ca1d426c83a0be3341700c9995129054ff91d67d7c3f2704c182170

                                                                                                                                                        • C:\Windows\Panther\UnattendGC\diagerr.xml

                                                                                                                                                          Filesize

                                                                                                                                                          9KB

                                                                                                                                                          MD5

                                                                                                                                                          4f157b5055b21ae34028756156c332f4

                                                                                                                                                          SHA1

                                                                                                                                                          d9c1427ea79fcfb6187b32f206ff796c539e6f67

                                                                                                                                                          SHA256

                                                                                                                                                          35d66d80352ea77ddab275e0656bb5870bed7b7d60db2e6dc6d7626f63eceb7d

                                                                                                                                                          SHA512

                                                                                                                                                          5afd347c51f1176b9d2b7e98d2748e14a1c52751c1734e5b2c753a45c9b1e0f032aa0f4277cdb02712e29cf47b4d01a95d3677e854d936391f82ea13c362d71b

                                                                                                                                                        • C:\Windows\Panther\UnattendGC\diagwrn.xml

                                                                                                                                                          Filesize

                                                                                                                                                          10KB

                                                                                                                                                          MD5

                                                                                                                                                          9cedb829e302e2b712316919e9f14e47

                                                                                                                                                          SHA1

                                                                                                                                                          6324836e7802efbb5f41987efac6e1f0015611eb

                                                                                                                                                          SHA256

                                                                                                                                                          97142929bbe9cf39de7d69a3af19c7a1fd4db531f7e7851dbe20f36f746e416f

                                                                                                                                                          SHA512

                                                                                                                                                          d94a4925a276e148a679b88be740017a965dd6f8a815a5e57954a7f70c053f4896a7fad38b0fd192d28ee11f83d6ad321cb2ab68afaae11aed05afc76df78ade

                                                                                                                                                        • memory/468-316-0x000002D86A890000-0x000002D86A8BA000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          168KB

                                                                                                                                                        • memory/468-317-0x00007FFDA9AD0000-0x00007FFDA9AE0000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          64KB

                                                                                                                                                        • memory/632-308-0x00007FFDA9AD0000-0x00007FFDA9AE0000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          64KB

                                                                                                                                                        • memory/632-307-0x0000018C24430000-0x0000018C2445A000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          168KB

                                                                                                                                                        • memory/632-306-0x0000018C24400000-0x0000018C24423000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          140KB

                                                                                                                                                        • memory/696-312-0x00007FFDA9AD0000-0x00007FFDA9AE0000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          64KB

                                                                                                                                                        • memory/696-311-0x000002AD9DE30000-0x000002AD9DE5A000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          168KB

                                                                                                                                                        • memory/1016-299-0x00007FFDE89E0000-0x00007FFDE8A9D000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          756KB

                                                                                                                                                        • memory/1016-293-0x00000205001D0000-0x0000020500392000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          1.8MB

                                                                                                                                                        • memory/1016-1498-0x00000204813F0000-0x00000204816BA000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          2.8MB

                                                                                                                                                        • memory/1016-298-0x00007FFDE9A40000-0x00007FFDE9C49000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          2.0MB

                                                                                                                                                        • memory/1016-297-0x0000020480BA0000-0x0000020480BDE000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          248KB

                                                                                                                                                        • memory/1016-295-0x00000204809C0000-0x0000020480B73000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          1.7MB

                                                                                                                                                        • memory/1016-1477-0x00000204E6540000-0x00000204E655E000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          120KB

                                                                                                                                                        • memory/1016-1476-0x00000204813E0000-0x00000204813F2000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          72KB

                                                                                                                                                        • memory/1016-1436-0x0000020480C10000-0x0000020480C1E000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          56KB

                                                                                                                                                        • memory/1016-294-0x0000020480EB0000-0x00000204813D8000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          5.2MB

                                                                                                                                                        • memory/1016-1475-0x00000204FFF70000-0x00000204FFFE6000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          472KB

                                                                                                                                                        • memory/1016-292-0x00000204E60A0000-0x00000204E60B8000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          96KB

                                                                                                                                                        • memory/2232-352-0x000002C4B9580000-0x000002C4B95AA000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          168KB

                                                                                                                                                        • memory/2232-353-0x00007FFDA9AD0000-0x00007FFDA9AE0000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          64KB

                                                                                                                                                        • memory/3316-359-0x00007FFDA9AD0000-0x00007FFDA9AE0000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          64KB

                                                                                                                                                        • memory/3316-358-0x0000000007550000-0x000000000757A000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          168KB

                                                                                                                                                        • memory/4552-304-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          256KB

                                                                                                                                                        • memory/4552-302-0x00007FFDE9A40000-0x00007FFDE9C49000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          2.0MB

                                                                                                                                                        • memory/4552-303-0x00007FFDE89E0000-0x00007FFDE8A9D000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          756KB

                                                                                                                                                        • memory/4552-301-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          256KB

                                                                                                                                                        • memory/4552-300-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                                          Filesize

                                                                                                                                                          256KB