Resubmissions

30-01-2025 16:48

250130-vbellsxja1 10

30-01-2025 02:38

250130-c4rsjawmey 10

30-01-2025 02:32

250130-c1k6ksvmdj 10

30-01-2025 02:25

250130-cwajaawkgt 8

30-01-2025 02:21

250130-ctg6cawkct 8

30-01-2025 02:17

250130-cq6drswjgx 10

30-01-2025 02:13

250130-cnxnvavjhn 8

Analysis

  • max time kernel
    125s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2025 16:48

Errors

Reason
Machine shutdown

General

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Badrabbit family
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Downloads MZ/PE file 5 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf37046f8,0x7ffdf3704708,0x7ffdf3704718
      2⤵
        PID:4532
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:2
        2⤵
          PID:5116
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:4720
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8
          2⤵
            PID:4080
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
            2⤵
              PID:4840
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
              2⤵
                PID:1184
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:8
                2⤵
                  PID:3764
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4904
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5328 /prefetch:8
                  2⤵
                    PID:1632
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:1
                    2⤵
                      PID:2448
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                      2⤵
                        PID:1884
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3472 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:616
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1180 /prefetch:8
                        2⤵
                          PID:3888
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:1
                          2⤵
                            PID:1388
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5620 /prefetch:8
                            2⤵
                              PID:548
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:1
                              2⤵
                                PID:1508
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5804 /prefetch:8
                                2⤵
                                  PID:1200
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1804 /prefetch:1
                                  2⤵
                                    PID:1424
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3432 /prefetch:8
                                    2⤵
                                      PID:4404
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:1
                                      2⤵
                                        PID:4716
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:4448
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1612
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:1
                                        2⤵
                                          PID:980
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5980 /prefetch:8
                                          2⤵
                                            PID:5060
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:8
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:768
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:1
                                            2⤵
                                              PID:4076
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5580 /prefetch:8
                                              2⤵
                                                PID:816
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:1164
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6343532173753543405,11498575111454759650,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6052 /prefetch:2
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4584
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:3672
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:2976
                                                • C:\Windows\System32\rundll32.exe
                                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                  1⤵
                                                    PID:2596
                                                  • C:\Users\Admin\Downloads\BadRabbit.exe
                                                    "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Drops file in Windows directory
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4648
                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                      C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                      2⤵
                                                      • Loads dropped DLL
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4368
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /c schtasks /Delete /F /TN rhaegal
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3552
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /Delete /F /TN rhaegal
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1592
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 4245717108 && exit"
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3268
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 4245717108 && exit"
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:4584
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 17:08:00
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3460
                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                          schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 17:08:00
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:2876
                                                      • C:\Windows\3F13.tmp
                                                        "C:\Windows\3F13.tmp" \\.\pipe\{EE820824-39E8-4794-938E-EB1B54A88447}
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4244
                                                  • C:\Users\Admin\Downloads\Annabelle.exe
                                                    "C:\Users\Admin\Downloads\Annabelle.exe"
                                                    1⤵
                                                    • Modifies WinLogon for persistence
                                                    • Modifies Windows Defender DisableAntiSpyware settings
                                                    • Modifies Windows Defender Real-time Protection settings
                                                    • UAC bypass
                                                    • Disables RegEdit via registry modification
                                                    • Event Triggered Execution: Image File Execution Options Injection
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Impair Defenses: Safe Mode Boot
                                                    • Adds Run key to start application
                                                    • Checks whether UAC is enabled
                                                    • System policy modification
                                                    PID:1884
                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                      vssadmin delete shadows /all /quiet
                                                      2⤵
                                                      • Interacts with shadow copies
                                                      PID:4468
                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                      vssadmin delete shadows /all /quiet
                                                      2⤵
                                                      • Interacts with shadow copies
                                                      PID:3120
                                                    • C:\Windows\SYSTEM32\vssadmin.exe
                                                      vssadmin delete shadows /all /quiet
                                                      2⤵
                                                      • Interacts with shadow copies
                                                      PID:4560
                                                    • C:\Windows\SYSTEM32\NetSh.exe
                                                      NetSh Advfirewall set allprofiles state off
                                                      2⤵
                                                      • Modifies Windows Firewall
                                                      • Event Triggered Execution: Netsh Helper DLL
                                                      PID:2008
                                                    • C:\Windows\System32\shutdown.exe
                                                      "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                      2⤵
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2296
                                                  • C:\Users\Admin\Downloads\$uckyLocker.exe
                                                    "C:\Users\Admin\Downloads\$uckyLocker.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Sets desktop wallpaper using registry
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4880
                                                  • C:\Users\Admin\Downloads\$uckyLocker.exe
                                                    "C:\Users\Admin\Downloads\$uckyLocker.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Sets desktop wallpaper using registry
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3136
                                                  • C:\Users\Admin\Downloads\Birele.exe
                                                    "C:\Users\Admin\Downloads\Birele.exe"
                                                    1⤵
                                                    • Modifies WinLogon for persistence
                                                    • Executes dropped EXE
                                                    • Impair Defenses: Safe Mode Boot
                                                    • Adds Run key to start application
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1536
                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                      taskkill /F /IM explorer.exe
                                                      2⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:728
                                                  • C:\Users\Admin\Downloads\Fantom.exe
                                                    "C:\Users\Admin\Downloads\Fantom.exe"
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5024
                                                  • C:\Windows\system32\vssvc.exe
                                                    C:\Windows\system32\vssvc.exe
                                                    1⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1160
                                                  • C:\Windows\system32\LogonUI.exe
                                                    "LogonUI.exe" /flags:0x4 /state0:0xa390c855 /state1:0x41c64e6d
                                                    1⤵
                                                    • Modifies data under HKEY_USERS
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4780

