Resubmissions

25/03/2025, 13:12

250325-qfl42aznw9 10

25/03/2025, 13:09

250325-qdtq4aznv6 10

25/03/2025, 13:05

250325-qbtcjszns3 10

25/03/2025, 13:01

250325-p9k86awxat 10

25/03/2025, 12:55

250325-p58tnawwe1 10

25/03/2025, 12:51

250325-p3txqazmt6 10

05/02/2025, 11:16

250205-ndjvsavrdm 10

16/07/2024, 08:54

240716-kt64gavakp 10

Analysis

  • max time kernel
    116s
  • max time network
    122s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/03/2025, 13:01

General

  • Target

    6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe

  • Size

    71KB

  • MD5

    8f033c07f57f8ce2e62e3a327f423d55

  • SHA1

    57ac411652d7b1d9accaa8a1af5f4b6a45ef7448

  • SHA256

    6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b

  • SHA512

    f3712e7d5d55b27a4c20de07cce136e6d58ce62fa146d29b34dece6248e4456139703c50df10cb318346311cfeee0a8449d49163e821744efcde3ecfe8b880df

  • SSDEEP

    768:zncoLkaCbCq2l52DbnoPV0Yglwlu1y7e7th3BuItxn:QoLkaCb12l0DbCV6Wqyixn

Malware Config

Extracted

Path

C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\Restore_Files.html

Ransom Note
<p style='text-align: center;'><img src='https://odkrywcyplanet.pl/wp-content/uploads/2020/05/galaktyka-Cosmos-Redshift-7.jpg' alt='' width='235' height='167' /></p> <p style='text-align: center;'>A S T R A L O C K E R 2.0</p> <p style='text-align: center;'>&nbsp;</p> <p style='text-align: center;'><span class='Y2IQFc' lang='en'>What happened?</span><br />----------------------------------------------<br />All Your files has been succesfully<span style='background-color: #ffffff; color: #000000;'> <strong>encrypted</strong></span> due to security problem with Your PC.</p> <p style='text-align: center;'>All Your backups are deleted, or encrypted.</p> <p style='text-align: center;'>Can I recover my files?<br />----------------------------------------------<br />Sure! But You need special decryptor for that.<br />If You want to recover Your files, you need to cooperate.</p> <p style='text-align: center;'>What can I do to get my files back?<br />----------------------------------------------<br />You can buy my decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.<br />The price for the software is about 50$ (USD). Payment can be made in Monero, or Bitcoin (Cryptocurrency) only.</p> <p style='text-align: center;'>What guarantees?<br />----------------------------------------------<br />I value my reputation. If i do not do my work and liabilities, nobody will pay me. This is not in my interests.<br />All my decryption software is perfectly tested and will decrypt your data.</p> <p style='text-align: center;'>How do I pay, where do I get Monero or Bitcoin?<br />----------------------------------------------<br />Purchasing Monero or Bitcoin varies by country, it's best to do a quick google search yourself to learn how to buy Monero or Bitcoin. You need to pay 50$ in Bitcoin or Monero.</p> <p style='text-align: center;'>You can buy Bitcoin here:<br />https://localbitcoins.com/</p> <p style='text-align: center;'>Where i can pay?<br />----------------------------------------------<br />Monero Address:<br />48CEU93NRDqCmH3qfksLRLeQJ9mjbFCUXEyZkStiRDWtDodmAtd7voHF1sHa17MgmoYmMoErrJstV6nC1DqYoKxT38r6TUh<br />Bitcoin Addres:<br />bc1qpawwquwas0gd88u66hgxp222p52madqp5lk5xw</p> <p style='text-align: center;'>Contact<br />----------------------------------------------<br />After payment contact:<br />[email protected]<br />and send Your <strong>personal ID</strong> with transaction ID (if you are paying with Bitcoin)</p> <p style='text-align: center;'>Warning! If you report these emails, they may be suspended and NOBODY gets help.<br />It is in Your INTEREST to get the decryptor.</p> <p style='text-align: center;'>Your personal ID is:<br /><strong>ID12_Yashma</strong></p> <p style='text-align: center;'>1)Don't change the extension of the files. You will harm the files.<br />2)Don't move encrypted files.<br />3)<strong>Don't try to recover files by Yourself.</strong> This is impossible. Your files are encrypted with Curve25519 encryption algorithm, You can't decrypt files without private key.<br />4)Don't report to authoritaries. If You do it, key will be deleted, and Your files will be encrypted forever.</p> <p style='text-align: center;'>5)The price will be lower if you email me within 24 hours after encrypting your files.</p>
Emails

