Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/03/2025, 19:38

250318-ycrjca1kz6 6

18/03/2025, 19:35

250318-ya273a1kx9 9

18/03/2025, 19:32

250318-x86gpsw1hs 6

18/03/2025, 19:31

250318-x8flaaw1gs 3

18/03/2025, 19:29

250318-x7f6es1kt5 10

18/03/2025, 19:25

250318-x5evks1j19 10

18/03/2025, 19:16

250318-xyyn4swzdx 8

18/03/2025, 19:13

250318-xw6a6swzb1 10

18/03/2025, 19:04

250318-xreyeswyfv 8

18/03/2025, 19:00

250318-xntmeawycw 10

Analysis

  • max time kernel
    101s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 18:47

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Badrabbit family
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Downloads MZ/PE file 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Drops file in Windows directory 24 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 11 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x22c,0x7ff9f3e2f208,0x7ff9f3e2f214,0x7ff9f3e2f220
      2⤵
        PID:1120
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1984,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=2444 /prefetch:3
        2⤵
        • Downloads MZ/PE file
        PID:2832
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2400,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=2396 /prefetch:2
        2⤵
          PID:4052
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1820,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=2632 /prefetch:8
          2⤵
            PID:208
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3364,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=3444 /prefetch:1
            2⤵
              PID:2188
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3372,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:1
              2⤵
                PID:5436
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4320,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=4832 /prefetch:8
                2⤵
                  PID:656
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5036,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=5068 /prefetch:8
                  2⤵
                    PID:2584
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5472,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=5512 /prefetch:8
                    2⤵
                      PID:3924
                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5512,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=5524 /prefetch:8
                      2⤵
                        PID:4984
                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5512,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=5524 /prefetch:8
                        2⤵
                          PID:316
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5548,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6168 /prefetch:8
                          2⤵
                            PID:4184
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=6296,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6308 /prefetch:1
                            2⤵
                              PID:1980
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6132,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6512 /prefetch:8
                              2⤵
                                PID:3000
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6656,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6668 /prefetch:8
                                2⤵
                                  PID:6140
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6504,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6488 /prefetch:8
                                  2⤵
                                    PID:2808
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6496,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6516 /prefetch:8
                                    2⤵
                                      PID:1932
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6084,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6920 /prefetch:8
                                      2⤵
                                        PID:3616
                                      • C:\Users\Admin\Downloads\BadRabbit.exe
                                        "C:\Users\Admin\Downloads\BadRabbit.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        PID:3552
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                          3⤵
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:5524
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /c schtasks /Delete /F /TN rhaegal
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5324
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /Delete /F /TN rhaegal
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:1084
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3971612626 && exit"
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2380
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 3971612626 && exit"
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1784
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 19:06:00
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1096
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 19:06:00
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2056
                                          • C:\Windows\22A6.tmp
                                            "C:\Windows\22A6.tmp" \\.\pipe\{A19BF19E-356A-4507-8581-18C461E341AA}
                                            4⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4332
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6444,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=3644 /prefetch:1
                                        2⤵
                                          PID:5872
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6948,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6944 /prefetch:8
                                          2⤵
                                            PID:1484
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6796,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=5064 /prefetch:8
                                            2⤵
                                              PID:788
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:5344
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1128
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:3380
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4768
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:5768
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5132
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:4984
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:780
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:2984
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4120
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:2844
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2240
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:4820
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:6000
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:4672
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5264
                                            • C:\Users\Admin\Downloads\BadRabbit.exe
                                              "C:\Users\Admin\Downloads\BadRabbit.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:1804
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                3⤵
                                                • Loads dropped DLL
                                                • Drops file in Windows directory
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2720
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6244,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6460 /prefetch:8
                                              2⤵
                                                PID:1280
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5844,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6308 /prefetch:8
                                                2⤵
                                                  PID:2820
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=3672,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6832 /prefetch:1
                                                  2⤵
                                                    PID:5768
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5508,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=4296 /prefetch:8
                                                    2⤵
                                                      PID:3580
                                                    • C:\Users\Admin\Downloads\RedEye.exe
                                                      "C:\Users\Admin\Downloads\RedEye.exe"
                                                      2⤵
                                                      • Modifies Windows Defender DisableAntiSpyware settings
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • UAC bypass
                                                      • Disables RegEdit via registry modification
                                                      • Event Triggered Execution: Image File Execution Options Injection
                                                      • Checks computer location settings
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Checks whether UAC is enabled
                                                      • Drops autorun.inf file
                                                      • Sets desktop wallpaper using registry
                                                      • Drops file in Windows directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • System policy modification
                                                      PID:3080
                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                        vssadmin delete shadows /all /quiet
                                                        3⤵
                                                        • Interacts with shadow copies
                                                        PID:2844
                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                        vssadmin delete shadows /all /quiet
                                                        3⤵
                                                        • Interacts with shadow copies
                                                        PID:2216
                                                      • C:\Windows\SYSTEM32\vssadmin.exe
                                                        vssadmin delete shadows /all /quiet
                                                        3⤵
                                                        • Interacts with shadow copies
                                                        PID:3992
                                                      • C:\Windows\SYSTEM32\NetSh.exe
                                                        NetSh Advfirewall set allprofiles state off
                                                        3⤵
                                                        • Modifies Windows Firewall
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        PID:2716
                                                      • C:\Windows\System32\shutdown.exe
                                                        "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                        3⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5612
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2108,i,13467564546607683537,10348459150068068524,262144 --variations-seed-version --mojo-platform-channel-handle=6512 /prefetch:8
                                                      2⤵
                                                        PID:5392
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                      1⤵
                                                        PID:4960
                                                      • C:\Windows\system32\vssvc.exe
                                                        C:\Windows\system32\vssvc.exe
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2260
                                                      • C:\Windows\system32\LogonUI.exe
                                                        "LogonUI.exe" /flags:0x4 /state0:0xa3929855 /state1:0x41c64e6d
                                                        1⤵
                                                        • Modifies data under HKEY_USERS
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:5200