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CDE89F9DCB25D8AC547E3CEFDA4FB6C2_EFB75332C2EEE29C462FC21A350076B8

                                                    Filesize

                                                    5B

                                                    MD5

                                                    5bfa51f3a417b98e7443eca90fc94703

                                                    SHA1

                                                    8c015d80b8a23f780bdd215dc842b0f5551f63bd

                                                    SHA256

                                                    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                                                    SHA512

                                                    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    9bfb45e464f029b27cd825568bc06765

                                                    SHA1

                                                    a4962b4fd45004732f071e16977522709ab0ce60

                                                    SHA256

                                                    ceb8f1b0aaa1ba575c3704e73fd77edf932d68c8be902b33f1ba3b1d130cd139

                                                    SHA512

                                                    f87cce8bb5489b56027f5a285b948b639a1c7b0f213a111f057235177e5bffc537627c82586736704e398a0185cf2ad8ba8cdee788531fb753a2d08f16e906c7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    ae2a8f2ebc841509f7b978edf590d3cd

                                                    SHA1

                                                    91358152e27c0165334913228005540756c35bd3

                                                    SHA256

                                                    631550765e3db02be0709748c0634a2cfdab711cea94f5890854d0c1dfbcb214

                                                    SHA512

                                                    e52180dd175f1e6ff72d76400085869387cd70da33919de219a04dc26871e8421e93b22e7c59125c19c6ee54a8a8f742d796ac68ea9077c9dab5f03b80967d11

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000015

                                                    Filesize

                                                    15.9MB

                                                    MD5

                                                    0f743287c9911b4b1c726c7c7edcaf7d

                                                    SHA1

                                                    9760579e73095455fcbaddfe1e7e98a2bb28bfe0

                                                    SHA256

                                                    716335ba5cd1e7186c40295b199190e2b6655e48f1c1cbe12139ba67faa5e1ac

                                                    SHA512

                                                    2a6dd6288303700ef9cb06ae1efeb1e121c89c97708e5ecd15ed9b2a35d0ecff03d8da58b30daeadad89bd38dc4649521ada149fb457408e5a2bdf1512f88677

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    70ee4802d9669f1537bf5683682cebfb

                                                    SHA1

                                                    b0d9387b64040ee465d3e04e575ede3775daa657

                                                    SHA256

                                                    4c9ce5f0b60e774feb06852727bcc459ae48f22ea34623ad8c63935e336188bd

                                                    SHA512

                                                    781453fe864802189048cac6d792ffa43d3092e0968c7ff3ff3d766ac45dee385ab8589f558b26141fa524054ace6653b2802de670b995f1a17c061a7d84511e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    579B