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Chaos family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
    "C:\Users\Admin\AppData\Local\Temp\6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3584
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3432
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:4992
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1120
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2428
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:544
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:816
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:4064
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\Restore_Files.html
        3⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4468
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x36c,0x7ffc6bfcf208,0x7ffc6bfcf214,0x7ffc6bfcf220
          4⤵
            PID:308
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1804,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:11
            4⤵
              PID:3448
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2172,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=2168 /prefetch:2
              4⤵
                PID:2844
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1996,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=2500 /prefetch:13
                4⤵
                  PID:2580
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3448,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:1
                  4⤵
                    PID:1500
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3456,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:1
                    4⤵
                      PID:4580
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4080,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=4088 /prefetch:1
                      4⤵
                        PID:1088
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4136,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=4152 /prefetch:9
                        4⤵
                          PID:2216
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4164,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=4320 /prefetch:1
                          4⤵
                            PID:2260
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=4208,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=4316 /prefetch:9
                            4⤵
                              PID:4972
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4232,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=5328 /prefetch:14
                              4⤵
                                PID:2220
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3568,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:14
                                4⤵
                                  PID:2864
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4340,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=5384 /prefetch:14
                                  4⤵
                                    PID:1264
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4240,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=4180 /prefetch:14
                                    4⤵
                                      PID:1972
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5788,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=5828 /prefetch:14
                                      4⤵
                                        PID:5092
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5788,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=5828 /prefetch:14
                                        4⤵
                                          PID:4864
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6112 /prefetch:14
                                          4⤵
                                            PID:1664
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.exe
                                              cookie_exporter.exe --cookie-json=1144
                                              5⤵
                                                PID:5020
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6204 /prefetch:14
                                              4⤵
                                                PID:2208
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6372,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:14
                                                4⤵
                                                  PID:4472
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6112,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6212 /prefetch:14
                                                  4⤵
                                                    PID:2368
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6392,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6520 /prefetch:14
                                                    4⤵
                                                      PID:3828
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6644,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6508 /prefetch:14
                                                      4⤵
                                                        PID:4392
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6812,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6692 /prefetch:14
                                                        4⤵
                                                          PID:3332
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6952,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6948 /prefetch:14
                                                          4⤵
                                                            PID:4816
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6668,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6964 /prefetch:14
                                                            4⤵
                                                              PID:392
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4532,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=4464 /prefetch:14
                                                              4⤵
                                                                PID:4312
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4212,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=6844 /prefetch:14
                                                                4⤵
                                                                  PID:5092
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4336,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:14
                                                                  4⤵
                                                                    PID:4420
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3612,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:14
                                                                    4⤵
                                                                      PID:1312
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4416,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=2880 /prefetch:14
                                                                      4⤵
                                                                        PID:664
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1156,i,1360914668119864536,2600676197396975874,262144 --variations-seed-version --mojo-platform-channel-handle=5136 /prefetch:14
                                                                        4⤵
                                                                          PID:4660
                                                                  • C:\Windows\system32\vssvc.exe
                                                                    C:\Windows\system32\vssvc.exe
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3864
                                                                  • C:\Windows\system32\wbengine.exe
                                                                    "C:\Windows\system32\wbengine.exe"
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2244
                                                                  • C:\Windows\System32\vdsldr.exe
                                                                    C:\Windows\System32\vdsldr.exe -Embedding
                                                                    1⤵
                                                                      PID:4448
                                                                    • C:\Windows\System32\vds.exe
                                                                      C:\Windows\System32\vds.exe
                                                                      1⤵
                                                                      • Checks SCSI registry key(s)
                                                                      PID:2268
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                      1⤵
                                                                        PID:544

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\Restore_Files.html

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        cf0cc6e9f7b71141a348d2f8a9cc800f