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Program Files\chrome_Unpacker_BeginUnzipping2336_541934578\manifest.fingerprint

                                                        Filesize

                                                        66B

                                                        MD5

                                                        10e5b71ce74ece6a30068113daa48029

                                                        SHA1

                                                        f05e2cf0edcb0af7f26af5e6192ee7eafdb07b81

                                                        SHA256

                                                        24f588cacbf90cda1c7187b13934e27b6d36b46fcc30de1e43569854dc9771b4

                                                        SHA512

                                                        6d6dbbd467e7646f4723a762db2c4860686ccda30fa9a39220ca719a26e0979767510a48fa19144ee7d02787513e90fe3723325c4d8e88ca919fed005fa8fccf

                                                      • C:\Program Files\chrome_Unpacker_BeginUnzipping2336_541934578\manifest.json

                                                        Filesize

                                                        72B

                                                        MD5

                                                        a30b19bb414d78fff00fc7855d6ed5fd

                                                        SHA1

                                                        2a6408f2829e964c578751bf29ec4f702412c11e

                                                        SHA256

                                                        9811cd3e1fbf80feb6a52ad2141fc1096165a100c2d5846dd48f9ed612c6fc9f

                                                        SHA512

                                                        66b6db60e9e6f3059d1a47db14f05d35587aa2019bc06e6cf352dfbb237d9dfe6dce7cb21c9127320a7fdca5b9d3eb21e799abe6a926ae51b5f62cf646c30490

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        280B

                                                        MD5

                                                        01cc3a42395638ce669dd0d7aba1f929

                                                        SHA1

                                                        89aa0871fa8e25b55823dd0db9a028ef46dfbdd8

                                                        SHA256

                                                        d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee

                                                        SHA512

                                                        d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        79aabfd0b65b7ce587aa10ee3556abbc

                                                        SHA1

                                                        61001681460b2971ac777289f3dae568c0da3b38

                                                        SHA256

                                                        2520fb1568ee7951f3b32ef533b9b0f403d96433fec9ea4ee4e9998104271fa1

                                                        SHA512

                                                        d3e5b0584f9346f7f31aad365a022a46950e6d2aaf3863e3b832ee9a909a0aff9e289ca231a4ddc29d1360fe353b0d4751afbd14b61b75372df6275ea28ad112

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe580693.TMP

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        5e991ce1dac785e7eda036987318a225

                                                        SHA1

                                                        51e14c3b8f887014d8ccaf704b6468d1adea9f17

                                                        SHA256

                                                        9a3077b27ca8294818433425d32470bebb4825d662843440622588ddaac60edc

                                                        SHA512

                                                        0910a170050206e7bf5b260d7eb88da7e785de25a8516760f637e8978bbb7de8bd1df064d38338520f4456148674d86ee4fd370aaed7dda042adb66c5a66c9fb

