Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
11/01/2025, 18:34
250111-w7rfqaykfr 1011/01/2025, 18:31
250111-w55kkawkav 1011/01/2025, 18:28
250111-w4bk4ayjhj 9Analysis
-
max time kernel
459s -
max time network
456s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 18:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___3UG5_.txt
cerber
http://xpcx6erilkjced3j.onion/C22B-388E-C575-0098-BBF4
http://xpcx6erilkjced3j.1n5mod.top/C22B-388E-C575-0098-BBF4
http://xpcx6erilkjced3j.19kdeh.top/C22B-388E-C575-0098-BBF4
http://xpcx6erilkjced3j.1mpsnr.top/C22B-388E-C575-0098-BBF4
http://xpcx6erilkjced3j.18ey8e.top/C22B-388E-C575-0098-BBF4
http://xpcx6erilkjced3j.17gcun.top/C22B-388E-C575-0098-BBF4
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Cerber family
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\Downloads\\Birele.exe" Birele.exe -
mimikatz is an open source tool to dump credentials on Windows 1 IoCs
resource yara_rule behavioral1/files/0x000600000001e0f1-811.dat mimikatz -
Contacts a large (1122) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3340 netsh.exe 4940 netsh.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation NotPetya.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Cerber5.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\word\startup\ Cerber5.exe -
Executes dropped EXE 8 IoCs
pid Process 2324 NotPetya.exe 3952 1D15.tmp 728 NotPetya.exe 1732 NotPetya.exe 1212 Cerber5.exe 1580 Cerber5.exe 4576 Cerber5.exe 3272 Birele.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Birele.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Birele.exe -
Loads dropped DLL 3 IoCs
pid Process 4784 rundll32.exe 8 rundll32.exe 2068 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Users\\Admin\\Downloads\\Birele.exe" Birele.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\w: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\o: Cerber5.exe File opened (read-only) \??\n: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\w: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\l: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\w: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\l: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\y: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\v: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\a: Cerber5.exe File opened (read-only) \??\h: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\s: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe File opened (read-only) \??\x: Cerber5.exe File opened (read-only) \??\j: Cerber5.exe File opened (read-only) \??\p: Cerber5.exe File opened (read-only) \??\m: Cerber5.exe File opened (read-only) \??\t: Cerber5.exe File opened (read-only) \??\b: Cerber5.exe File opened (read-only) \??\i: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\q: Cerber5.exe File opened (read-only) \??\t: Cerber5.exe File opened (read-only) \??\e: Cerber5.exe File opened (read-only) \??\g: Cerber5.exe File opened (read-only) \??\k: Cerber5.exe File opened (read-only) \??\z: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\r: Cerber5.exe File opened (read-only) \??\u: Cerber5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 83 raw.githubusercontent.com 84 raw.githubusercontent.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\the bat! Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\documents Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\desktop Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\bitcoin Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\thunderbird Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\SysWOW64\config\systemprofile\appdata\roaming\powerpoint Cerber5.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp29E1.bmp" Cerber5.exe -
