Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2025, 19:05

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Virus/WinNuke.98.exe

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Badrabbit family
  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • CryptoLocker

    Ransomware family with multiple variants.

  • Cryptolocker family
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Renames multiple (3258) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Downloads MZ/PE file 6 IoCs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • NTFS ADS 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Virus/WinNuke.98.exe
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc121146f8,0x7ffc12114708,0x7ffc12114718
      2⤵
        PID:1536
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
        2⤵
          PID:2476
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:1372
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
          2⤵
            PID:60
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
            2⤵
              PID:348
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:2380
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:8
                2⤵
                  PID:4076
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2300
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5072 /prefetch:8
                  2⤵
                    PID:664
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:1
                    2⤵
                      PID:4372
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6012 /prefetch:8
                      2⤵
                        PID:3176
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:1
                        2⤵
                          PID:5020
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:1
                          2⤵
                            PID:4260
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:1
                            2⤵
                              PID:5144
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                              2⤵
                                PID:5152
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5364
                              • C:\Users\Admin\Downloads\WinNuke.98.exe
                                "C:\Users\Admin\Downloads\WinNuke.98.exe"
                                2⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:5484
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                                2⤵
                                  PID:5736
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3464 /prefetch:8
                                  2⤵
                                    PID:5832
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6684 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5888
                                  • C:\Users\Admin\Downloads\WinNuke.98 (1).exe
                                    "C:\Users\Admin\Downloads\WinNuke.98 (1).exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:5996
                                  • C:\Users\Admin\Downloads\WinNuke.98 (1).exe
                                    "C:\Users\Admin\Downloads\WinNuke.98 (1).exe"
                                    2⤵
                                    • Executes dropped EXE
                                    PID:6056
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:1
                                    2⤵
                                      PID:5988
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6136 /prefetch:8
                                      2⤵
                                        PID:6124
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6716 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5228
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                                        2⤵
                                          PID:5480
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6524 /prefetch:8
                                          2⤵
                                            PID:1588
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:8
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5660
                                          • C:\Users\Admin\Downloads\HawkEye.exe
                                            "C:\Users\Admin\Downloads\HawkEye.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5684
                                          • C:\Users\Admin\Downloads\HawkEye.exe
                                            "C:\Users\Admin\Downloads\HawkEye.exe"
                                            2⤵
                                            • Chimera
                                            • Executes dropped EXE
                                            • Drops desktop.ini file(s)
                                            • Drops file in Program Files directory
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:5732
                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                              "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                              3⤵
                                              • Modifies Internet Explorer settings
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5364
                                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5364 CREDAT:17410 /prefetch:2
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Modifies Internet Explorer settings
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5964
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1
                                            2⤵
                                              PID:5972
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5712 /prefetch:8
                                              2⤵
                                                PID:5832
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5740
                                              • C:\Users\Admin\Downloads\AgentTesla.exe
                                                "C:\Users\Admin\Downloads\AgentTesla.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3820
                                              • C:\Users\Admin\Downloads\AgentTesla.exe
                                                "C:\Users\Admin\Downloads\AgentTesla.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5296
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1
                                                2⤵
                                                  PID:5700
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5508 /prefetch:8
                                                  2⤵
                                                    PID:3176
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:1
                                                    2⤵
                                                      PID:2548
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:8
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2928
                                                    • C:\Users\Admin\Downloads\BadRabbit.exe
                                                      "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3128
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                        3⤵
                                                        • Loads dropped DLL
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3004
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /c schtasks /Delete /F /TN rhaegal
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4012
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /Delete /F /TN rhaegal
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5760
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3883725423 && exit"
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4360
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3883725423 && exit"
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:1852
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 19:25:00
                                                          4⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5256
                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                            schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 19:25:00
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Scheduled Task/Job: Scheduled Task
                                                            PID:924
                                                        • C:\Windows\5C7E.tmp
                                                          "C:\Windows\5C7E.tmp" \\.\pipe\{625078C0-4795-4897-BDFD-756CB1369FEF}
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3744
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6236 /prefetch:2
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:880
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:1
                                                      2⤵
                                                        PID:5512
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6168 /prefetch:8
                                                        2⤵
                                                          PID:840
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,10277647414352332725,7231810604746850408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1184 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:5784
                                                        • C:\Users\Admin\Downloads\CryptoLocker.exe
                                                          "C:\Users\Admin\Downloads\CryptoLocker.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • NTFS ADS
                                                          PID:5344
                                                          • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                            "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5880
                                                            • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                              "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5628
                                                        • C:\Users\Admin\Downloads\CryptoLocker.exe
                                                          "C:\Users\Admin\Downloads\CryptoLocker.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:5820
                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                        1⤵
                                                          PID:3000
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:1684

