Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2025, 01:48
Behavioral task
behavioral1
Sample
2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe
-
Size
1.2MB
-
MD5
9c1ad9353ebaf125a5b7b432e428926b
-
SHA1
bbf3803f1918041a0ae000c0e9a75ee5b2e3dcca
-
SHA256
f5e3aeee5aec053a0b2cc222787fc4a448c2e7cb1c1241f324910f6eb71ffe18
-
SHA512
fdadf57cb953c19105460bd5d78aa963e994ab95159dc68cd2f7a19f669746c2898d93c47f60a552d38c765f116111e4288ae1c15fd004e586fef774eb2af581
-
SSDEEP
12288:ZmHAIqyfF/5ebyz1dpPlRnMRTD410ALP68kG3Jz4S9FUmnyJtgoiOHmabd8ornX9:oHRFfauvpPXnMKqJtfiOHmUd8QTHt
Malware Config
Extracted
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\!!!HOW_TO_DECRYPT!!!.mht
[email protected]<BR>[email protected]<BR>In
http-equiv=3D"X
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 4240 bcdedit.exe 1000 bcdedit.exe -
Renames multiple (625) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 832 wbadmin.exe 1788 wbadmin.exe -
Drops file in Drivers directory 13 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\services 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\services.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\networks.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\protocol 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\System32\drivers\etc\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\networks 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Control Panel\International\Geo\Nation 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe\" e" 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-1412605595-2147700071-3468511006-1000\desktop.ini 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Enumerates connected drives 3 TTPs 39 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\P: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\K: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\V: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\Z: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\E: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\I: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\M: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\Q: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\A: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\B: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\S: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\T: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\U: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\N: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\G: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\J: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\X: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\Y: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\L: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\O: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\W: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\D: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\F: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\R: 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\CatRoot2\edb.log svchost.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\ELAM.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\system32\CatRoot2\edbres00001.jrs svchost.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt svchost.exe File created C:\Windows\system32\CatRoot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.jfm svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\System32\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\BCD-Template 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\ResPriHMImageList 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Report policies 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\system32\CatRoot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File created C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\COMPONENTS 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\system32\CatRoot2\edb.jcp svchost.exe File created C:\Windows\System32\config\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\DRIVERS 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.jfm svchost.exe File opened for modification C:\Windows\System32\config\DEFAULT 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.jfm svchost.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\3010a2e8-3fc8-48eb-b401-8bd81013102c 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\c4440ed1-e094-4f7f-ab3a-42d8acfbf904 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\system32\CatRoot2\edbtmp.log svchost.exe File opened for modification C:\Windows\System32\config\SYSTEM 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb svchost.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\c4440ed1-e094-4f7f-ab3a-42d8acfbf904.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\BCD-Template.