resource yara_rule behavioral1/files/0x0006000000022eb4-1539.dat upx behavioral1/memory/3272-1574-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral1/memory/3272-1587-0x0000000000400000-0x0000000000438000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.h rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgePackages.h rundll32.exe File opened for modification \??\c:\program files (x86)\microsoft sql server Cerber5.exe File opened for modification \??\c:\program files (x86)\thunderbird Cerber5.exe File opened for modification \??\c:\program files (x86)\word Cerber5.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\amd64\jvm.cfg rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.XLS rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileAcrobatCard_Light.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Bus Schedule.pdf rundll32.exe File opened for modification \??\c:\program files\ Cerber5.exe File opened for modification \??\c:\program files (x86)\steam Cerber5.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC rundll32.exe File opened for modification C:\Program Files\RegisterApprove.xlsx rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\Words.pdf rundll32.exe File opened for modification \??\c:\program files (x86)\office Cerber5.exe File opened for modification \??\c:\program files (x86)\the bat! Cerber5.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\amd64\jvm.cfg rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.PPT rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\java.settings.cfg rundll32.exe File opened for modification \??\c:\program files (x86)\microsoft\excel Cerber5.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\ffjcext.zip rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\DefaultID.pdf rundll32.exe File opened for modification \??\c:\program files (x86)\powerpoint Cerber5.exe File opened for modification \??\c:\program files (x86)\onenote Cerber5.exe File opened for modification C:\Program Files\ApproveOptimize.7z rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jni.h rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Adobe Acrobat Pro DC.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Adobe Cloud Services.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\assets\Sample Files\Complex Machine.pdf rundll32.exe File opened for modification \??\c:\program files (x86)\ Cerber5.exe File opened for modification C:\Program Files\MoveFormat.doc rundll32.exe File opened for modification \??\c:\program files (x86)\excel Cerber5.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jawt.h rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\jni_md.h rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\ffjcext.zip rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.PPT rundll32.exe File opened for modification C:\Program Files\SearchStart.dwg rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmticmlr.h rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf rundll32.exe File opened for modification \??\c:\program files (x86)\microsoft\outlook Cerber5.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jdwpTransport.h rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SAMPLES\SOLVSAMP.XLS rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Click on 'Change' to select default PDF handler.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\AdobeID.pdf rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf rundll32.exe File opened for modification \??\c:\program files (x86)\outlook Cerber5.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrome.7z rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\classfile_constants.h rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\ENUtxt.pdf rundll32.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.XLS rundll32.exe File opened for modification C:\Program Files\MountReset.zip rundll32.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.cfg rundll32.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Archive.zip rundll32.exe File opened for modification C:\Program Files\OutClear.php rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileScanCard_Dark.pdf rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmti.h rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\bridge\AccessBridgeCalls.c rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\jawt_md.h rundll32.exe File opened for modification C:\Program Files\Java\jdk-1.8\javafx-src.zip rundll32.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.VBS rundll32.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\perfc.dat NotPetya.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\thunderbird Cerber5.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File opened for modification \??\c:\windows\ Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\outlook Cerber5.exe File created C:\Windows\perfc.dat NotPetya.