Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

26/02/2025, 22:29

250226-2eejcavyf1 4

26/02/2025, 22:23

250226-2arm4swmw5 10

Analysis

  • max time kernel
    301s
  • max time network
    289s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/02/2025, 22:23

General

  • Target

  • Size

    431KB

  • MD5

    fbbdc39af1139aebba4da004475e8839

  • SHA1

    de5c8d858e6e41da715dca1c019df0bfb92d32c0

  • SHA256

    630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

  • SHA512

    74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

  • SSDEEP

    12288:BHNTywFAvN86pLbqWRKHZKfErrZJyZ0yqsGO3XR63:vT56NbqWRwZaEr3yt2O3XR63

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Badrabbit family
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 17 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 54 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 55 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\cmd.exe
        /c schtasks /Delete /F /TN rhaegal
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:376
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Delete /F /TN rhaegal
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2664
      • C:\Windows\SysWOW64\cmd.exe
        /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1695817508 && exit"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:412
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 1695817508 && exit"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1124
      • C:\Windows\SysWOW64\cmd.exe
        /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 22:41:00
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 22:41:00
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:1416
      • C:\Windows\A383.tmp
        "C:\Windows\A383.tmp" \\.\pipe\{EAF8EE41-CFEF-40A4-82C8-0F7AD35FE033}
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1132
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2344
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Modifies data under HKEY_USERS
        PID:2136
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784
        2⤵
        • Modifies data under HKEY_USERS
        PID:1020
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-22591836-1183090055-1220658180-10002_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-22591836-1183090055-1220658180-10002 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
        2⤵
          PID:6896
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784
          2⤵
            PID:6940
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe"
          1⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc47a4cc40,0x7ffc47a4cc4c,0x7ffc47a4cc58
            2⤵
              PID:5052
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1928 /prefetch:2
              2⤵
                PID:3332
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2116,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2104 /prefetch:3
                2⤵
                  PID:5104
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2328,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2488 /prefetch:8
                  2⤵
                    PID:3560
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3196 /prefetch:1
                    2⤵
                      PID:2200
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3344,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3296 /prefetch:1
                      2⤵
                        PID:4032
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3176,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4584 /prefetch:1
                        2⤵
                          PID:2500
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4736,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3704 /prefetch:8
                          2⤵
                            PID:3468
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4852 /prefetch:8
                            2⤵
                              PID:2220
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4928 /prefetch:8
                              2⤵
                                PID:3620
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4912,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4956 /prefetch:8
                                2⤵
                                  PID:3956
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5108,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5004 /prefetch:8
                                  2⤵
                                    PID:2204
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5196,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5112 /prefetch:8
                                    2⤵
                                      PID:1964
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5212 /prefetch:8
                                      2⤵
                                        PID:1724
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5348,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5180 /prefetch:8
                                        2⤵
                                          PID:4876
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5316,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5300 /prefetch:2
                                          2⤵
                                            PID:5820
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level
                                            2⤵
                                            • Drops file in Program Files directory
                                            PID:5224
                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff7540f4698,0x7ff7540f46a4,0x7ff7540f46b0
                                              3⤵
                                              • Drops file in Program Files directory
                                              PID:5536
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5148,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4416 /prefetch:1
                                            2⤵
                                              PID:5412
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5236,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3552 /prefetch:1
                                              2⤵
                                                PID:5780
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3524,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3472 /prefetch:1
                                                2⤵
                                                  PID:5896
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4864,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3512 /prefetch:8
                                                  2⤵
                                                    PID:5428
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5172,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5592 /prefetch:8
                                                    2⤵
                                                    • Modifies registry class
                                                    PID:1844
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5660,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5656 /prefetch:1
                                                    2⤵
                                                      PID:5296
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5156,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5332 /prefetch:8
                                                      2⤵
                                                        PID:5496
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5608,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5064 /prefetch:8
                                                        2⤵
                                                          PID:5412
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5280,i,13844195512223585004,13724639890791781799,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5480 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:6276
                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                        1⤵
                                                          PID:2204
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                          1⤵
                                                            PID:3312
                                                          • C:\Program Files\7-Zip\7zG.exe
                                                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\BadRabbit\" -ad -an -ai#7zMap8887:80:7zEvent25835
                                                            1⤵
                                                            • Suspicious use of FindShellTrayWindow
                                                            PID:6012
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultb3ffa4fah16e2h490ehaf72h82c75f5f2fa6
                                                            1⤵
                                                              PID:6044
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffc48a146f8,0x7ffc48a14708,0x7ffc48a14718
                                                                2⤵
                                                                  PID:6024
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1424,4388317803937637549,2703599979637056852,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:2
                                                                  2⤵
                                                                    PID:4264
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1424,4388317803937637549,2703599979637056852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
                                                                    2⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:212
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1424,4388317803937637549,2703599979637056852,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:8
                                                                    2⤵
                                                                      PID:2832
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:6176
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:6220
                                                                      • C:\Users\Admin\Downloads\BadRabbit\[email protected]
                                                                        "C:\Users\Admin\Downloads\BadRabbit\[email protected]"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:6840
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:6900
                                                                      • C:\Users\Admin\Downloads\BadRabbit\[email protected]
                                                                        "C:\Users\Admin\Downloads\BadRabbit\[email protected]"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:7012
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:7072
                                                                      • C:\Users\Admin\Downloads\BadRabbit\[email protected]
                                                                        "C:\Users\Admin\Downloads\BadRabbit\[email protected]"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:7136
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:6208
                                                                      • C:\Users\Admin\Downloads\BadRabbit\[email protected]
                                                                        "C:\Users\Admin\Downloads\BadRabbit\[email protected]"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:6356
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:5236
                                                                      • C:\Users\Admin\Downloads\BadRabbit\[email protected]
                                                                        "C:\Users\Admin\Downloads\BadRabbit\[email protected]"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:6728
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:6768
                                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                                        "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
                                                                        1⤵
                                                                        • Modifies Internet Explorer settings
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:6744
                                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6744 CREDAT:17410 /prefetch:2
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Modifies Internet Explorer settings
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:6004
                                                                      • C:\Users\Admin\Downloads\BadRabbit\[email protected]
                                                                        "C:\Users\Admin\Downloads\BadRabbit\[email protected]"
                                                                        1⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3740
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                          2⤵
                                                                          • Loads dropped DLL
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:5308
                                                                      • C:\Windows\system32\taskmgr.exe
                                                                        "C:\Windows\system32\taskmgr.exe" /7
                                                                        1⤵
                                                                        • Checks SCSI registry key(s)
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:6392