                                                                        SHA1

                                                                        bd198c4263359f42901ee30c3c24fc0ee8b2bd9e

                                                                        SHA256

                                                                        5a78197d3cd89269832678d0a59244b21fb0d6a8a87c2a080f68975e9c2febb9

                                                                        SHA512

                                                                        4dd5ff23ba3401ffc050e34dd83f37aeef6e4e24ff29809309ddd40ffce4b4b9cab2764f53dbf843c4cf870e37590ece34c98d7bce9f50b193f632a3b1db38de

                                                                      • C:\Users\Admin\2012_x64_1_vcRuntimeAdditional_x64.log

                                                                        Filesize

                                                                        1B

                                                                        MD5

                                                                        d1457b72c3fb323a2671125aef3eab5d

                                                                        SHA1

                                                                        5bab61eb53176449e25c2c82f172b82cb13ffb9d

                                                                        SHA256

                                                                        8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

                                                                        SHA512

                                                                        ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe.log

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        b4e91d2e5f40d5e2586a86cf3bb4df24

                                                                        SHA1

                                                                        31920b3a41aa4400d4a0230a7622848789b38672

                                                                        SHA256

                                                                        5d8af3c7519874ed42a0d74ee559ae30d9cc6930aef213079347e2b47092c210

                                                                        SHA512

                                                                        968751b79a98961f145de48d425ea820fd1875bae79a725adf35fc8f4706c103ee0c7babd4838166d8a0dda9fbce3728c0265a04c4b37f335ec4eaa110a2b319

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        6bbb18bb210b0af189f5d76a65f7ad80

                                                                        SHA1

                                                                        87b804075e78af64293611a637504273fadfe718

                                                                        SHA256

                                                                        01594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c

                                                                        SHA512

                                                                        4788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        280B

                                                                        MD5

                                                                        02cf1313b32a8ab2f031cee39bee8fc3

                                                                        SHA1

                                                                        861cc0ab9ff881460dd6433e37075b822aac9355

                                                                        SHA256

                                                                        7e7fd13903a8d57f314d9e7dab6fa28975050b63f045eb315e96cccaa17d1e61

                                                                        SHA512

                                                                        f5464c94391bfb590f6755c2ae6896dd459a2a93d778601caebf272438c2ff127ec5de81dcf8efeec65a56609558477afc7be1c4993977a18fde7b915f7a8700

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        6739772a8db432bcdc1a1146e8b4dedf

                                                                        SHA1

                                                                        1ce10fe2fa17f54915962d50b658d3782d758fb4

                                                                        SHA256

                                                                        8659b26431ed902b64a9727fd8563f36a6ab89a492ef71a36b41bafed40886c9

                                                                        SHA512

                                                                        261658c65cdb53434a5f6b0cadecdf0f0bb635bc4be7b5d0fe035455143cf65fd95c7589afd84e12c0e98e95c368bb7fcc19bc8452a801554395a06686de076b

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                        Filesize

                                                                        2B

                                                                        MD5

                                                                        99914b932bd37a50b983c5e7c90ae93b

                                                                        SHA1

                                                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                        SHA256

                                                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                        SHA512

                                                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                        Filesize

                                                                        69KB

                                                                        MD5

                                                                        164a788f50529fc93a6077e50675c617

                                                                        SHA1

                                                                        c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                        SHA256

                                                                        b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                        SHA512

                                                                        ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        3d20584f7f6c8eac79e17cca4207fb79

                                                                        SHA1

                                                                        3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                                        SHA256

                                                                        0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                                        SHA512

                                                                        315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        a575c0e18bf5234fdcba2e29cb55d732

                                                                        SHA1

                                                                        e99299d3fd45ddd9a87f291fde4036b20f298b8a

                                                                        SHA256

                                                                        2a496d2cce9aa8374dbfcf793fb24d9743a6b3895cb30dd8c6548b47a55a87ba

                                                                        SHA512

                                                                        edd9095a6cfefd4120122c1fef556805e590b63b6b850de7780cb5bab5df521c9385a1c8a5e25b73e6679b1a8d1dc0b64a9c8509d0cda03bd6b7084c018714f8

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                        Filesize

                                                                        111B

                                                                        MD5

                                                                        285252a2f6327d41eab203dc2f402c67

                                                                        SHA1

                                                                        acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                        SHA256

                                                                        5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                        SHA512

                                                                        11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                        Filesize

                                                                        2B

                                                                        MD5

                                                                        d751713988987e9331980363e24189ce

                                                                        SHA1

                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                        SHA256