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\excel Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\thunderbird Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\thunderbird Cerber5.exe File opened for modification C:\Windows\perfc.dat rundll32.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\documents Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\outlook Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\powerpoint Cerber5.exe File created C:\Windows\perfc.dat NotPetya.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\microsoft sql server Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\microsoft\office Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\the bat! Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\roaming\bitcoin Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\microsoft\powerpoint Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\microsoft\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\onenote Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\local\steam Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\localservice\appdata\local\word Cerber5.exe File opened for modification \??\c:\windows\serviceprofiles\networkservice\appdata\roaming\the bat! Cerber5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Birele.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NotPetya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cerber5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4824 cmd.exe 928 PING.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 2 IoCs
pid Process 3704 taskkill.exe 4236 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings Cerber5.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings msedge.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 327157.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 867427.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 533318.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 861986.crdownload:SmartScreen msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4796 NOTEPAD.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 928 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 2344 msedge.exe 2344 msedge.exe 4892 chrome.exe 4892 chrome.exe 4228 identity_helper.exe 4228 identity_helper.exe 1460 msedge.exe 1460 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 2892 msedge.exe 2892 msedge.exe 4784 rundll32.exe 4784 rundll32.exe 3952 1D15.tmp 3952 1D15.tmp 3952 1D15.tmp 3952 1D15.tmp 3952 1D15.tmp 3952 1D15.tmp 3952 1D15.tmp 8 rundll32.exe 8 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe 3440 msedge.exe 3440 msedge.exe 4956 msedge.exe 4956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 33 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4892 chrome.exe Token: SeCreatePagefilePrivilege 4892 chrome.exe Token: SeShutdownPrivilege 4784 rundll32.exe Token: SeDebugPrivilege 4784 rundll32.exe Token: SeTcbPrivilege 4784 rundll32.exe Token: SeDebugPrivilege 3952 1D15.tmp Token: SeShutdownPrivilege 8 rundll32.exe Token: SeDebugPrivilege 8 rundll32.exe Token: SeTcbPrivilege 8 rundll32.exe Token: SeShutdownPrivilege 2068 rundll32.exe Token: SeDebugPrivilege 2068 rundll32.exe Token: SeTcbPrivilege 2068 rundll32.exe Token: SeShutdownPrivilege 1212 Cerber5.exe Token: SeCreatePagefilePrivilege 1212 Cerber5.exe Token: SeDebugPrivilege 3704 taskkill.exe Token: SeDebugPrivilege 4236 taskkill.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 4892 chrome.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2324 NotPetya.exe 728 NotPetya.exe 1732 NotPetya.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 3248 2344 msedge.exe 83 PID 2344 wrote to memory of 3248 2344 msedge.exe 83 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3348 2344 msedge.exe 84 PID 2344 wrote to memory of 3720 2344 msedge.exe 85 PID 2344 wrote to memory of 3720 2344 msedge.exe 85 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86 PID 2344 wrote to memory of 2584 2344 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe4,0x108,0x7ffe93b346f8,0x7ffe93b34708,0x7ffe93b347182⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3020 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Users\Admin\Downloads\NotPetya.exe"C:\Users\Admin\Downloads\NotPetya.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #13⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784 -