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\system32\CatRoot2\edbtmp.log svchost.exe File opened for modification C:\Windows\System32\config\DRIVERS.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\c4440ed1-e094-4f7f-ab3a-42d8acfbf904.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\0fb7e89d-9c96-454f-be30-2583b9b98ebf 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\ResPriImageList 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\ELAM 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\System32\config\BCD-Template.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Office16\FPA_f2\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Crashpad\metadata.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_w1\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f7\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Google\Chrome\Application\initial_preferences 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Google\Chrome\Application\initial_preferences.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Google\Chrome\Application\initial_preferences.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Crashpad\metadata 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Mozilla Firefox\postSigningData 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Mozilla Firefox\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Google\Chrome\Application\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f3\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Crashpad\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f14\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{2BB73336-4F69-4141-9797-E9BD6FE3980A}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180381} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{79043ED0-7ED1-4227-A5E5-04C5594D21F7}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Boot\PCAT\bootmgr 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\e1ea7b2e20a22fbee6e9dd5d883e9f3cc75fdee790ea383a755da4381088ec52 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\ffb218cb78a2ca5b027e463f2a6bbb9c7036730212098e4fb7c330c70dcdfda4 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_f4dcc01a-0567-4d6a-9a2d-9c6dc3aa34d5.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{E634F316-BEB6-4FB3-A612-F7102F576165}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\Installer\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Boot\PCAT\bootnxt 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_f4dcc01a-0567-4d6a-9a2d-9c6dc3aa34d5.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{E634F316-BEB6-4FB3-A612-F7102F576165} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\e1ea7b2e20a22fbee6e9dd5d883e9f3cc75fdee790ea383a755da4381088ec52.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{77924AE4-039E-4CA4-87B4-2F64180381F0}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\Boot\PCAT\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_f4dcc01a-0567-4d6a-9a2d-9c6dc3aa34d5 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{3A96B93E-763F-41E7-85C7-1F3CCC37EF27} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180381}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{79043ED0-7ED1-4227-A5E5-04C5594D21F7} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{79043ED0-7ED1-4227-A5E5-04C5594D21F7}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{B175520C-86A2-35A7-8619-86DC379688B9}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\ffb218cb78a2ca5b027e463f2a6bbb9c7036730212098e4fb7c330c70dcdfda4.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{9F51D16B-42E8-4A4A-8228-75045541A2AE}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{BF08E976-B92E-4336-B56F-2171179476C4}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SystemCertificates\My\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797} 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{B175520C-86A2-35A7-8619-86DC379688B9}.inprocess 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.1btc 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File created C:\Windows\Boot\DVD\EFI\!!!HOW_TO_DECRYPT!!!.mht 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 3 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1072 vssadmin.exe 2140 vssadmin.exe 3636 vssadmin.exe 2952 vssadmin.exe 4624 vssadmin.exe 4888 vssadmin.exe 4708 vssadmin.exe 2788 vssadmin.exe 1856 vssadmin.exe 3668 vssadmin.exe 2936 vssadmin.exe 2812 vssadmin.exe 4420 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeBackupPrivilege 380 vssvc.exe Token: SeRestorePrivilege 380 vssvc.exe Token: SeAuditPrivilege 380 vssvc.exe Token: SeIncreaseQuotaPrivilege 3996 wmic.exe Token: SeSecurityPrivilege 3996 wmic.exe Token: SeTakeOwnershipPrivilege 3996 wmic.exe Token: SeLoadDriverPrivilege 3996 wmic.exe Token: SeSystemProfilePrivilege 3996 wmic.exe Token: SeSystemtimePrivilege 3996 wmic.exe Token: SeProfSingleProcessPrivilege 3996 wmic.exe Token: SeIncBasePriorityPrivilege 3996 wmic.exe Token: SeCreatePagefilePrivilege 3996 wmic.exe Token: SeBackupPrivilege 3996 wmic.exe Token: SeRestorePrivilege 3996 wmic.exe Token: SeShutdownPrivilege 3996 wmic.exe Token: SeDebugPrivilege 3996 wmic.exe Token: SeSystemEnvironmentPrivilege 3996 wmic.exe Token: SeRemoteShutdownPrivilege 3996 wmic.exe Token: SeUndockPrivilege 3996 wmic.exe Token: SeManageVolumePrivilege 3996 wmic.exe Token: 33 3996 wmic.exe Token: 34 3996 wmic.exe Token: 35 3996 wmic.exe Token: 36 3996 wmic.