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            91281d7f18713b8be65f361335cd720a

                                                            SHA1

                                                            bb4510cf09268646177189c21709c832be6488a9

                                                            SHA256

                                                            529a4e90d34063301a519f563dd652dd0e341fb850a60f08d4339ce57903d352

                                                            SHA512

                                                            961cd4574a8a10a7fda4b81baf4f941ca17be81bf2bd6338c014d3d14a5907ba9019d07d88ed8ee283648a70ce3cae99bc5c7a139333277be6b1628e199fbd7b

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CDE89F9DCB25D8AC547E3CEFDA4FB6C2_EFB75332C2EEE29C462FC21A350076B8

                                                            Filesize

                                                            5B

                                                            MD5

                                                            5bfa51f3a417b98e7443eca90fc94703

                                                            SHA1

                                                            8c015d80b8a23f780bdd215dc842b0f5551f63bd

                                                            SHA256

                                                            bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

                                                            SHA512

                                                            4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

                                                            Filesize

                                                            4KB

                                                            MD5

                                                            da597791be3b6e732f0bc8b20e38ee62

                                                            SHA1

                                                            1125c45d285c360542027d7554a5c442288974de

                                                            SHA256

                                                            5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

                                                            SHA512

                                                            d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            010f6dd77f14afcb78185650052a120d

                                                            SHA1

                                                            76139f0141fa930b6460f3ca6f00671b4627dc98

                                                            SHA256

                                                            80321891fd7f7c02dd4be4e5be09f8e57d49e076c750f8deb300be8f600de2d7

                                                            SHA512

                                                            6e6c9e348e948b946cfb97478698423e1272c4417bc8540e5daa64858e28be8fda5baf28538aee849f8bb409c17a51c60e48a3f1793e3a86cb27edeb32aa30a5

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            f09c5037ff47e75546f2997642cac037

                                                            SHA1

                                                            63d599921be61b598ef4605a837bb8422222bef2

                                                            SHA256

                                                            ba61197fff5ed487084790b869045ab41830bdf6db815503e8e064dd4e4df662

                                                            SHA512

                                                            280bff6eac4b2b4fe515696223f61531f6b507c4c863ad9eef5ab0b1d65d264eba74fb7c9314b6920922142b8ab7605792211fca11a9a9ef0fc2ae995bf4f473

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            691807df205ba4124627ddb8ea2b049d

                                                            SHA1

                                                            a7fa5cbcf4ddb496a049faac24682f25b774f5f3

                                                            SHA256

                                                            cc6319a0a9adcdbadca9bbf318107ad1744ea014f7b82b51907579ed165c4da8

                                                            SHA512

                                                            b81a3214fdabf57bbf7c4c7a6d5f803336007fbfaed8e0911a0b9825ee567410275e1b9378b96a88f1669408e439b97275b03e1290d2f783f11f5d5fdb6b59a9

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            579B

                                                            MD5

                                                            49c8405f7b641371c2c9bb3783578c1d

                                                            SHA1

                                                            3439af403c4c125fa058ec0edee8769213b03ffa

                                                            SHA256

                                                            1c07e79b8c1034f01a9b1d102090018264ca749f265fcc6a909982d684754ad3

                                                            SHA512

                                                            7121c90cc94dceb339e37f467b8ffc35efca5781a0623bad4ecd7de494a5ac620bb2e080ff2ba3609d4a26a6b326c1143f4b617d57c2970a7e0d8d646f48d01c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            c4a59f0797fffb039d795701ba9e7dd9

                                                            SHA1

                                                            7bbabe0948c651148d9855f19b64f5bbe8599ac3

                                                            SHA256

                                                            1cd195f16937b315042b08451c75292729a5137263449d00f8a1669c8fafcf06

                                                            SHA512

                                                            82e7a45bb93cb4c2d3299e758ede3a5df54ed01f788e7b63c15c176450febca8808981f6b8e61cd248583165fedff0a791cbfd32c3e145c749769868b135c40c

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            e0d7e63188d9f6c80006703de3f574e9