C:\Windows\SysWOW64\cmd.exe/c schtasks /Create /SC once /TN "" /TR "C:\Windows\system32\shutdown.exe /r /f" /ST 19:424⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC once /TN "" /TR "C:\Windows\system32\shutdown.exe /r /f" /ST 19:425⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\1D15.tmp"C:\Users\Admin\AppData\Local\Temp\1D15.tmp" \\.\pipe\{DD75AFF2-9D55-4E28-8DD6-E053902C3191}4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1988 /prefetch:82⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall set allprofiles state on3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3340
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\system32\netsh.exe advfirewall reset3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4940
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___K3P6_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:180
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___I3B4SZ_.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4824 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "C"4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:928
-
-
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Users\Admin\Downloads\Cerber5.exe"C:\Users\Admin\Downloads\Cerber5.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6580 /prefetch:82⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,7853387581743891139,14161700972172212376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Users\Admin\Downloads\Birele.exe"C:\Users\Admin\Downloads\Birele.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3272 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0x80,0x104,0x7ffe834bcc40,0x7ffe834bcc4c,0x7ffe834bcc582⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,2500733694552754050,15886920271576319351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,2500733694552754050,15886920271576319351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:32⤵PID:264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,2500733694552754050,15886920271576319351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2444 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,2500733694552754050,15886920271576319351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,2500733694552754050,15886920271576319351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3660,i,2500733694552754050,15886920271576319351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1060
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2068
-
C:\Users\Admin\Downloads\NotPetya.exe"C:\Users\Admin\Downloads\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:728 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Users\Admin\Downloads\NotPetya.exe"C:\Users\Admin\Downloads\NotPetya.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\perfc.dat #12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\7ca2919aa04f483d9e75b699338da9e3 /t 464 /p 1801⤵PID:508
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Safe Mode Boot
1Modify Registry
3Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54a9f36a2b3046e1ae417691cfdac118d
SHA1e4374f393f2340f33da4ebe997e6284eaa3a941e
SHA2565c808ec63217b6f3e12b495cbd8972dd1a93b495145297b2a33f6301740478da
SHA5125aec4459c6325b24ed51040bdd97ea0e1e263e2d63071f1598814e1f12c0f1340a00e84795df629539210b7b9ea59fd9a7a373eaa091f9d345d9332799039b0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5d37b51768a93c98a006b0b4747c21c64
SHA123f9753240e4c294af97810053db627d3582edd6
SHA25633757c97e27e185df57318d659118f55089be4b14558330c58fbe76c37527208
SHA512c0d89378a6decc0d34cd2c952c1b03e88599a6e0a286a3719df37dd5433a18e955639769a5830edc610fd77691276a7f469178256457e381f12353fb10b6c639
-
Filesize
8KB
MD5f8b4beccc5e3e103bdf38a91a2668577
SHA1361c2b3eff30f2970ddca0a6471d4090cbbeb441
SHA2560c4273592f19d11efaaae026296de8536b3016e734e21c71d0ae4bb889f1a2d7
SHA51235d9095ecad549493385566d5488fb32e9fef64ce7fbd3a737224710212e22c3c4e37798c1ebae2ae7328ffa68519ed1701061c1c898ee25215dfd6382328993
-
Filesize
116KB
MD56ac6f5ad0204f0abe59ef844caa11139
SHA15f35a269f2011dc6c8c81b0dbe090a96f07d38a2
SHA256259119d0207d3b9b994595280db8e3b8881eb51cbd6c133f88c2353874c0d94a
SHA51232624131a317b84adcd02689e5adc49d3e22342e6a15fef2b9dface378429eda5f1428387eea16168c20d2bd7cafefa611babea5629878e999bb039c95bbae76