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                        Filesize

                                                        2B

                                                        MD5

                                                        99914b932bd37a50b983c5e7c90ae93b

                                                        SHA1

                                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                        SHA256

                                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                        SHA512

                                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                        Filesize

                                                        107KB

                                                        MD5

                                                        40e2018187b61af5be8caf035fb72882

                                                        SHA1

                                                        72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                        SHA256

                                                        b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                        SHA512

                                                        a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        6cf3266a2d51ddba7769417c41038640

                                                        SHA1

                                                        886e6dac5cdae411abd4398b9d6265bf291acb08

                                                        SHA256

                                                        9067111661cba2e42e29a93f4b19dab4a2b40603bbf7ea48274a7eb74733686e

                                                        SHA512

                                                        ff8e72f1b53215cd9b46b77ebf15c0b3818fe7fd63d9181f859233232cd757daf9c1c98efbf84502b428c95fa6f923f7afd9da62841546b18f579b2fa87c6758

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                        Filesize

                                                        40B

                                                        MD5

                                                        20d4b8fa017a12a108c87f540836e250

                                                        SHA1

                                                        1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                        SHA256

                                                        6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                        SHA512

                                                        507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\e3e42857-3a30-4ff5-9a17-b0ea195cf3a9.tmp

                                                        Filesize

                                                        2B

                                                        MD5

                                                        d751713988987e9331980363e24189ce

                                                        SHA1

                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                        SHA256

                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                        SHA512

                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        650ddd3054b107618ea6c07aaac033b3

                                                        SHA1

                                                        46dc48bdc3fb5770b2ab9681df2f8cc30887e3dc

                                                        SHA256

                                                        c73e541b165a81c4f7a417011dad706623275e6cb5cfb59a7b795bcdda3be28d

                                                        SHA512

                                                        29f8d68f63c64184403e2d48416576deebeecaaab8cb9fda4a68777ba85b6fb9c5559a78cee924f2449af5c3f661e167255d158dd6b3398d55044a4aabbd7425

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                        Filesize

                                                        36KB

                                                        MD5

                                                        dc2127e260777e67e22579f5ac5339ca

                                                        SHA1

                                                        01c7cbe97869fceb9b26db292c9b239760871e35

                                                        SHA256

                                                        637c69f0774176391acf64c40df03fa2ba4c894f1cfb368dba45a2ba5aa13691

                                                        SHA512

                                                        5519a25008ad8e1b075b48e8cf51217bcbe981e83b1d073e43006be1bb10d8ea91f6eaf2ea1e6be3ec95ffa23f7c2d13a03e4f04d3324a6ee1ff7043b56961ba

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                        Filesize

                                                        22KB

                                                        MD5

                                                        07db63c027c4cc4cab34883c02728692

                                                        SHA1

                                                        f21b93276a363a8dead1bae771148ec02293f6cd

                                                        SHA256

                                                        d2e3c17b945fee46901af7b24a8a3202bbf5ba7db61fe04d60d678a10004e39f

                                                        SHA512

                                                        d8323f1ad9b4140b61a4fe5ea169158001177d7e4db94aecc54759c739db3da85690e264b3cc4de167c07b35655fd1399ecfa39c136310211c367a3b1b227471

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                        Filesize

                                                        469B

                                                        MD5

                                                        d3b47623f43037f5bb818fdab328d3f4

                                                        SHA1

                                                        35cfea0ed2dc0c9df2e9b64e65f4d60f5f006c1a

                                                        SHA256

                                                        d54b696f6821e66a9a9769ece584dcc8b0094cdec342c2857ce0dd34b31df243

                                                        SHA512

                                                        8d6e54b0f433deefff2a0e3b236460bad944b33b0cb2ae79e2ed3baa7af41966915d92e26948eb14a0d3fd4767cbffebf70c86a4d161b7044ff4a88833d202a8

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                        Filesize

                                                        904B

                                                        MD5

                                                        6568c3182b90a9e715b0dca95e92ccee

                                                        SHA1

                                                        0b337c2b2d6bc0e95ae68fca21a8d5567efa0198

                                                        SHA256

                                                        497a6788ff8325f25b4c75c665854c1b1aebacb984096e67537f10618e747b67

                                                        SHA512

                                                        7552fca600a1a91fe5c604595b0d0397bedc7e2d2831bee26a0b098791b1e08ec3aa3dcdb17414ea3463c8f8fe39a68a439f86df2ea38db478e2ad872d89dffa