                                                            SHA1

                                                            ac815510fc9899f0b768429496f1ec2b625598af

                                                            SHA256

                                                            22de73d00d11ee9aac164ea68cac01f2dd7c1a25e54e19403bdbb21ad0ddc4fc

                                                            SHA512

                                                            90b69aed995501e074884ca8989c5a577e44e859ce25f37c8896730a39a7896afb892056755ae0bed5690b8ddcc12ff50bad1b73c42a887371a49bcee623016f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            27ddacf0b21b34824f1a255abf172324

                                                            SHA1

                                                            5d50ec46cc3dae83e4c07abb2eed4c00ed167f17

                                                            SHA256

                                                            c4b34d9e3d4575649236a765b222212194a9392d83dedc403e83d9c622a8455b

                                                            SHA512

                                                            ffbe56dddd2911d01a0c4bcdd9f8af92bb3109a6bbed97ce42f8c6c1768964a2c8447da4bdf9840ecc167bce20c82a72834e9a19383e6cf1809d8cf3e8bde7b4

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            a7ff46f5e53ac2913fda91543015e20b

                                                            SHA1

                                                            8c79601963205799493a6b9ed5f9e8a5a7390f3e

                                                            SHA256

                                                            8bb26891cc2901f90ef5742f626dcbeeabd2674f414ba81721729a83c9f3c85f

                                                            SHA512

                                                            05c60e5f0d099c9739017ebe151f604af8fedb2de9b1f367f027eb637cad8c4c6ffd851fe6018c88dbcc552fb0bc5024c14d666b08e85099b1541a92b4ca3b64

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            c5379ba3d4c056f15e6e17dd6447e772

                                                            SHA1

                                                            e2a6ad44d15e26168fc9a479365e67db45ecc3e2

                                                            SHA256

                                                            fed3dab41ed8f2f0671663757e08388a648fcac85c99ca37d35bf5ac16d0e039

                                                            SHA512

                                                            f96f17cfa49ec9561f71c7a3fe91ee5e1353a56174795ce0377ecacf578b4d6efa6e88dac4d7e7fd8bb01f4261246701d5f0a26ff95c230689eefb18fc3c70c4

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            aaf49de99e0a91a54a821f7b86095f9c

                                                            SHA1

                                                            3bfed38fecf84fb9bb0efea50aa8701dc0a27575

                                                            SHA256

                                                            cd44256191e2c5f7d4098388f4e5e076eba793864edb157c1d9fa284d25c2cd6

                                                            SHA512

                                                            1b52d1e1685d69f045f5c741028f3fa2934a9a13891ba1606da47ff4d67fcf618c90ee8890a2b69ff0f5798423ba4cdd4f6a4f08fb5a451664a6840c9ee3d007

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            2c915ea7fc674f9def9b738f62e2ec2c

                                                            SHA1

                                                            d6b0ab88954273030dc40e29984bc291d393f5ea

                                                            SHA256

                                                            8c4215580bbe3612815137466e4a26dfef6086043d7b32e78f3e88495a452166

                                                            SHA512

                                                            7fb1daf9138c725bc33489952a1419d582425a9ca67af5da403f90ed9009e635a6378de276f83346f033f0aefe36203da75f675b44e313207ce1f859d1aeaf19

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            7f51ef2b684d8d89f7023403f15f9fd6

                                                            SHA1

                                                            edf4fca9523d08371c2216ef675caa4084e61395

                                                            SHA256

                                                            caaf09686940bdba06548a63cf8ca6b966ba3906164da4a69d1dc9210accbc6c

                                                            SHA512

                                                            6f1fc6ebb18fc3ee6c0e6492d115ea986c8e50d8c6fbff6b490ed9ae0380392225658c0a4bb35f7ea59ebc281feed4ed81f1e3c61de3689ed94151a23ce4b1a4

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            a35d2fa86c1e2fb930cd82c7768c3e86

                                                            SHA1

                                                            461b51ae9cf258bc35b2e7ba23ce7c9ec8f4540b

                                                            SHA256

                                                            1e5e6a81b071adacf9ad9cb38a3433a2021c069e1a707f9769ae3d57293bee12

                                                            SHA512

                                                            b63f7fe989f0dcc1c15ecaf35df5c1e428338c653426c17dd24c68daa6c6520a3c1ef7b763b6270bda20aff94bfa0e2e91c556bbfc6121fbcf048670dc05717a

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            82102c3c0419f5c06526af8f158e330f