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
26KB
MD53db01f3289b7517e321aac642a91c7f3
SHA14d54518f6f94dbe3e4e0cd7cc0d13698272d197f
SHA25645c8217bf1571647763788b5472b9621330f6b065ea3107e2c6340a60ccb73a1
SHA51269e7726636a206b910a971c00bb9a2a79835e5f98bc588158f62484ae77cfed138f8741e68b6d69ce77830420bb87df46762c51862a80f01d04112a3561673cc
-
Filesize
72KB
MD5ddcea333404fd54b4a51e2427ab5f994
SHA1c4354ab2a24128b7e463b953d34cac454f0bc7bc
SHA256fce818b996b32db8b5d2d8c405834e57ee458fb3b2399cf284bc099f2c4e4c01
SHA51232dcd6090185b9b1a45fa83fc2232a47c47abbb41fa8e270275912e7794e3f47e05c5a96eeb6902e9c3c7699633782ad6481b6120165cffaff29a31e92977745
-
Filesize
153KB
MD5237f4a0afbdb652fb2330ee7e1567dd3
SHA169335cd6a6ac82253ea5545899cccde35af39131
SHA2561f0189e087fcefbf654fad74a3a06668b782c01353a61d5c0b7f0bf23e33c020
SHA51227e8e1f91507179c207f93a19485738ed5d372a977eb27d44a4ed163013097d38b117c7a5bf4336ecc9862ca514d78ffcd2b8a07e304bbfe1b2cce9c087baa38
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD55d2ab8a2c64e03cfb414d3197e33dd52
SHA1d11511cad05e081c026ddb2914db5f7743cbf6b2
SHA2562643b1a840de050b6c23f2590b1d183defc1b959e2276efa0543b3a1ae8d060c
SHA512405298f00afbb083cc97f10bfe2b696a4f320a0153cc22bf12611c84d23344d0c349db2de09a26c7b390497de24e2fd829b6524052e19d22b2a97d6678bf7ae6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD582e95fb3671d301aea528a2669e4a866
SHA13eef6dc20a2354dad7ac854732a74d4e818b7477
SHA2566495bcd76f41d096adcb161cb0273d3cd0b66192f2e32c3f41e3357e91556b5d
SHA51287396bd282bb8b05e87e744ac7fe0d3a03751039b69c45e6fa3918abc48405d92cfb46ca5a52e38da5da408f631c17dcfb6cf2f55d73b5bf0df7443af2519b02
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d01e1c186f414226d9ad0fa2f08e032d
SHA17bb444dca5f340d6da71171f91f0687e629992c7
SHA256afa05d198371a1627cfaee811f99e8f3208a3c33712ca40d7bb0445e333e74d9
SHA5122a888d6712d6d093af5c7dcab440654649a3952f3c0bd33fb096211e3e69c5b3902aa27fc44449b1d7f4e9f6e0784dbc5aa0b764587c4de43ff67cb0dbc35e61
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5d9de1f55511b57eac00fa866fff897ea
SHA1974fb9e2e71c8fbcb720c4745056631c20b8da5c
SHA2567e44d0542380231de89a30624a5364e9005e52b79b532a4a373d8395468a69b5
SHA512b2526fffc209d1a5a2f59a2b3c405db72fe75b691885a4131ea2e22e9a85805c9a7baf28591e8f891b4dfdc844d1b4bb287574ce062499d62b7a3c54abba9c42
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5862e3ba36a853f137499182df0ceb0a2
SHA10623ba4affd6f8a1d97b71aec5a65c1a59eec48f
SHA256d191e9c5f3dd662105f8cc17a93b50c61818f8682c120a87b8e002941cb32769
SHA512757733501fab4dbc6207eb1e9c02bfc3dc19d7a79bbc0f4f38b1c98219fc962cf497f9b23571a34564522bc42c720e1695dd54ffd8457e54b84e6f670670c56e
-
Filesize
579B
MD5f27ed958e1ac5d59278dbe10e34865e2
SHA1c003f415b2942510a0f7adc5b41f7e2bc14394f4
SHA256c3a7404c67078e04ba08b496bd13fd25416feb35d6cd8c021b2a2f79fa7b1598
SHA512dff1a1812ff4e30dbd1cdc7addca61afed9db876813c13779446901ae0361e9cfa31ddcb67ab46a44d235971eabef17fc05f3badb926be3869ad9e2f6a43a049
-
Filesize
1KB
MD5e185f7de781cb504a782f4bfd8b54539
SHA1662b2cb23a552969884c0a29d81c26d27baad5bc
SHA256b39149d7377f0e690801748348dff0b25143d4d32ab70abbec30010689ca2675
SHA5128fcd9a78a9c9de48d8160681b35a61db933bb3c3e9ce75a7079296ec1d572cd5e72a7d17ce46c66da8e6a9bce215e6c0b6fef9c28d670ef587ed7be175e7387c
-
Filesize
938B
MD5c257fc47a452feecf21e0655f8e84a28
SHA16985445ce467d6ffc74ce7cd8b994c93546c285c
SHA256c8fa717a8f2f3e1f2c47ba32c9cf3439e0cef23d693d10501ae5fa43f2fcf08c
SHA512cb9cfa018dea6093785f83b612fe63b6de5d34d0b79ab48dceac803b12346a26f4d5c3be89e307994b00eeae27315392eb8ff67af6f107fe54f359988c88349c
-
Filesize
1KB
MD5ef0e08f756974cd25650942ef6f8d10a
SHA18f885a40d631a9eeaba8b7ea52ef360a36bc9130
SHA2565717670db556e9cef2cf21c8da479eb8e7be74fd2182c0511eaaa40e5b7b0996
SHA5124ad82e9e00d79ef77e0be701e467c27e6e9476c602a32fbac6141871e350a8df9f666c8413c181f4cbb0d139c65cd2abb76924c511504c7528027a5a581fbfab
-
Filesize
6KB
MD5a5e9b4e059b1e990a32e4c172c6046bd
SHA1f487e4d27ca6e22a10a1f73c61bb9a96c0757b85
SHA2569b5f2b068b8b994915aa4bc0e202c611f41e0f9c06f3678ec5b75509356eda3c
SHA5123d39333da8dedeee1fce06a9182499d7b017ea69a24322a80934ee6d493156e162c5340a80d1a96ddc45714e2771949aff2739c3bbcf1be0e934c3bbac304af3
-
Filesize
7KB
MD5053bb38be4c5525f4ae92525fb893a7f
SHA1eae26cf36d384ff2b4e4d13a19b9aa5b014a9542
SHA256427aa432fa51678e0fe207aa2d091c1a45ab43a028f02bba002bdcee1f93e11a