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

                                                                        Filesize

                                                                        4KB

                                                                        MD5

                                                                        da597791be3b6e732f0bc8b20e38ee62

                                                                        SHA1

                                                                        1125c45d285c360542027d7554a5c442288974de

                                                                        SHA256

                                                                        5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

                                                                        SHA512

                                                                        d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                        Filesize

                                                                        649B

                                                                        MD5

                                                                        eeacc83f083a389d12d5521c3531d42c

                                                                        SHA1

                                                                        3426b204c8ffd8ccc743dba6bbbac516fbee896c

                                                                        SHA256

                                                                        587a2631f6dffc857b9dbad54408a75be379dddd9125a09313b94ee84e2dd345

                                                                        SHA512

                                                                        b4ddf677166481ea10d3e673ca24859fb2ae049290dc0aebc42e6c63385dba652a8b3e78cd352747949d269f9f86f9c6902e891b18e206b73c9a4d7c0752cfa3

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        628c08ba03f7fe13b717c603e9548847

                                                                        SHA1

                                                                        97c23efe1e367775a634c86c23b4c6d9e28ec328

                                                                        SHA256

                                                                        38eba7b704bb2693a5c7240fed00f93803c81285e93160972072cb4fcbc7a530

                                                                        SHA512

                                                                        ca125aa4abac09a9d66eb2eefe9a1171e5639e094085194c09f85ba19862f80ed66213bbfc3fe59ea94650d2ae4aaca87c1e7d88e7f820e58c25fb32556dba85