                                                    MD5

                                                    2ebbd61422b78463e73114c90d111185

                                                    SHA1

                                                    96a2a4824b034c487ccfcc08f3d7defa75601565

                                                    SHA256

                                                    164f96175f640e1c88954414f0d6bd4b866e8bc4004221585211df95aaeacaab

                                                    SHA512

                                                    a707e87fa44ddc0f804778e849698b4b9b1a110342a9eb8abcc1a9178019d6424077d6293940adf1b3db80872e42fb70347fb927e7a6cadb2490381fb2f1b926

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    e379b78e7f88465f3f1c2d2ff7005fd8

                                                    SHA1

                                                    8b142ffc199ebd05aaeb681124536c63c0d78b27

                                                    SHA256

                                                    d9a8d8d99ac3cda2fbfd58d785a7f4744114ead5e92677fc5c0f24c3991f3c00

                                                    SHA512

                                                    f9526229c85e45204c9a0954a39e58eb3ed574c4dc30f851cd34ee0976b249959146bd6120a7040629f65b710bd7a21e7ce865707bb0187ea7439f07b7d8a3f6

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    4d3f93942104340f2cb2139fcf848552

                                                    SHA1

                                                    dd85aaf38674747a8b141a814d16c7c8b8726ca3

                                                    SHA256

                                                    1b41aaf34eca9012b0c17272b36f9362a336634e19fd185fe13508a727c8f672

                                                    SHA512

                                                    1e6595829e172da729c05e028d8a595910bf444293f4c1e51ec0349709d4f0f46fb0ba5aeb22b4c8b6a0418a94737ce0a077bca1bae3f0f1b00ff83b973e95e7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    42841110bbabd8e41a4c314805f76b41

                                                    SHA1

                                                    47edec655e605b0d5d1ab58b144fc88f41599fdc

                                                    SHA256

                                                    f838b7a68691fbe480457a347216beaf80c38f9a1f96fa3046c2d0756a5c23e3

                                                    SHA512

                                                    610b8b6a2c80b0aea95d691364319dd59163a63c0b3df2909534620a9891ce616095525ac685ea50818da2166f651c11287ea00563678cacfa38770b2863ab4f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    84b7242b23e27f3f4959d420b72c6794

                                                    SHA1

                                                    42903d8b503ca3a5e6e22189a6964474b85fbd68

                                                    SHA256

                                                    44b8941760c6abed502658a0efe78453145f066acd659a1ab111f42855158636

                                                    SHA512

                                                    1459af8ecdbf70a3588a42b79c66fcc63bba8df7a34cb9d546812fd61b8ba77e340f10a06806a59cd3555fab806649ea19603cf4d02c10720cc8d32724ca2a1d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    11b370005b84487ae37820452ae1b81c

                                                    SHA1

                                                    daad5eb043ce7e1c09eb6ee28a352aa5153cc04f

                                                    SHA256

                                                    ecc9dd0e41d07fdfde6d8c355d8974637b782b30a000d7aff485068bced97ad4

                                                    SHA512

                                                    01824e6a3340847ab8563870e9412c7a1438e839e399f1e0da8f7648b3933d247b86b8140628493af86ac676c39d7f6ad84f790def4a52c1661c1c339caece6c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    1764f122450e6a41265baa7a565ba730

                                                    SHA1

                                                    0b208fe619e3282fb220ad98f1b729862b93a77e

                                                    SHA256

                                                    1269264dfdbe871cf51013dcc6dc029f3c417a8956be5e922063292c9d82f556

                                                    SHA512

                                                    fcc8ee93c48acaa44e045f60e0c361bf102a2c043e97371e6623971b1f47681ee3ef66e4905f7de4905ec60c209e7be1a0b1a91ce04bf0ed573c6073974d9473

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    a8c393751e19510c98d9069ccf36df0f

                                                    SHA1

                                                    bff9d17c9cc44abccee409a133f3bdd5a0895b9f

                                                    SHA256

                                                    f0c6c23719a69be1db77147a48960d763f0f3abf3d851149f31ad3eb91bf5899

                                                    SHA512

                                                    13aa701b02c01bf2c038f7971bda7514e6af2b37a2ef55630bd26299f9d622cd4eac2099f9144df9009951e4700e535ff9dd47ad031dd78c03b5e2a2a89b2b03