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                        Filesize

                                                        18KB

                                                        MD5

                                                        f17253a34a171e7115d8df64fa540313

                                                        SHA1

                                                        52f31d1ce757b4921d001525cc50217e6113fcf6

                                                        SHA256

                                                        3a99c9a13129f71280164f89c7ca8180131474a38c6b1d5f31f5f13f2f115b83

                                                        SHA512

                                                        c3b69eed0e1b5f42d21ce474064954ed71d0ef69b839e732de89efe6c96d1d0920b723111b18e9ee8b506502690ae07615db3b9ba9cc55b4437cfbdbd3e269a9

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                        Filesize

                                                        19KB

                                                        MD5

                                                        41c1930548d8b99ff1dbb64ba7fecb3d

                                                        SHA1

                                                        d8acfeaf7c74e2b289be37687f886f50c01d4f2f

                                                        SHA256

                                                        16cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502

                                                        SHA512

                                                        a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        49KB

                                                        MD5

                                                        ed74c9822fd4ab503fff0dcb25c2e365

                                                        SHA1

                                                        64aa2b1ee8d5334f1f3aa01d7997ac7339f50a79

                                                        SHA256

                                                        b6dd5a423ef1630f589536813c654c560e88de3510d3654635c3f27a73a5b91d

                                                        SHA512

                                                        940d16d51319461db8b6ed8dcbcb24366a7a5245f16b8b411a9c19f0c6610541a180e978d7259219cda3ec413990e9ddd06ad7ad834502f72bb59c9e7a6a8c2b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        40KB

                                                        MD5

                                                        e013337aac4b05b2782e1ef0ad64db67

                                                        SHA1

                                                        96cd72db37aee9227db8935e8ae71fd97472a193

                                                        SHA256

                                                        8423681951fd6832a6f6e6b9c5e881083ec8de4e80fa167bfa2f7d084ada1fa4

                                                        SHA512

                                                        4dac9ab36579fd58cbc37e4216b035e55cc875955e4bc7219e5f3d475fa465627501d2a6652295e517f3ed372f6c9ddc5f330de4aca6c7101cd6fb5d3d03490d

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        49KB

                                                        MD5

                                                        efaa2294fb6f30328f5ece31a499a166

                                                        SHA1

                                                        225fe8edf2e9d0533ff80b5587fe6290c3fab4e9

                                                        SHA256

                                                        7ed5ef86c48d6de1bf250c5ab3b3798d0dab7fc69f1870adfe34b9f1fef5d47e

                                                        SHA512

                                                        7b25f1560acc52126aa53e58ffda9511e09572237150cff6912c20758142428faf1f85547c6bad8f3577506a8b28c3429dc6fcb985a134016cb38223d664621c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        54KB

                                                        MD5

                                                        2aeca4ff1882a37fd799880648f8f9e2

                                                        SHA1

                                                        cf061886aa473183b6575c0d07f7e07809c7b2a8

                                                        SHA256

                                                        2cc42831cd14ff144ff07f9b1f9b2dbe45a36784e3b100a21604bfe6bbff49b8

                                                        SHA512

                                                        90c58770f5fdd312d1bca29aaf78047f7512ee096aa4772fbaf0384303587c1f0d724821ece1f03a6c27df155a7074041d09971c4d8c922eb101ad152a24b6d3

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        49KB

                                                        MD5

                                                        fc05698279c243be0dfd6fefee34d537

                                                        SHA1

                                                        8e455b1b1c2f9522088edbc650bd605924b663b1

                                                        SHA256

                                                        e215945baa7f147c9377e528ae2972880a2d3940478a417ca8414cb8778665cf

                                                        SHA512

                                                        cd9ea8fd264f2fe4f63e6c8074b920314b3230e7cae7f15c948228c44b93123031efa46c9603d905567accdbc5dc43e34dabb7273b1e4d9dbf06fe76edcadd87

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                        Filesize

                                                        54KB

                                                        MD5

                                                        ee12e3f92af9d6fd6f5c6e4733b14652

                                                        SHA1

                                                        f7f9fc727c52179edeeb0807fdf683d6ed865108

                                                        SHA256

                                                        accb017345376578c51a11941ffe736f1f39b43148701a24d7b36c8cf00bcd7a

                                                        SHA512

                                                        20478b9ebe85cb39cb27da33ad587d7fa3997983675af86b5ae6af2d95619c0ed52ac7b24e5f9249a0c1c42ceab992e7e1a669a2de030b06166bcb4e3e651c80