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                                        Filesize

                                                                        851B

                                                                        MD5

                                                                        07ffbe5f24ca348723ff8c6c488abfb8

                                                                        SHA1

                                                                        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                        SHA256

                                                                        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                        SHA512

                                                                        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                                        Filesize

                                                                        854B

                                                                        MD5

                                                                        4ec1df2da46182103d2ffc3b92d20ca5

                                                                        SHA1

                                                                        fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                        SHA256

                                                                        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                        SHA512

                                                                        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        2b57e186bb57fe03b9ca2d63c3816273

                                                                        SHA1

                                                                        3820a42310b35318073acd5fd49082129277469d

                                                                        SHA256

                                                                        486599f01d223443d4355187e39f90b7bd8cba232791abab157a960c286616d0

                                                                        SHA512

                                                                        4717e6010acf27b2aecd79cc4739667d5cc2271cf3ebf3627871361bf67d57df4cdcbedd6defbe176a04652d2d674ca8040413f7689f49612b552577d97d889e

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                        Filesize

                                                                        2B

                                                                        MD5

                                                                        d751713988987e9331980363e24189ce

                                                                        SHA1

                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                        SHA256

                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                        SHA512

                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        4b26eb7f9f40413731f954b1053c7e90

                                                                        SHA1

                                                                        7db151c02e7ba3ba071a89bf15c0526ab2f8f0a5

                                                                        SHA256

                                                                        5e62b896664eb16a40c27c01c5f4fa1c664b81bd0d737aa76f1d4e40185ed36f

                                                                        SHA512

                                                                        dbcece3e147300898cfbaf89ddb3670b4ed451cae45e86776555db2b2502f16cb657b52249c6851faa5a5b558eb9f302c27dbdce4bb45f2d006ce31ee6fef6ed

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                        Filesize

                                                                        356B

                                                                        MD5

                                                                        e46dd58270c717562031e9aaa254494c

                                                                        SHA1

                                                                        7185e109c0bd3ebeacde7d8e0bd3b0044cdd47a7

                                                                        SHA256

                                                                        cbc7a12a2955b6664bd7e19e25392fdac769857cd738f7929d4645d1793491cd

                                                                        SHA512

                                                                        215447d2db6157f23a37eaedd79ef1d6cd0cbf19a0722494bbb7150a09ae9766e5a87304ceb11ff61b12ccff7ce0f577d9a94b54d1a82f41d878af6ca7f9c47a

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        0ebfc5b92d6adcb5fc9c8c6a0ace796f

                                                                        SHA1

                                                                        ffa991ba1d2f1cdbdec5188eeb7684e15ddbfb90

                                                                        SHA256

                                                                        15081c7c2c6cc1a945ee503fe2cbc82523f6537e386948cb6165781b54586a31

                                                                        SHA512

                                                                        e5e7f4d49e5c10e08469887af2b691b1512927ab6664d519a2dea9e92347fe02bc28a499de2246f7067a10bcfc1bb4d374a28dd5f13aef2fcbbec659c81849a5

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        d29817fd71f01368d74a600436667018

                                                                        SHA1

                                                                        9f740cd9b5b8fe61a888dfd347682dbaef6897bc

                                                                        SHA256

                                                                        eb520640aa1b97d629d545aa27d538e82e70815e6a69799d0b941d3c11c74554

                                                                        SHA512

                                                                        afe622e33c9adf2af2f7024d95e3716d6ac3a20ebba10618278ba66313735f8b0c84d01d7d42b4cbe022b2f8293f3977c46c2b1134daf560bb1f7ce2c3aa170f

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        659d352226e7c55510efcfc026aaf0a8

                                                                        SHA1

                                                                        9a1760dbe6a2e6d99e594c3dc4ca8b8575f928c8

                                                                        SHA256

                                                                        268acc3c1e27237a397272764648752a85ab738b7259672fcf6832d35b3cd055

                                                                        SHA512

                                                                        33598363060395d9c41d7794eedbf5bd752491e0413291dce28f563c3677aa6813e1fe622e5aa1c660a77e219eb6234d31e42b27b6d9e7b6c3c2182d22192d36