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    118157f2ceb44873c963cd451e84a3ee

                                                    SHA1

                                                    a357328dd68a9564ed62f8d3f87529467c87a280

                                                    SHA256

                                                    45996f56fa7482a72c054d5c968dc72d667043760c1c0acd276984583fef0f9b

                                                    SHA512

                                                    ea80a60518a3a3735be623501e7a5a8f1d52f44806928a53387ec074105ed66df15576ffcb9d8caff83235530d307138310e5de68c81efe0f7af2d82de55c60e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    60630eaa34dcd8f1a159a73ec1d9a091

                                                    SHA1

                                                    5a44693ec74bfc055b5946ac741faf430bcd37c4

                                                    SHA256

                                                    e553884fe7ef5147c2ca88b41d88cc6fdbd2e0797b33a0a4b9121e344ac42868

                                                    SHA512

                                                    0bd17ff2e6c64853cc42aa4853535cb97d7f679736c6883e678324fed69a7cd17cf877329e1fe788165337ff55d513c95026adecc35ca85354dabb9b184563d9

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581e9f.TMP

                                                    Filesize

                                                    874B

                                                    MD5

                                                    66d5ea32f8e1d4074865d73bc22812e1

                                                    SHA1

                                                    48635e4228dfef9cd786fc3364835d71b5b6695c

                                                    SHA256

                                                    e87f934bc2ef44fde483dd4992207e979e35ae7a6a9d40fd74065a6e469c6298

                                                    SHA512

                                                    36697ab4b0c8b489618cbe4511855bf846c8575b35a38e0a8e4aa76473fcf7db5d0b9646c557ed9b22e181d20a994a3203b4fb2cabe5e0036f2e31cdd5125839

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\baaced75-1e8c-467d-b506-1638010ced8e.tmp

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    9e21f0dc4aa3b7d27c05f5f95ff3d915

                                                    SHA1

                                                    5b99e8c3050248765b2373e3d6eec7a62805b21d

                                                    SHA256

                                                    2d83781799f49008d3c21bb8b779ea7651dafd1f4e7380004d220fd63402be80

                                                    SHA512

                                                    c28c8a479684dde1cccef9171c75649b06a3441541567b8f3a23f852b5ad1dad6825730e379d04c900dcba8f397411794ff04385cb29115c3274817b88788be7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\blob_storage\579b1dd9-8ee9-412a-b21d-9853116c9365\1

                                                    Filesize

                                                    10.9MB

                                                    MD5

                                                    c2c4450dd9dd82f2214c555cead43118

                                                    SHA1

                                                    af8f5b2955f2f1976128d08045b35d6c939495f5

                                                    SHA256

                                                    838fa0b08fba45c99233254dd2e1b02840c6f2c842a3848ee1fd343d0f3dc6b7

                                                    SHA512

                                                    6e30efbaab63f33776e263a72a42a52fa15cf145edee80b129b50ac80be97411285dc1263cb4609896be6150ba49ba59fae3f906e9cdf55f8539da0d79837de9

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    4a7542d21199dd82ef1754db9eb31dde

                                                    SHA1

                                                    616bc12bfe02b2255fb96333533db8881de9556f

                                                    SHA256

                                                    feba7154dd4fc00929694803749af409b4b18b39ca25eb9ccdf97c989c6a421f

                                                    SHA512

                                                    52e799217739fb9035503b34fb08e8ce7411500c1e56021602a04a9990c51c726d4289a55b57cc15fe9085f496aac457a70a4fc29d0e3cac57b0b0b1ea52d89e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    12KB

                                                    MD5

                                                    ebb3abf3ae69011c38e8fc084d06e52b

                                                    SHA1

                                                    2317aa36a7e8b258c2f2d79a56c37239f532f3be

                                                    SHA256

                                                    0c656e69e7fde7bf7c94d82db153fbf44514e3ef621606cd6c2c3c617aac41f1

                                                    SHA512

                                                    9b1b7800d3ee143e7c160fe3687f7a7e6738969ae149c23476d94236379c92c2c7858fb0ed91c28fe78e2849783c094e6c70333f98ca8e21a1689b363d4de4f1