                                                            SHA1

                                                            21540f9edea883727d518bbdf60516cabb281bb2

                                                            SHA256

                                                            86b5a1b041be52fd42f307f05f2cfb19b345320d951d21763f72b5b4dbd82cd4

                                                            SHA512

                                                            53f707c2aae0e6368e9a0e33788ed5f87ff5a149b2356122587d38e0f23994e40a48a27f305fc5e1424c8634da1b9fc1f65a4e0aa6eed9814b0910bc584ca684

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            cd66e8b2047f3fd825bc0c3b1c8dfbbc

                                                            SHA1

                                                            5023bcbe45605002872ebcc9d344a87a1abe373f

                                                            SHA256

                                                            bd7ecece240e6b0b12e3aff582ac18f93ace37db5a15a72eab516415a7f06933

                                                            SHA512

                                                            f99e42ff46daac78e5dc37496f21a6104e068355588f92e85a8675955ae135b65ca1410308c77cac81f30cce97f24677ec2d1d66d7367011477afd79224b28aa

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581da5.TMP

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            8a0d9310b49dd68eb1a1997a2dc8a44a

                                                            SHA1

                                                            e08cabd6feda07bce464c41c39f002cce9a286a4

                                                            SHA256

                                                            5a670bf3752122c654508a33eb1d45b588f41f2d5b99acc60e81d989f1e0c03f

                                                            SHA512

                                                            7de0414ecaed4f2f995b36042a9bf66f62a3299711616e874077fb52bc131283d907f03d43ab1806843e614e54c13e1d9415db25d7ba2d0839670d8a54ad0b22

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            6752a1d65b201c13b62ea44016eb221f

                                                            SHA1

                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                            SHA256

                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                            SHA512

                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            298d6fcadd47fef13f57d4b5202a7408

                                                            SHA1

                                                            9858939d23d45fe8d65638c91fa6756ab90dc015

                                                            SHA256

                                                            be835271dde16f2df806b1bf96259fa14b8c7f1fa5051f1fcb45a6340e531460

                                                            SHA512

                                                            d69fd219f45511db945a2eb2abad7e6b7067012f8add26db2da5f56491ed980813f31726826055ce44c86293637a7154583f2e692726975c43cc35379fb070b9

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            bb32f07fb9aceff7166665134b83d955

                                                            SHA1

                                                            bb7caec1bb331d7693c8a101d5438b151a5fe3e4

                                                            SHA256

                                                            2089e5c7a0cdcd31194bbf7d03831a56b153ed6c09af7f4c545d3a63dc3d3cfc

                                                            SHA512

                                                            96581632b2a223050ce42560fa76bc863da0f7b34f947b7368c3b1ad3495f5a09b7292b0c986d2ec164fe6967aefb6d21b48a30fad80fb4417d261fb21403c48

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            4953bfd557b6b364ab35b321e48b699a

                                                            SHA1

                                                            0c4613135fdd4e243b236f6a56a03470d90ce44a

                                                            SHA256

                                                            0352892518f72d22af1bd940c05f4f6363f2a1b720012c5372747032f7485198

                                                            SHA512

                                                            01d6c1f669a84337b74dd29ee6ea2ed8e4794eb8edd39973cb240002660a3144a894f1ac0211a4885b27df51022d771fbbbe4103912c241467474fd11d7b8e46

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            81e113c9c246cf9e318ffe4041005138

                                                            SHA1

                                                            49b5cb161b04cac119bc90e5a5d11b3174665aeb

                                                            SHA256

                                                            e555e60d8fa3caf77bfea76a636c56bba7a41787ef2903ffc8d709f5edf31d03

                                                            SHA512

                                                            b340d6514075e2283e07505e7d6856fe7d5f54218144b191cabd2984574a46838bfb06da08b8aef8c1334d08fcc2bc7bf173fb64296eaecb11a89a51a08e23f8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            c8295009a322e76ef030d3f08ca245ec

                                                            SHA1

                                                            bf30fce9f7aa4826752f663f3af1c166c85885f2

                                                            SHA256

                                                            975e8979d9c94f5f9879c14771a43475e0d1abe2707e1216abf328c28a62cea9

                                                            SHA512

                                                            2e6ce396c814fb04c3bdd9a9bc59bbaaf9237019bf767753022e0d2767b48154d0f0c347d8ab64dfa284f906be1bf118f6e09107a93287c97da7693865cefbb2