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        2930f9210a0db04f58a6891806716565

                                                                        SHA1

                                                                        0bcdb5a56e52a625488ae9a53e1dc7b25522567a

                                                                        SHA256

                                                                        dc79b7305a3a3eb93db9b8f2d3c16b4b9e2d735664627ebff0ae69ffb8e49cbe

                                                                        SHA512

                                                                        f0cb4ff0659abc1feef6639bd3fef65ea68eb123a2bae53f5b257a0f25e47d7823dc195b93e2c5fca14b3884581f43121d4ded62740bf7a3fb69e0651b9f0287

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        5099cdabad211ad287b8fc109f1632d9

                                                                        SHA1

                                                                        4ef1c64b8db4ced563b0179acfb4bac4ba9ba8fa

                                                                        SHA256

                                                                        ee3b6f8ef7068619ff6147448ef6bd4d08000c6e2a758603bf3533d7035944b4

                                                                        SHA512

                                                                        45cb8e700dd49b24f3220f07bb246c3388f32b5c6c5d3fc8701ec57f90f673795de270cb426abdf859868ef694465d1ccf2e43b32aba839656dfbf8a3b1dca77

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        97fbd054a1da2c22c14bdb7a039f353d

                                                                        SHA1

                                                                        6e7d894e551f903b587519d2206145511f99b79a

                                                                        SHA256

                                                                        32e5553f6355fc853954fc125b9dbe768d8aa7befbc15d282bf4ecfb510b82db

                                                                        SHA512

                                                                        1f29bdb71a05bcf9b0643a95f63a201c758a4d1d2ffe26a3ee38fca3cd76511e477f8110a1b0c209f418a1b7c990ae5fe0750ba2a1802ff37f50fea63c2c0c61

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        e5d59e8b4a1c1bac7f72ce8c4104c65d

                                                                        SHA1

                                                                        50c16d16e1bd40806040219510f6a324e185f996

                                                                        SHA256

                                                                        57c893f2f0772a5e4d92ed2f7a5a9dd89a76138c061d4aecd9cab41664fca7e4

                                                                        SHA512

                                                                        626fa4e6f24f3248b84cbc2bd30494215c3b8ea303e4031470054fe1f9d63226f2ed87f8e571b00dc328a37070c3921f5973f554e4928f055964c43185b46778

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        a7f8360520e69c76fc1d08cc06727a85

                                                                        SHA1

                                                                        dd7d6b398d60edd9f55b1b4c3f1462660dfd3f8c

                                                                        SHA256

                                                                        9e5e3c95eed80505f3664efadf9ffe120e35bf32477cb86fdb58f9b179610c36

                                                                        SHA512

                                                                        2fefa4093c5c3a6aa19953446039f99b75f1436a79199e89d07c94b96a740de0af045b0e3528baf47c0b42805031477abb58e96fc5d307374a382afff6f59c1d

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        47aa65f496e411090a13a0c0ce5f7caf

                                                                        SHA1

                                                                        44cf0fa3c96586cdf6960fddd3ab0b36e59dc233

                                                                        SHA256

                                                                        0e7e48b5c1d0d869bfadaab431705186f23796493036cedb2d404e904d96d34c

                                                                        SHA512

                                                                        29145f50f9e828acb507d908e536e7bd8a9f76960106a86208fe2b5892d41eab875cca2b1a494143e54e2f3cd1def36cf654cd359aea3ceff63b52c8ad59a736

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        7b9e49725f66425077be9667ca600b7b

                                                                        SHA1

                                                                        709ba70a0871c03c2e6cb20dd7c4992b159454fb

                                                                        SHA256

                                                                        6c23c23f476417bf2fd07dfb2b417a2100865d153b1043d1fd6483af6287bc2b

                                                                        SHA512

                                                                        368f121d2b0764c7e0a78e1f6cc0a322e811b81b9bd98a20c3666a818e56c9c2effdb18272f90be490bfad07038d63e6ec39f626c38d027b991bf212dbba2779