                                                  • C:\Users\Admin\Desktop\ConnectSelect.odt

                                                    Filesize

                                                    345KB

                                                    MD5

                                                    82fa5ea65f937c3a064caf1620d705c3

                                                    SHA1

                                                    25763e4bda1bdb2a15a219480f3c09cb12b21af9

                                                    SHA256

                                                    2052d52a2eaf46b8e5237c42d8f9db3fd2108228f7a6515b21f0bbac0b56f54b

                                                    SHA512

                                                    86c0ab08093801788a473c1c12fb5472f0f99674f080c993a0428f0097d2d55d66bf62170a9388127c136fd7a55a81d89b072ceffa958fdaf3e7c48193b5c3bd

                                                  • C:\Users\Admin\Desktop\InvokeUpdate.docx.WINDOWS

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    7aaad43d195a58c2fe117e38d32e15f4

                                                    SHA1

                                                    ab5bcc8153f6c52b7e8340764f1c62cbd75626e1

                                                    SHA256

                                                    2ff009a019df4506dff1cbc1f973ec60065ad45fcee50d48e7f06ac28e496b2f

                                                    SHA512

                                                    f29fd043303a29016adfee173fcc401746efc465dc6eab2c18886027db0b51b32ff6609c8a4f3bb67ad785d802c9665336270ebda053dbff1976a49319d3f0ac

                                                  • C:\Users\Admin\Desktop\PopUpdate.docx.WINDOWS

                                                    Filesize

                                                    15KB

                                                    MD5

                                                    3893648038dd6deb6bb78824fca8cca8

                                                    SHA1

                                                    ddfaba2801624df87770ecaebd5f399100c5c2f3

                                                    SHA256

                                                    4c269567c976ed679f295495cf0b2e7045be906c85dc623517855d97676bb790

                                                    SHA512

                                                    c4114af81bc0ec3f38e0b3d12e65a7adf48ed1f8631f1059b0d7de77cbd98e4f724bc5a91826d03f42f67c88289f5701a915fd1cb842dab17ac284706eed22fa

                                                  • C:\Users\Admin\Desktop\READ_IT.txt

                                                    Filesize

                                                    108B

                                                    MD5

                                                    d845190db42d07b1f4a34292d8f335c7

                                                    SHA1

                                                    fa97f5c6d4aa832a0a1451730e8ba2a32b2f9339

                                                    SHA256

                                                    6bd70f8e5afcaf2bac76a5e40649be7ad4d59fb10d37e4f18ed3b1027b714b9a

                                                    SHA512

                                                    9d9310f6885084665a54cba5c33ce55d2de89978b82d59c70746f1e9ca2abdd094713e562f802f5e723654824ab872b9ab453cb32e279b5960edc196f683a08c

                                                  • C:\Users\Admin\Desktop\ReceiveConvertFrom.xlsx.WINDOWS

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    eba168f838a4502c0cf925744860dd0f

                                                    SHA1

                                                    eb13d5190df83ef510a567a5f59edd76ac5a5282

                                                    SHA256

                                                    2a74690f67be882021a1292112f0cd0db7737ebacf01ece44c68652662dd1973

                                                    SHA512

                                                    1984e17bf72e216bf3b926128470c9d8f4591f25c58a1a5991a2e61faa39da03c87428ed81d299efdb6e05d4154a40fcab83b8221789650ae814dfc89fe3ff7f

                                                  • C:\Users\Admin\Downloads\Unconfirmed 208855.crdownload

                                                    Filesize

                                                    261KB

                                                    MD5

                                                    7d80230df68ccba871815d68f016c282

                                                    SHA1

                                                    e10874c6108a26ceedfc84f50881824462b5b6b6

                                                    SHA256

                                                    f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

                                                    SHA512

                                                    64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

                                                  • C:\Users\Admin\Downloads\Unconfirmed 294308.crdownload

                                                    Filesize

                                                    116KB

                                                    MD5

                                                    41789c704a0eecfdd0048b4b4193e752

                                                    SHA1

                                                    fb1e8385691fa3293b7cbfb9b2656cf09f20e722

                                                    SHA256

                                                    b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23

                                                    SHA512

                                                    76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

                                                  • C:\Users\Admin\Downloads\Unconfirmed 294308.crdownload:SmartScreen

                                                    Filesize

                                                    7B

                                                    MD5

                                                    4047530ecbc0170039e76fe1657bdb01

                                                    SHA1

                                                    32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                    SHA256