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3668 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 83 PID 2160 wrote to memory of 3668 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 83 PID 2160 wrote to memory of 2140 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 88 PID 2160 wrote to memory of 2140 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 88 PID 2160 wrote to memory of 2936 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 90 PID 2160 wrote to memory of 2936 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 90 PID 2160 wrote to memory of 2812 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 92 PID 2160 wrote to memory of 2812 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 92 PID 2160 wrote to memory of 4624 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 94 PID 2160 wrote to memory of 4624 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 94 PID 2160 wrote to memory of 3636 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 96 PID 2160 wrote to memory of 3636 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 96 PID 2160 wrote to memory of 4888 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 98 PID 2160 wrote to memory of 4888 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 98 PID 2160 wrote to memory of 4708 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 101 PID 2160 wrote to memory of 4708 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 101 PID 2160 wrote to memory of 2788 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 103 PID 2160 wrote to memory of 2788 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 103 PID 2160 wrote to memory of 1856 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 105 PID 2160 wrote to memory of 1856 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 105 PID 2160 wrote to memory of 2952 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 107 PID 2160 wrote to memory of 2952 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 107 PID 2160 wrote to memory of 1072 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 110 PID 2160 wrote to memory of 1072 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 110 PID 2160 wrote to memory of 4420 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 112 PID 2160 wrote to memory of 4420 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 112 PID 2160 wrote to memory of 4240 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 114 PID 2160 wrote to memory of 4240 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 114 PID 2160 wrote to memory of 1000 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 116 PID 2160 wrote to memory of 1000 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 116 PID 2160 wrote to memory of 832 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 118 PID 2160 wrote to memory of 832 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 118 PID 2160 wrote to memory of 1788 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 120 PID 2160 wrote to memory of 1788 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 120 PID 2160 wrote to memory of 3996 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 122 PID 2160 wrote to memory of 3996 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 122 PID 2160 wrote to memory of 2548 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 124 PID 2160 wrote to memory of 2548 2160 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe 124 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-31_9c1ad9353ebaf125a5b7b432e428926b_medusalocker.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2160 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:3668
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:2140
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2936
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2812
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4624
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3636
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4888
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4708
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2788
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1856
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2952