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                        Filesize

                                                        392B

                                                        MD5

                                                        cb54433d5874e1438cebe9333fd099ba

                                                        SHA1

                                                        bcb2ac7b76fa5a9d58b4bff55f3cd3090777d783

                                                        SHA256

                                                        006b79d9113d140e62b357bc3d94d6b16ed44503cd61d74cbb227c071920853d

                                                        SHA512

                                                        2c4482681345f6bcafc381caa8b624f6fe5d24c57464d30120fc4497165b0153fb79b1ee1a7256451997f86d560bbf1205ff41989ea61c55756201cda687e916

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter~RFe58be98.TMP

                                                        Filesize

                                                        392B

                                                        MD5

                                                        5ef36ff6c60a65af8fac9d00fd73babe

                                                        SHA1

                                                        4208eadad7dd6e0e948fe4f24b7809474797e22e

                                                        SHA256

                                                        4f5712359bfbdee00a79a4626b7fb11052b994dc84caea680db2b62904a91f40

                                                        SHA512

                                                        a1279aeecf777d944deced8e1cc65d60b59b6f41d2f33c8bc80907e1ae56d50b915dabda3f4df018a746177121fcc227e17d9457ed2f9486836d0e3dffb7d794

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SafetyTips\3057\safety_tips.pb

                                                        Filesize

                                                        163KB

                                                        MD5

                                                        bd6846ffa7f4cf897b5323e4a5dcd551

                                                        SHA1

                                                        a6596cdc8de199492791faa39ce6096cf39295cd

                                                        SHA256

                                                        854b7eb22303ec3c920966732bc29f58140a82e1101dffe2702252af0f185666

                                                        SHA512

                                                        aa19b278f7211ffaf16b14b59d509ce6b80708e2bb5af87d98848747de4cba13b6626135dd3ec7aabd51b4c2cfb46ed96800a520d2dae8af8105054b6cd40e0b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\SafetyTips\3057\typosquatting_list.pb

                                                        Filesize

                                                        3KB

                                                        MD5

                                                        17c10dbe88d84b9309e6d151923ce116

                                                        SHA1

                                                        9ad2553c061ddcc07e6f66ce4f9e30290c056bdf

                                                        SHA256

                                                        3ad368c74c9bb5da4d4750866f16d361b0675a6b6dc4e06e2edd72488663450e

                                                        SHA512

                                                        ad8ed3797941c9cad21ae2af03b77ce06a23931d9c059fe880935e2b07c08f85fc628e39873fb352c07714b4e44328799b264f4adb3513975add4e6b67e4a63c

                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        2a613c3868afba17ee827248958f63a8

                                                        SHA1

                                                        9f5f4f10d77aca7f9f2a49f27c840762fb5540c0

                                                        SHA256

                                                        954d2f5869f476eb573e904de095f354da8ef099d2f4e9128a782d0520226838

                                                        SHA512

                                                        1567237085ba0c4501feae5ff7bcd793841afdaf8a901e06cf4e0df8e3149130ac4d89860eddc51b3ba76de9948d45cb1354807a2ca2c845d25e0802fbfc7253

                                                      • C:\Users\Admin\Downloads\BadRabbit.exe.crdownload

                                                        Filesize

                                                        431KB

                                                        MD5

                                                        fbbdc39af1139aebba4da004475e8839

                                                        SHA1

                                                        de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                        SHA256

                                                        630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                        SHA512

                                                        74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                                      • C:\Users\Admin\Downloads\RedEye.exe

                                                        Filesize

                                                        10.6MB

                                                        MD5

                                                        e9e5596b42f209cc058b55edc2737a80

                                                        SHA1

                                                        f30232697b3f54e58af08421da697262c99ec48b

                                                        SHA256

                                                        9ac9f207060c28972ede6284137698ce0769e3695c7ad98ab320605d23362305

                                                        SHA512

                                                        e542319beb6f81b493ad80985b5f9c759752887dc3940b77520a3569cd5827de2fcae4c2357b7f9794b382192d4c0b125746df5cf08f206d07b2b473b238d0c7