                                                    82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                    SHA512

                                                    8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                  • C:\Users\Admin\Downloads\Unconfirmed 379931.crdownload

                                                    Filesize

                                                    431KB

                                                    MD5

                                                    fbbdc39af1139aebba4da004475e8839

                                                    SHA1

                                                    de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                    SHA256

                                                    630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                    SHA512

                                                    74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                                  • C:\Users\Admin\Downloads\Unconfirmed 887034.crdownload

                                                    Filesize

                                                    414KB

                                                    MD5

                                                    c850f942ccf6e45230169cc4bd9eb5c8

                                                    SHA1

                                                    51c647e2b150e781bd1910cac4061a2cee1daf89

                                                    SHA256

                                                    86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f

                                                    SHA512

                                                    2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

                                                  • C:\Windows\3F13.tmp

                                                    Filesize

                                                    60KB

                                                    MD5

                                                    347ac3b6b791054de3e5720a7144a977

                                                    SHA1

                                                    413eba3973a15c1a6429d9f170f3e8287f98c21c

                                                    SHA256

                                                    301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                                    SHA512

                                                    9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                                                  • C:\Windows\3F13.tmp

                                                    Filesize

                                                    60KB

                                                    MD5

                                                    c7ca77d847f1802502ef3b9228d388e4

                                                    SHA1

                                                    80ab09116d877b924dfec5b6e8eb6d3dde35869e

                                                    SHA256

                                                    fdef2f6da8c5e8002fa5822e8e4fea278fba66c22df9e13b61c8a95c2f9d585f

                                                    SHA512

                                                    b5c23209597ecddbcde6cd8e72392721c3c2848385ad3f4c644024979f777fd11f2dd19e763f443c4759bb339b047034997fb06566ce7d4574cf3e4b75f51b7d

                                                  • C:\Windows\infpub.dat

                                                    Filesize

                                                    401KB

                                                    MD5

                                                    1d724f95c61f1055f0d02c2154bbccd3

                                                    SHA1

                                                    79116fe99f2b421c52ef64097f0f39b815b20907

                                                    SHA256

                                                    579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                                    SHA512

                                                    f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                                                  • memory/1536-572-0x0000000000400000-0x0000000000438000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/1536-575-0x0000000000400000-0x0000000000438000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/1536-743-0x0000000000400000-0x0000000000438000-memory.dmp

                                                    Filesize

                                                    224KB

                                                  • memory/1884-703-0x00000261DBA10000-0x00000261DCF9E000-memory.dmp

                                                    Filesize

                                                    21.6MB

                                                  • memory/1884-533-0x00000261C0410000-0x00000261C1404000-memory.dmp

                                                    Filesize

                                                    16.0MB

                                                  • memory/4368-526-0x0000000002F10000-0x0000000002F78000-memory.dmp

                                                    Filesize

                                                    416KB

                                                  • memory/4368-513-0x0000000002F10000-0x0000000002F78000-memory.dmp

                                                    Filesize

                                                    416KB

                                                  • memory/4368-521-0x0000000002F10000-0x0000000002F78000-memory.dmp

                                                    Filesize

                                                    416KB

                                                  • memory/4880-548-0x00000000004C0000-0x000000000052E000-memory.dmp

                                                    Filesize

                                                    440KB

                                                  • memory/4880-558-0x0000000004DF0000-0x0000000004DFA000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4880-555-0x0000000005320000-0x00000000058C4000-memory.dmp

                                                    Filesize

                                                    5.6MB

                                                  • memory/4880-556-0x0000000004E10000-0x0000000004EA2000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/5024-580-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-606-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-598-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-592-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-590-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-588-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-586-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-584-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-582-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-610-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-579-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-600-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-596-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-594-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-612-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-614-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-578-0x0000000004940000-0x0000000004972000-memory.dmp

                                                    Filesize

                                                    200KB

                                                  • memory/5024-577-0x0000000004910000-0x0000000004942000-memory.dmp

                                                    Filesize

                                                    200KB

                                                  • memory/5024-602-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-604-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/5024-608-0x0000000004940000-0x000000000496B000-memory.dmp

                                                    Filesize

                                                    172KB