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        5d77e05404cfadfb07c80ea729ba601c

                                                                        SHA1

                                                                        f8b01d61b45371ff9bc66928a93fca506859fd72

                                                                        SHA256

                                                                        2b34805555c08be335d7d0474afcf6a98992028e2d26f7475beb2f074714794f

                                                                        SHA512

                                                                        a12cb98c91fbb1469d6c5153578bed53bafbeaaa91c519cb52925fcad4addb6b7590df191cb2129c9f7bee530193d74b2ed58ba0397497b11a7529c14c14ee8c

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                        Filesize

                                                                        15KB

                                                                        MD5

                                                                        76acf7d50f4defb512ad3550401b1d57

                                                                        SHA1

                                                                        0549d50ced07cdc5981cc46eba695dbb28d60604

                                                                        SHA256

                                                                        9cef55fb2e8eaa972dead59f0e468351f4ad989b5ad00902bd834b58d41ce45f

                                                                        SHA512

                                                                        1690834a02f2029c47ca6f72ff34c8d468e255e8dd1816a1aa3c1ceca8c64006cf149af3d407b284170a1d41b26113f16c6a1fdb9e4766af5263efa0cc77e2bd

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                        Filesize

                                                                        72B

                                                                        MD5

                                                                        a31e6875282224771b401819865919fa

                                                                        SHA1

                                                                        d2619173370867bbeb4eccdb3327ef9bf68d29f7

                                                                        SHA256

                                                                        d253d52cadb03ed8d5611c413be243c3b9bf7f8b7434847fd48ca06aeedb60c1

                                                                        SHA512

                                                                        633ef2e4d77ae310bcc7c7e427cc7022dd899be1b3e9484881141c29965fb6a416c44ee8447fffbbabc774cb087e6522521d726dfe018a366d480d8f20f83f87

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt

                                                                        Filesize

                                                                        82B

                                                                        MD5

                                                                        9c12ec41b948e46a5108b7dbfaf1d16c

                                                                        SHA1

                                                                        860c5126809bae1950aa06800c5c1bcdf05f6c53

                                                                        SHA256

                                                                        34291f16a0ca09f3129132c388fbf0d909778432ae92059c6d85f77a622dc004

                                                                        SHA512

                                                                        a93099ce7e7896b91fe111c44df3beece4828d40705f08f403c63502cf778822f276a3d40f01bee3433b8b1de32cfeef9c8b445bfcfaf56befae6b3ec43f463c

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe592001.TMP

                                                                        Filesize

                                                                        146B

                                                                        MD5

                                                                        bb1b34b17743448099bedfabcba779f4

                                                                        SHA1

                                                                        3576931c15f4d8d0c705954027fc25298e0fac1e

                                                                        SHA256

                                                                        d1237e25228fa24186665888138daf3379342e18f43f5ffbbea14a259f111708

                                                                        SHA512

                                                                        4d6dbadfa78009f1849264b3d7908ebd7d16de6267a1a52714757760007bd52eeb7849f936a40539169796c08108de5598a2d81cb815bbe20d30154e9f32aabb

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\CURRENT

                                                                        Filesize

                                                                        16B

                                                                        MD5

                                                                        46295cac801e5d4857d09837238a6394

                                                                        SHA1

                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                        SHA256

                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                        SHA512

                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache\data_1

                                                                        Filesize

                                                                        264KB

                                                                        MD5

                                                                        3eacf8c89f0752176ff28bed423e03dd

                                                                        SHA1

                                                                        693743d8898d54a415893370e50b8f20795dbeb7

                                                                        SHA256

                                                                        efa240a1e597548862d65cef89d21dff9c6e13fc9e7ad150e1fdc32d7c9c373f

                                                                        SHA512

                                                                        63ea472cd86011d1ea931af321a72647ff36b6d8a5efe8e87e3c004e421fe28c0380eba9079e7e34ea60eaac81c2cd1c4f497a1bb8119ca5d0bc4a3c503ee216

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                        Filesize