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1072
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:4420
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:4240
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:1000
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:832
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
PID:1788
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2025-0~1.EXE >> NUL2⤵PID:2548
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:5116
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
4File Deletion
4Modify Registry
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD59445ebb54fcecbe77d8c642fc94bef93
SHA1ce931183260942a6ba0780d7f78a93c46267bb12
SHA25686e9c19e41b12e4cab8bdc6fc7166d10701729fb5601515db8fbacd886141901
SHA5128af9dc03318e12ff7693ce1fb179efd85ad5ff9a35eca240985cfabc9df2ad11179299c5f39090af1e6344d785af4023ebdd9c820b5ab8f3f4f8374df16096f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2367C848C1C8A11F6F3502EDA2855348.1btc
Filesize824B
MD55c15d301e5554f450a3603468df047ba
SHA17eea8b5de56d65b20575086fbe11ae4bacc64f8c
SHA2568bf4c3ff68defd00b061b8baeeac841153e2213d203beb093725de4011437ae2
SHA5129f8c6800b592c41291948c54c3c00ccd5d9ddc5baab7d2d494a0c692e3784ef355b68fa0e7fdec898a4c5c53a2673016bcc03c4254f1179c28960ff6f281e5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\398EE64D66758B5715368AA94044B13A.1btc
Filesize710B
MD5d754e795e8c3532fe2b2865363bb0516
SHA1896443f6ecdae17d2f957a9ee46f4eea57ba465f
SHA25691b077561ccc2c6a4afc4accfc08bec2a650cb00fdffe46612931a9fb2b5877f
SHA512a4e9241dcb02fd56324df59d421c88d51589dbf800e7a0b6cbece735cebd25c2de2199387524b0d00ec4ffdc9b6dc4770f37187d6ae6d79dfc83e3ec5db576b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.1btc
Filesize814B
MD596939207fe442599b0dadb6adf51f4cd
SHA12ccfcfde307c90ac9d7501e7ec0ad66d645b3d57
SHA256ec09b89de70020480ea31ae95e9f44fb6b886cf93c2d6388ac7d16ed656f75fe
SHA5126e795036da625deed502d72c2f4c3d5a26c61704e77514b7f8877418e2c12b214f4877bbb6847927587b0e1c304e4d41b311db8365670de52b1e9127e2dfa318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.1btc
Filesize840B
MD555259c85871dfced0b297ac5f9641964
SHA116ccb03444a326307b2b35d79ae20dd75f780c11
SHA256374832fa8a682c5cba4867a274143128b955af31d4944944e84ef56ec057594c
SHA512c2df576aed28976e41052d109fa11d9e7fbb0cb2aaf814046fd39782294ff6777f7a5b759f40e6c28337d5f76869a355bec53340f60f8ac540ff40b95723c3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F.1btc
Filesize700B
MD5af44d0259c61b3733c3fb35be224436f
SHA14a45addbccae68771288b325a801e9ffe07660a5
SHA256e1e67f8324469ab95e880b354945e3b27e766013af598ca5ff22a15f00732c96
SHA51233afc0bb62b39a4efb43b0570589514fc76fbed00744de911e1f03144d82c778cbad39eabde02ecdf9659a775d219e5113bd47e2f9c314d9550491be84f95edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C86BD7751D53F10F65AAAD66BBDF33C7.1btc
Filesize770B
MD5389fcca168eb04e1192c5933cdfa33fb
SHA14f3d28008db621b30c2912e1416082f600655866
SHA256b706137ee62111642ac0f10bdbd683c1752b01c642d4181984da19970729e84b
SHA512fae3f7bb5ec85088d4eb5b4f2806f13f9adb2263ae7c0071489ce6f5e043e67c54aad9f2f56e26f440a76daba138b80204e4549ed1c716b5ad61ad02cd53df4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize290B
MD5ebc1bde5c00356ed1919b273510246b3
SHA17038512a4c1cc6e39e49bc6a9279754e893a378b
SHA25611469e5a79a238a3d9275893a43b526aef31b089fc0af04795e0e2b46c247bf4
SHA5122849e5cca91271e9bea3094f205f0bf1946008f5c67520ae3d320db357387ef8e264e27ff0e22eb9eac952b458155c17f1c616adac3bfc826c15218ea94b1212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.1btc
Filesize842B
MD52ebdae0e9edb2b3f10d5e7a98d8617fc
SHA1bff7672d19458721d21c939fcc52be98a2161a43
SHA2564a11db26dfedf7a1357f2792bf4405272345477bd71f504c6fa6b2db4ae44c1d
SHA51204e2be40eb5d31756ed9915b0031bcde63447fa320fdb1dd6190e0751ddd8b69ea97fccc8c5a7ee57077ed8634b4628552b387118bc060da6fab3b82f1b068ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB5E2F83CE9B8330B0590B7CD2E5FF2E.1btc
Filesize782B
MD57f7355d5d8b1b883ff4e630fda75ebe9
SHA1cb8c5231f6331aec7f53e9c04fd7501116cc3363
SHA256a3a8a64da838d086242ee6a2dbc7aa2b4ba391700982127b15b51626a973fa3a
SHA512e2954d626d6462634f647f4976f64e194b7561816907c022216301d43d5e26f23331bc93a538922b12130a6ddc8131daf6db428cfc09bd62ffbabb806b6986ee
-
Filesize
37KB
MD546f600938a5209cfb8c8eb3fc80498b2
SHA191b54e23ded8464cef2629d35c28486712817d59
SHA256264138ce8145f7abe07f7793a60c3d59ec4385fcd39af9ccba84056f9e62d453
SHA5128cd1b9f7b6d482f12477e4e32fa81117112e727395b4aa161056a57b765963bc0667ff34a3d55f1d60a923fcaf06f80bc5cc5b1d857a66f5d78655f65457a43a
-
Filesize
2.0MB
MD5cfa46b60ba872a6b7643ec56037d88ac
SHA11c0d790961a9f8368c692d625eab572683b0a01d
SHA25673ab9dc618fa15ac0942aecfc47b8a9860fc204f5eeb1ea04c6cc64ee3c524f2
SHA5124aed717e9bd8e022092339cd657c548f40633145e1b7f616179bc2a7cff709a94d7dbb1681403aaf7b6ad005f7100dd688c2eafc944016f481d060f03ece6d12