SHA5121dfd36659df3afd7f2afb6a84c6395865fb1475a42ad6f34ea6de7d9e47862d111bb82b003a6e237d212753483f5afa7204a608906ae0465d48532376b39bdd9
-
Filesize
7KB
MD5056a4d43172f194410680dad8b3d5e91
SHA1223b81456ac5d9f0cc58e839e52111bf2dc4465b
SHA25604ad25ab8015686911a30dde5f2db8a2efa9789f5d20cc084b6345c5e222ae27
SHA5125dbac1d61cf18c4703bffdc0069158e775724c376862f07d945ba9850d383c670cef38d862d2e68abbd957d5c4119389327cec202aaa307a54338072596fc7f6
-
Filesize
6KB
MD55990f7c381caa7e68e1c1defb8d8d8c0
SHA1204f2cdc41d7e626e445f2e90356a458bd695799
SHA256f86a914f1205a5685df2e0d381a45b19e11edb298ee53c9cadb256afe1d692e2
SHA5128cd808064e43caf1de74fc7016d643152d2035adb492d752b51b5314f4bb13312401082796771297d0249ac115d4eff11b27002fc360dda9389c05bcb36c3954
-
Filesize
7KB
MD5e5343e45421d0c5b83784c1e00c037e0
SHA1bb4e10009a315ec64fa6077fa0855602163ad1a2
SHA2563bed5ee384890607b6232e6b33b4a845957ae04f7048377fc965d2ca7436c912
SHA51226e5cc47ad92b29a809d573e0b6e9d1ec4ad3045d7208801f6e35259efdfcf5d8af5333bc42f2b327fb26d7f9f1516d259153671611024410813618aa1d8f37e
-
Filesize
7KB
MD5bdebab1799716a5c64c551081c6547f0
SHA10c436d6b1d864abcb0ff75d061b8f88142f38f0e
SHA2562a12c38d975ea6e95ecf7db95c72883686e0c97a36cba08a383766ab5e423071
SHA51229cbf72d1e0cb632b735b048968ff9f143459ce8b219fe459f948cc5ef00f87fc0811db88b31e838d0734403f6ebde8cd99da400a4212b87ffa0a695e063288c
-
Filesize
7KB
MD591c779f599af659f11052e2399a7e3c7
SHA1ba9eedf41cfb05707c5c749db701d83cdab632f6
SHA256689fffb67c58e560bd20ab4ea4be8af93dd004689a232e94831a1dd795d16417
SHA5127de4f0b1b266d99b1a1a7fd70779ef23e7ec413556061a6d8ee3bcfbc1f9f8a056738e3652d210416bc266748532ec2d545be51bfc5ee031e4b46c6961eddae9
-
Filesize
7KB
MD5069b78d980331138e4ffde57b8d7f9b3
SHA1d42820debb0b818003a33cf402d04d2d7ced0c79
SHA256656464af6473f8d34adb9c6273ff62ef2e04b1715c2e49121085f5c4fb871da4
SHA512ec61a780022845c16ad5ca13412f29869aca4703b2e5c5aaf2ad9fd22993200937710da740a6a3b4d1dcc3dd0fc6ac6c51cc65420a4550f305ad88ff039b164f
-
Filesize
5KB
MD516ea0df596a5719ccb068f8fe0cb1553
SHA1782ca793852e80a60bde1cbe70d0e6afa0b56789
SHA256249817f3835982a1d076c7d359c62ed6054bbaba4db16c2862d3eb9e848b69ea
SHA512021d0ff4f985a1877d714f43415a24733210577b2e9e6287f94657c1eaf228a05f2443836a7acf108eb5220c1797c2855f9d845b5db219a2488c281465565bff
-
Filesize
6KB
MD5052eb3c07158f64f7db633d47534c9ab
SHA1d21bb7afc4b17cf874a67b255f9b7de23c8e73b4
SHA2564ba046ed523a7e1d748cff36570e9c87008e0e1d1a8edbcbf36e252fbfc8f32e
SHA512dfa343f0eadf75f96cc0a3282bbab1624e95b0ad7cd62fe0fd75dd229e438c6756a610458818734477587e7a2554ff7025be111abcd892a84240a214938d8a07
-
Filesize
7KB
MD5339b5ae8a97ac8477095d8be740899a1
SHA1bc6a0139d8c95747835ff1fc8ba284edb7d89f54
SHA2561b6e884120cceb54f24c854cc70102526843ca08f64b0a4273448121b8e6985a
SHA512d31b268caf988fe3dcb0efc2607247aa68f8cc47a3f8e0331adc98704d46b8cac3d33502b022bb3509444333f186258a7b76ac3fc579ac13aac7451d0d613ceb
-
Filesize
6KB
MD580945dab1e7011eb5ba6e8097d9e1157
SHA1655d89835489198e5ceec65a617c576727bc259f
SHA256e5826e50cd1024acf5ea2f243a305009bf1c294428133e1c8f07ad3cf655fea1
SHA51221a15a28c0f58ccde8b7df4e808337d88bebf40d30a14804b27c2bd5cfb8f704740ff56c179eaa2b4d2be94ac6ff3c1d33ef725b53369f1e7ba29aaa8c249d06
-
Filesize
7KB
MD5f38acf71bf39880ec688ab6876ed58f2
SHA1382f98ccb1d42df51d6cacf958df39d2a07c9c65
SHA256753e7d87940f5eaa75a4570da6ccf91560a98677f74fd1de6cd35929853067bc
SHA512f82c5bb1e7e71a06b82e2b8ebb28a04db5649d6fca3058579808cbb5c56c85350d6dcac22d7b78e9e39690986659bf618fb8c86d8155a43b64f56ddfdb9e3964
-
Filesize
1KB
MD575e62b61649dd447d3e4920d2a57cbf2
SHA1c614c4fa16613d5c67a181ff781479163f28e0d6
SHA256873ea4ea2981205cb8beef49e794639786a6b3743d553db5cc5f5ddb724a8e87
SHA5123e2a96912efdac545a51b88c6bb40003a42945d4fc584ff11797972eb51ae20a14e65dddf42fbf7b2d8f707d29c4bbfbbb575e085b6d43eeaa3ab346bdaf7492
-
Filesize
1KB
MD54b0e5f4328b24f0e652140ae02bc7e9a
SHA1eae45db656bf0f9a9ac80a7194f4a9d7bdd7f7ab
SHA256f46d117a5ab40df57d87dbdf6acdd805b851c82beff93bb1be9d537e8541e25f
SHA512c99be8f733a8da2cb94e19c7af3381c217695d1a263fa9cc8de9484ef2b24b8ed6973e91f1b5f89dabc9aad46887846f0adb931fd3af5634dc4f57a2b10713ac
-
Filesize
1KB
MD56fb4c790fd7b7586342ba1d717e176e5
SHA16b8f6d8945910a9e223855e57ce176e4ee967cfb
SHA256db2790ceb2ba01e44953a03c225bf24527487fe163f09bb145f6dcf36895b7ac
SHA512ab1d370ca478d5ff139beb6f60fb23ceaff22dde2debc0c14365b966b6ba4e1b9fd0981f1a3e69cd951d8f096fc8b088a6dbfbaf3d867f79057159103797e00f
-
Filesize
1KB