                                                                        244KB

                                                                        MD5

                                                                        9a8936678ca4e5f6c8e07dc8bcec66c4

                                                                        SHA1

                                                                        9cb6fac5de5c1b4aa163807d0b8b8f0a18142160

                                                                        SHA256

                                                                        7de33bb231716eaf823b4a5d9273e40b19c9518e008ea6a82718eac1da322406

                                                                        SHA512

                                                                        8bd0f878e6b582a7b145d4dac706c55cd51f1efb5c70647d57894e2e7b85b98a419ce4232ec00154aa32b069f67518591e9042bb581f7cdd61d819a688eba0c9

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                        Filesize

                                                                        244KB

                                                                        MD5

                                                                        041fe4211bd7411f81efe7de0d1f5a66

                                                                        SHA1

                                                                        07f43a4366670dec9a39e5433df11cd6e48f361d

                                                                        SHA256

                                                                        3f6098cfff0525db013138d6420d58a9f5585f251baedd90ffe2b8b74a7a0d50

                                                                        SHA512

                                                                        947d2ae6f312d429b65bc1b4d1f508940392efb6c1996e929bbe9f5a79177d33dcf9141465156b8f36428a412cf4d94defa85d4d80554dbb40b672c2355b3b55

                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                        Filesize

                                                                        244KB

                                                                        MD5

                                                                        f72cf5250bae175542dfe1415836a849

                                                                        SHA1

                                                                        24ae275e9b0a2e16617c6dea015d8aea39ab9d6a

                                                                        SHA256

                                                                        79608dfe5ea720b4b9ed5ef00f024e8890191922bbd78cd688442d6535b45708

                                                                        SHA512

                                                                        2426e7e4d2fe574f7110da371c2332f52b42e317f54d67c79c1a5f810680f2958b5ffc953de3870ae91e67939afdf77415b2493e3b44e99b0b2174e766552bcb

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        fffde59525dd5af902ac449748484b15

                                                                        SHA1

                                                                        243968c68b819f03d15b48fc92029bf11e21bedc

                                                                        SHA256

                                                                        26bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762

                                                                        SHA512

                                                                        f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1a2930a5-b028-4cc7-a627-5d86038bb573.tmp

                                                                        Filesize

                                                                        1B

                                                                        MD5

                                                                        5058f1af8388633f609cadb75a75dc9d

                                                                        SHA1

                                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                        SHA256

                                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                        SHA512

                                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        3146436a23ed97e9c5d90d7cfb1dda6b

                                                                        SHA1

                                                                        b49bbc5bcf80f3510e1cdb9a041160d0a4e05183

                                                                        SHA256

                                                                        ea384a21fd8c6182355c25b681bc938c75d97f4e829f68e0e50edaf00f019a27

                                                                        SHA512

                                                                        c36ca96eff7a5f9d6c88b6a5cd7ff57020bc905d78b2ababb7845cd86006728bb89300081861d3ad3663916ad2034ad901b1b9e7a17320d13ec85b73b22a1860

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        0c48fa0b5e0698bd285c3588b8883a39

                                                                        SHA1

                                                                        d1dfba96f3f9a8dea1578b7a46c844d7c86b48f8

                                                                        SHA256

                                                                        03bc946cd6ac0b3c203d07062085ef85bc38135a95b31162e8f51f86d0dd535a

                                                                        SHA512

                                                                        25e2f52acfbb37b7ac67c7df4b7a827eb14be599a7c08799fac75b586b8f4dd25baa77e521ea774ebdd15482339f26c3878d7e2b1eb9f2f308f3fc5d895ffe32

                                                                      • C:\Users\Admin\AppData\Local\Temp\Kno52C0.tmp

                                                                        Filesize

                                                                        88KB

                                                                        MD5

                                                                        002d5646771d31d1e7c57990cc020150

                                                                        SHA1

                                                                        a28ec731f9106c252f313cca349a68ef94ee3de9

                                                                        SHA256

                                                                        1e2e25bf730ff20c89d57aa38f7f34be7690820e8279b20127d0014dd27b743f

                                                                        SHA512

                                                                        689e90e7d83eef054a168b98ba2b8d05ab6ff8564e199d4089215ad3fe33440908e687aa9ad7d94468f9f57a4cc19842d53a9cd2f17758bdadf0503df63629c6