                                                      • C:\Windows\22A6.tmp

                                                        Filesize

                                                        60KB

                                                        MD5

                                                        347ac3b6b791054de3e5720a7144a977

                                                        SHA1

                                                        413eba3973a15c1a6429d9f170f3e8287f98c21c

                                                        SHA256

                                                        301b905eb98d8d6bb559c04bbda26628a942b2c4107c07a02e8f753bdcfe347c

                                                        SHA512

                                                        9a399916bc681964af1e1061bc0a8e2926307642557539ad587ce6f9b5ef93bdf1820fe5d7b5ffe5f0bb38e5b4dc6add213ba04048c0c7c264646375fcd01787

                                                      • C:\Windows\infpub.dat

                                                        Filesize

                                                        401KB

                                                        MD5

                                                        1d724f95c61f1055f0d02c2154bbccd3

                                                        SHA1

                                                        79116fe99f2b421c52ef64097f0f39b815b20907

                                                        SHA256

                                                        579fd8a0385482fb4c789561a30b09f25671e86422f40ef5cca2036b28f99648

                                                        SHA512

                                                        f2d7b018d1516df1c97cfff5507957c75c6d9bf8e2ce52ae0052706f4ec62f13eba6d7be17e6ad2b693fdd58e1fd091c37f17bd2b948cdcd9b95b4ad428c0113

                                                      • C:\Windows\infpub.dat

                                                        Filesize

                                                        401KB

                                                        MD5

                                                        c4f26ed277b51ef45fa180be597d96e8

                                                        SHA1

                                                        e9efc622924fb965d4a14bdb6223834d9a9007e7

                                                        SHA256

                                                        14d82a676b63ab046ae94fa5e41f9f69a65dc7946826cb3d74cea6c030c2f958

                                                        SHA512

                                                        afc2a8466f106e81d423065b07aed2529cbf690ab4c3e019334f1bedfb42dc0e0957be83d860a84b7285bd49285503bfe95a1cf571a678dbc9bdb07789da928e

                                                      • C:\Windows\infpub.dat

                                                        Filesize

                                                        401KB

                                                        MD5

                                                        7f13c57aed1c74fb2273d3e30ecdb5ef

                                                        SHA1

                                                        b2a3054cdd6f5636e9d6386d3abdf9f6fbeb8333

                                                        SHA256

                                                        0812d9df3caf0071c8753c3d4abcb7b5650b21d4de23ad77fba406fcceae2348

                                                        SHA512

                                                        a55af49432e2730dbea7d54f6fe12993de3037a5d6b70c889407df672ed8ddf5d68309d2ad2a2a46fc3f5cf15a7812595aa57b588ec0a96459ec5001b1b9e263

                                                      • C:\Windows\infpub.dat

                                                        Filesize

                                                        401KB

                                                        MD5

                                                        f6f7dfe324da976481c8730ffd5509c0

                                                        SHA1

                                                        240f9e6e3caecd8ba5b95a1e426f9d61655a56f1

                                                        SHA256

                                                        7d03ed6535d8c34bf9672eeccb16cd0eca0d50941b7e2e410b0a7be58545d686

                                                        SHA512

                                                        4b1b7a9daa0ee984c124f6059beefac7bb2d24599e435b00f1df6a10d752eef7d5575a69775924a3ed8fda20566f4e1cb07b02eda68b81662fdd128c807929ed

                                                      • memory/780-562-0x0000000002640000-0x00000000026A8000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/780-554-0x0000000002640000-0x00000000026A8000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/1128-506-0x0000000002070000-0x00000000020D8000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/1128-514-0x0000000002070000-0x00000000020D8000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/2240-580-0x0000000002570000-0x00000000025D8000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/3080-734-0x000002044D8C0000-0x000002044E8D6000-memory.dmp

                                                        Filesize

                                                        16.1MB

                                                      • memory/3080-735-0x0000020433540000-0x0000020433546000-memory.dmp

                                                        Filesize

                                                        24KB

                                                      • memory/3080-728-0x0000020432720000-0x00000204331BC000-memory.dmp

                                                        Filesize

                                                        10.6MB

                                                      • memory/4120-567-0x00000000007D0000-0x0000000000838000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/4120-575-0x00000000007D0000-0x0000000000838000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/4768-528-0x00000000023A0000-0x0000000002408000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/4768-536-0x00000000023A0000-0x0000000002408000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/5132-541-0x0000000000C20000-0x0000000000C88000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/5132-549-0x0000000000C20000-0x0000000000C88000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/5524-431-0x0000000002A70000-0x0000000002AD8000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/5524-424-0x0000000002A70000-0x0000000002AD8000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/5524-434-0x0000000002A70000-0x0000000002AD8000-memory.dmp

                                                        Filesize

                                                        416KB