MD55bf61c89a628d4fcaeb8ba90070544d5
SHA1ba39b4d8d6dfa0cac7e023a7bd79b61b26b582e4
SHA256b660050ad4be11d77bfab92a4e599e4ee998044b97f26ac621ddddc0869c7723
SHA512410612400bdb180f044e66435e9fc6b34c890c42dbda56fc07e19281f54f42ae83fe0db1e04790b048f6f0d7bcf9c13464891648274452b2c3661a9f4c0c5610
-
Filesize
1KB
MD564d7e785cbb878d1644b7f643b961baf
SHA1822fccd457e8b024a6ff3d13dab90c72e78ca9cb
SHA25683798d66f1a0a6bbf037cc6ef41f682264a2ef8fce4d3ecea335351ba444c7ad
SHA5127812c8616a25f8c4f56f982f96444707d63c6f5aaa468b6d11ffb8ed144db95821c1f3f21fb0464b91b36c684a3281ec08782b81d9b28c931a5e6c3f8ce2d5d9
-
Filesize
1KB
MD582315c6ff3127b141ffee2a8a185f0cf
SHA154c37f68fb1a9f7e0d27a2f19d5420e6df0b25cb
SHA256685a7f2ad2fa594d274e16c787cbfb2bdf10b289b77d68a408d180b7989f5852
SHA51220fed00210c2ee28996c7949734938b9fc128975d1089b65e3797baf756698b90e73055bd40346f2b87d8b0e27876daae51b6b5dfebffc3ad1129b96a6689318
-
Filesize
1KB
MD5e9bfca9f8f8de6ed94aceaaf4b84dec7
SHA112694b03a4e5da81b015a0819a13a451f20a8d37
SHA2564f637e031a336e7ac6600c923e05fb2286b424999b8dbba3914905f6dab65293
SHA5126c94e1fc1fa085116434062a86e379ca4b6aae84f9fea1c2dbc6a97348856abcb314294fd81f3960631f7639d36d7fea21a44b03d88e7cde4dcadcdf17bf9de0
-
Filesize
1KB
MD547e96ec783f61d91246dd703627c751b
SHA1f77513e75808b30310ef81d5b8c64c40be67031f
SHA256ce4cf1ab49815ec6355c32a9256762af6061cb04f4557ea5e886bf304c3a4155
SHA512688f0095f323e19554ab753d3b840414aeb63b7812da04589eae23e0a67cc8da1d723ad7459e881fa84d6967e01fdc3db40da039dcc599a1e6a13d8f1c17827d
-
Filesize
1KB
MD568f91bdc455d4f8b5d82f716dbca11dd
SHA166cbc6b59a4625b2e90f00c5e5ec68b96e8c1eac
SHA256cefeee712e4c13fc949c72b82e3491386852dfd5cda48b264fafd28b2cb94ed4
SHA512bca69b8dc3d4525787e6a094b42c3568336d362432d3a775773fd6ff3dbdc032d20b4138db0088d4b71ca890f2cd19bcebcfbf9743aa2acbe33d93b2f31c4a26
-
Filesize
1KB
MD5b9ae03b14ff38a4231d34af18053c3d5
SHA11d7d8fd02fc6b8c2a6b8d46930cb9342ab2b1f20
SHA25600f46a281f163e1e9a30469f2693c084934b9f7e2ed44954d1a41df24d1944c1
SHA512c264d1649730e8f07fc6a3ef421e999685d72908e1aa1b84faa3e87322baf60a302d828219d05ca3fced43cd0b33eef57d208bcc788dbb4a1f0a21fcbb129074
-
Filesize
1KB
MD59ddd1c6fe1f175a23c3bb56c462169ac
SHA18a44acc76a97ca5763818ae0014bf336133e5159
SHA2560f22899eecb233f2ad5d0afb195a22703aa1f7cc9bdef1028befae292a74436b
SHA512efe6f7a932cc0531915bcefe3853924ebc28e2242f173cf9112828d09a6410988676ea444bfd6fc0598f9aa98c07fbd1d9f42eb8fe56fc152e46f46deb47fec2
-
Filesize
1KB
MD5861dd47722cc2ad32dca6853501dbef5
SHA12f73b0393c3935a3da98ff987bd94cd460b0793a
SHA2561b33df047135a79c3bf520b7917c604544ee7d8250ece56c07a8abe09626faf7
SHA5127d6f896722f1e922b5361ba901b197b8ace733f0355183ff3df61461412c31c113e67440da50b5295fc5a4fb27770efec0492c2849e7505d52813b65ac4520f3
-
Filesize
874B
MD562099255fb1fd15cf4f2b8049e631c0b
SHA1290a7bb9b9fc083640efc94dd13af2dc3b2e991f
SHA25678b3c37fac110395caff878b293e8855a8fb57812a94c7426b884b603ceeb6ec
SHA512de9621266c63cf6a75587f5b0df3ba43264d4331be5cb49741ec4afd64e48a7f928d9f5f19ce7ac2783e603b5484fe66abe3e370d915d26020118dd6e3964970
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e93a5406-7cca-4fb6-95f0-835b71d47be2.tmp
Filesize6KB
MD5c49082a9e72f25d231dc08498fd43c6b
SHA184b1c7871fa9a6977569af011c52b3ef3a7365d5
SHA2566eafab3fd220322183261002ff06bcd43ee968d9686666e21fc0fba0a97242c0
SHA51214450f9241adb2344158b64e62f4730e9201d3075b81c02082c7479248a401fabe0c085d0e8133272a0855c3d9dff6183a2132caa28d30b509327cd9021ad961
-
Filesize
11KB
MD51a3b1a15fb9f68a30ed8b99702bf531d
SHA1305a2c62a75d53baf0fc2ba56aa4bf5f02580d27
SHA256cb46d1eee52833e8b622e2765e4e0d26896ad92dfefc8049b44bbeb2df817995
SHA51268c8ecfc62bd7b6d61aee03eb984b9a2623c7095b80e7e5a3f1589c504a12d0ef37f1db987b72da5bb8f2d1af726ad297f3e0d8b42b7c8ad5254864dc8d73ac7
-
Filesize
11KB
MD59dc323ade7ab92bc5a29427b0f08edd0
SHA1c048fad26feb863319154019df0687609ba0db59
SHA2562d890f6b925de107207e74b59579706eb3ba26dec957a3af53a7d57aa7a69135
SHA512b8279795675e0e6b2ee0f3dc0839d3304a555f77c07a1593c354035e13b0c322ba79f1db08c38727277e6136fb4ed72ea59f6cef1a8149f3060e82854badca00
-
Filesize
11KB
MD5fe0f993f0fba624f2862c5f05e56ddac
SHA168c2f2b66a970bed14223e3ea9005e3c7bf65070
SHA256b6efc5f5e324a0fc489e2de5941bed33ccfce4681e4d6d1d591589711b4e153f
SHA512dd373fb3fdc82d3f4e8f0fa825d6aca557d271b3454cb49c832cf6640cc8b899d277034d8acdb5bc9eb5c94b6dfc5548b4dc01b075d28e3b4e95fdd806c1b74d
-
Filesize
10KB
MD5d409f3530a54efc187610ee7228612a0