                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir4460_862482288\086d748a-6130-4183-904c-a9a1c9ada60b.tmp

                                                                        Filesize

                                                                        150KB

                                                                        MD5

                                                                        eae462c55eba847a1a8b58e58976b253

                                                                        SHA1

                                                                        4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                                        SHA256

                                                                        ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                                        SHA512

                                                                        494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir4460_862482288\CRX_INSTALL\_locales\en_CA\messages.json

                                                                        Filesize

                                                                        711B

                                                                        MD5

                                                                        558659936250e03cc14b60ebf648aa09

                                                                        SHA1

                                                                        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                        SHA256

                                                                        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                        SHA512

                                                                        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                      • C:\Users\Admin\Downloads\BadRabbit.zip

                                                                        Filesize

                                                                        393KB

                                                                        MD5

                                                                        61da9939db42e2c3007ece3f163e2d06

                                                                        SHA1

                                                                        4bd7e9098de61adecc1bdbd1a01490994d1905fb

                                                                        SHA256

                                                                        ea8ccb8b5ec36195af831001b3cc46caedfc61a6194e2568901e7685c57ceefa

                                                                        SHA512

                                                                        14d0bc14a10e5bd8022e7ab4a80f98600f84754c2c80e22a8e3d9f9555dde5bad056d925576b29fc1a37e73c6ebca693687b47317a469a7dfdc4ab0f3d97a63e

                                                                      • C:\Users\Admin\Downloads\BadRabbit\[email protected]

                                                                        Filesize

                                                                        431KB

                                                                        MD5

                                                                        fbbdc39af1139aebba4da004475e8839

                                                                        SHA1

                                                                        de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                                        SHA256

                                                                        630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                                        SHA512

                                                                        74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                                                      • C:\Windows\A383.tmp

                                                                        Filesize

                                                                        60KB

                                                                        MD5

                                                                        347ac3b6b791054de3e5720a7144a977

                                                                        SHA1

                                                                        413eba3973a15c1a6429d9f170f3e8287f98c21c

                                                                        SHA256

                                                                        301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                                                        SHA512

                                                                        9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                                                                      • C:\Windows\infpub.dat

                                                                        Filesize

                                                                        401KB

                                                                        MD5

                                                                        1d724f95c61f1055f0d02c2154bbccd3

                                                                        SHA1

                                                                        79116fe99f2b421c52ef64097f0f39b815b20907

                                                                        SHA256

                                                                        579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                                                        SHA512

                                                                        f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                                                                      • C:\Windows\infpub.dat

                                                                        Filesize

                                                                        401KB

                                                                        MD5

                                                                        c4f26ed277b51ef45fa180be597d96e8

                                                                        SHA1

                                                                        e9efc622924fb965d4a14bdb6223834d9a9007e7

                                                                        SHA256

                                                                        14d82a676b63ab046ae94fa5e41f9f69a65dc7946826cb3d74cea6c030c2f958

                                                                        SHA512

                                                                        afc2a8466f106e81d423065b07aed2529cbf690ab4c3e019334f1bedfb42dc0e0957be83d860a84b7285bd49285503bfe95a1cf571a678dbc9bdb07789da928e

                                                                      • memory/1980-14-0x0000000002FA0000-0x0000000003008000-memory.dmp

                                                                        Filesize

                                                                        416KB

                                                                      • memory/1980-11-0x0000000002FA0000-0x0000000003008000-memory.dmp

                                                                        Filesize

                                                                        416KB

                                                                      • memory/1980-3-0x0000000002FA0000-0x0000000003008000-memory.dmp

                                                                        Filesize

                                                                        416KB

                                                                      • memory/4532-45-0x000002AA60520000-0x000002AA60530000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/4532-61-0x000002AA60620000-0x000002AA60630000-memory.dmp

                                                                        Filesize

                                                                        64KB