                                                          • C:\Users\Admin\Downloads\Unconfirmed 303774.crdownload

                                                            Filesize

                                                            32KB

                                                            MD5

                                                            eb9324121994e5e41f1738b5af8944b1

                                                            SHA1

                                                            aa63c521b64602fa9c3a73dadd412fdaf181b690

                                                            SHA256

                                                            2f1f93ede80502d153e301baf9b7f68e7c7a9344cfa90cfae396aac17e81ce5a

                                                            SHA512

                                                            7f7a702ddec8d94cb2177b4736d94ec53e575be3dd2d610410cb3154ba9ad2936c98e0e72ed7ab5ebbcbe0329be0d9b20a3bcd84670a6d1c8d7e0a9a3056edd2

                                                          • C:\Users\Admin\Downloads\Unconfirmed 328735.crdownload

                                                            Filesize

                                                            2.8MB

                                                            MD5

                                                            cce284cab135d9c0a2a64a7caec09107

                                                            SHA1

                                                            e4b8f4b6cab18b9748f83e9fffd275ef5276199e

                                                            SHA256

                                                            18aab0e981eee9e4ef8e15d4b003b14b3a1b0bfb7233fade8ee4b6a22a5abbb9

                                                            SHA512

                                                            c45d021295871447ce60250ff9cbeba2b2a16a23371530da077d6235cfe5005f10fa228071542df3621462d913ad2f58236dc0c0cb390779eef86a10bba8429f

                                                          • C:\Users\Admin\Downloads\Unconfirmed 328735.crdownload:SmartScreen

                                                            Filesize

                                                            7B

                                                            MD5

                                                            4047530ecbc0170039e76fe1657bdb01

                                                            SHA1

                                                            32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                            SHA256

                                                            82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                            SHA512

                                                            8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                          • C:\Users\Admin\Downloads\Unconfirmed 637062.crdownload

                                                            Filesize

                                                            338KB

                                                            MD5

                                                            04fb36199787f2e3e2135611a38321eb

                                                            SHA1

                                                            65559245709fe98052eb284577f1fd61c01ad20d

                                                            SHA256

                                                            d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9

                                                            SHA512

                                                            533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444

                                                          • C:\Users\Admin\Downloads\Unconfirmed 656987.crdownload

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            a56d479405b23976f162f3a4a74e48aa

                                                            SHA1

                                                            f4f433b3f56315e1d469148bdfd835469526262f

                                                            SHA256

                                                            17d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23

                                                            SHA512

                                                            f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a

                                                          • C:\Users\Admin\Downloads\Unconfirmed 814996.crdownload

                                                            Filesize

                                                            431KB

                                                            MD5

                                                            fbbdc39af1139aebba4da004475e8839

                                                            SHA1

                                                            de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                            SHA256

                                                            630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                            SHA512

                                                            74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                                          • C:\Users\Admin\Downloads\Unconfirmed 914032.crdownload

                                                            Filesize

                                                            232KB

                                                            MD5

                                                            60fabd1a2509b59831876d5e2aa71a6b

                                                            SHA1

                                                            8b91f3c4f721cb04cc4974fc91056f397ae78faa

                                                            SHA256

                                                            1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

                                                            SHA512

                                                            3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

                                                          • C:\Windows\5C7E.tmp

                                                            Filesize

                                                            60KB

                                                            MD5

                                                            347ac3b6b791054de3e5720a7144a977

                                                            SHA1

                                                            413eba3973a15c1a6429d9f170f3e8287f98c21c

                                                            SHA256

                                                            301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                                            SHA512

                                                            9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                                                          • C:\Windows\infpub.dat

                                                            Filesize

                                                            401KB

                                                            MD5

                                                            1d724f95c61f1055f0d02c2154bbccd3

                                                            SHA1

                                                            79116fe99f2b421c52ef64097f0f39b815b20907

                                                            SHA256

                                                            579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                                            SHA512

                                                            f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                                                          • memory/3004-8393-0x0000000001350000-0x00000000013B8000-memory.dmp

                                                            Filesize

                                                            416KB

                                                          • memory/3004-8424-0x0000000001350000-0x00000000013B8000-memory.dmp

                                                            Filesize

                                                            416KB

                                                          • memory/3004-8401-0x0000000001350000-0x00000000013B8000-memory.dmp

                                                            Filesize

                                                            416KB

                                                          • memory/5732-372-0x0000000010000000-0x0000000010010000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/5732-409-0x00000000011E0000-0x00000000011FA000-memory.dmp

                                                            Filesize

                                                            104KB