SHA1dacb14fffe51586f37f3d811a69292843c3db034
SHA256751be52e97f6f6b7c2c07f0d829c02bd74399389f01858e124cce1fa229febbe
SHA5123878db5a07090810bae5c53c82a76edf63ce12e244f9dc2f6d85c7738c52adc4c3d73cd0c34204f861dd22c57f14e2fb06d0adda54f71d020b093f13ce0ba1be
-
Filesize
10KB
MD5c7b6d9086d47b221566ec967c9f04242
SHA1ae2bc7b7d6e953c53546711c7d2b0b0b7f1e07e5
SHA25604ebe90373ebf208ab55c368804339b3eac4cee780dc8a3e85af0cf6a6358dff
SHA51257cfeb681667fc6153806535748af25909f20a99d78b246219316007e9f3a9f60797e0a8a9ece73fa28f20d94a3fc87073f89497e62a1a70a17eccbb12955342
-
Filesize
11KB
MD56b73204d3d924b7af8041a86fd92b596
SHA1eb1c7d0df7a2436976bc7fdf5d2115967f8c4c67
SHA256b157fbeb8624e44551af7cc7b7426a3dc23b01aa4f37cb04cf66a0ffd6737263
SHA512d2688830a13526561b6336cc34b32716319d03abed61af6511aacd83c4e34a68cb45c4894c5ce873b8c642c8bb433d661b77f2e70ae3b2bf545b1d24615ce36e
-
Filesize
11KB
MD56ecb91062d08b6646f9eaeffbfe78a5d
SHA1f29142f6b16f4cb39512bb6a82a8e0f1c7f6203e
SHA256a818f50261c3a81dc0b6a6965369f91b72214282f5b03304fca415ff279875cb
SHA5123684362259025d982417244a20c407388fe430e0728c30c5835bd3b40def39e6e809844660d0e65d0254585b8ac6339304573ab7527ada664436b0bbaec8c036
-
Filesize
11KB
MD56f4967e9638fdc8debc369af1a736713
SHA1e785200a9c86e806bb1cbb675bbebe5d0f4efced
SHA256958753b775ca8e456b01dd3a0ecc93ea8df822fdceda81bcf6fa1e5d8de3d26f
SHA512e628e7fd1629f789be6f6fe4fca2b7b30170c742c525b683ae39e09f48cb2678c99e7fc2e14ab3612c2fb53e7bb54e3b7ebdd486f90bb18b9bd9d8a5119a35bf
-
Filesize
55KB
MD57e37ab34ecdcc3e77e24522ddfd4852d
SHA138e2855e11e353cedf9a8a4f2f2747f1c5c07fcf
SHA25602ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f
SHA5121b037a2aa8bf951d2ffe2f724aa0b2fbb39c2173215806ba0327bda7b096301d887f9bb7db46f9e04584b16aa6b1aaeaf67f0ecf5f20eb02ceac27c8753ca587
-
Filesize
1KB
MD5d63fce2f6495c0542aac2d975f4ca9f4
SHA12b3f2ee3458e8c7ed9f75409701a47164a8a79fb
SHA2569eba2c3edf3ddf265f9d560b6955daeb79a7ea9d3f5888bab1337a6a733e9a5a
SHA512904b63c9175e04f7563413a71fc7d4de86a22afdf09e8e311ceedf31e21a5b7d4f84eed93c590daebc707a5fcb3a4b3f39ec97342a91f80d383141914e8a44a1
-
Filesize
76KB
MD5740890232597505c128daa6394c7e9bc
SHA10ac9ebd70333961edae260d59b1fa18d25378b42
SHA25648ad07e53a10209af82b515995a83bd9e26487a2fdddf8ed2a4499289642bc28
SHA5128d1d1d32c2ad768d84fba2afd3b61d2134935f865a99456bf9f27b9cb180b8154d0c4d9715ced36e85a0c8a8e9649fb4f4ee998e40d60bf6f735420602181fff
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize14KB
MD5b7f10fffb1db23ff26243a6f5721fff9
SHA19d5230b246e13417ac5bb813a6d71a3b2d0b7231
SHA2560489a3b7891772560427eeece10fed98a6ff3f84d2eab16baef9f40037a06579
SHA512d2e166a7d0a2506c84a5f69d282945732a1d0c8ce7b3da62e21d2bce5ec9390df6fc645624d14af533e9f13747b5fff1e9924109849cef1df6fd9a667b4d69fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize12KB
MD566c0f4ab9d534604bc4263361c65cb2d
SHA128564f4d9f8133e1e7667bc19dc31cd42ec67c40
SHA256cfa70c5a627fd527c317bb8d47b428bd3449283b1cf4ff4c3bbf4734839fc00e
SHA512a35f291850d658c1f8db3654cf29580df9287c34f605c41da7b8737ae65c5ccd31f6d84324eda811260c5368d6dfe49c3a047fc009f3074b12e67145c99f8f6e
-
Filesize
10.6MB
MD5e9e5596b42f209cc058b55edc2737a80
SHA1f30232697b3f54e58af08421da697262c99ec48b
SHA2569ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305
SHA512e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7
-
Filesize
313KB
MD5fe1bc60a95b2c2d77cd5d232296a7fa4
SHA1c07dfdea8da2da5bad036e7c2f5d37582e1cf684
SHA256b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d
SHA512266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89
-
Filesize
116KB
MD541789c704a0eecfdd0048b4b4193e752
SHA1fb1e8385691fa3293b7cbfb9b2656cf09f20e722
SHA256b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23
SHA51276391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea
-
Filesize
390KB
MD55b7e6e352bacc93f7b80bc968b6ea493
SHA1e686139d5ed8528117ba6ca68fe415e4fb02f2be
SHA25663545fa195488ff51955f09833332b9660d18f8afb16bdf579134661962e548a
SHA5129d24af0cb00fb8a5e61e9d19cd603b5541a22ae6229c2acf498447e0e7d4145fee25c8ab9d5d5f18f554e6cbf8ca56b7ca3144e726d7dfd64076a42a25b3dfb6
-
Filesize
353KB
MD571b6a493388e7d0b40c83ce903bc6b04
SHA134f917aaba5684fbe56d3c57d48ef2a1aa7cf06d
SHA256027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745
SHA512072205eca5099d9269f358fe534b370ff21a4f12d7938d6d2e2713f69310f0698e53b8aff062849f0b2a521f68bee097c1840993825d2a5a3aa8cf4145911c6f