                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                        SHA512

                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        638338b2a6346c6e308f172fbdb08cb9

                                                                        SHA1

                                                                        45ca163daadaeabd611a73b9cf32c8fc4885e88e

                                                                        SHA256

                                                                        1432a43b7819d4764a3aaae5019cd8f0f0d345fda20cbbba40fdb91f0548b7d0

                                                                        SHA512

                                                                        cd2eaaecfc344c0a5070f046ba4f1881b242455405e1f2dc10f027123130a9d6577213436e06f740f13a00f7fe9c9ac33e8a9802ce80851767739dd79cb870de

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        1d5380f9b16ee5fdcc2e103b8f1a6d0a

                                                                        SHA1

                                                                        a1348c6e1a562bef60fdfca0f172001ef5920930

                                                                        SHA256

                                                                        bc73c5c1bf5b40be6dbedf89a6409aa0d502b58ac2e52b12d089f1e253d4126e

                                                                        SHA512

                                                                        f9a994e0d66ba6fc2a5540d5a95febb8ac73583fbb03bf260cfda3e97f3aa4b43b452c342048dfd40cb1d804fb6f850ddc1c4abe68b140f16f261ef196a29556

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                        Filesize

                                                                        37KB

                                                                        MD5

                                                                        d3f8be5b3f5cb011a1984c3bdbab3c04

                                                                        SHA1

                                                                        25c186b09275d1f02e45d3228f0f8fc2c96d9a96

                                                                        SHA256

                                                                        b744d84651f36b8cf598c3263403e6d9a8e3fb0570c8772bd5ca698ffc2c8c5f

                                                                        SHA512

                                                                        b0ae231e4e1496d3b0a7f2c7a03ac86ca74e47c9f6a22122e22fa256e383179429d2d3c184ef0a13a282c1908416e1908160ed8376a5115f355757ebc10fdfd1

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                        Filesize

                                                                        4KB

                                                                        MD5

                                                                        9a887dfc1579688a9acfd661cb954b32

                                                                        SHA1

                                                                        12d4301cae25f4932e122c56f5f583976a0efb25

                                                                        SHA256

                                                                        d0d65443ca8e59801977761a55f2b13f3d96f6333839c1ee68059e36d1e26d4a

                                                                        SHA512

                                                                        9b63ef887fcee153f7d2254f0501faa785fa31553c2103b930afecab7ddac90ae476589323ba708a5c3a91960ba642afa5bed8e6265c769602e59dacfc2584d1

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\6455543c-ce10-433d-8e10-6c582d8de07d.tmp

                                                                        Filesize

                                                                        21KB

                                                                        MD5

                                                                        97ffbea42e9a0795865f12dedaa14292

                                                                        SHA1

                                                                        82b1a9a09d849ca8e55914ceb05677991729de10

                                                                        SHA256

                                                                        84db83a7515ea99283ea322d6ae8a7e806287e7e98771a53a5d0e3ff362ecd16

                                                                        SHA512

                                                                        884e56e3e7419a5ce22725d8b39b6d9424c882185762fe6ebb3a5c67d65e87b846ecce8a26491019acd3ba79641f489a32e20e2c7b99576315352cca1f5a13a4

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                        Filesize

                                                                        876B

                                                                        MD5

                                                                        b618874eba4a8a14f75103e77d3f001e

                                                                        SHA1

                                                                        306cfecc3b0a7a23911ab1d378990d7b0d9e3842

                                                                        SHA256

                                                                        ff7eacdec7928f7a94a7eee82b5bbfd5775c3ab7d6e27b6991f290197bcecd6b

                                                                        SHA512

                                                                        fe2ceb1d25eb0c5fbbc18f58e12b0095a53bdc7a3a3b725d7a522b410fed8e65e7003902e5cc784e80bc60560eefd022cc8c41482fa39d70659528b83b44489e

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                        Filesize

                                                                        23KB

                                                                        MD5

                                                                        8d38868d433770666a33adbf63915465

                                                                        SHA1

                                                                        ea49f1550931ecaf509b391e463013fbefbcc523

                                                                        SHA256

                                                                        e21f10d64067ab139c965514516741f0dce12fd28862bc06f636cdddee018c8d

                                                                        SHA512

                                                                        d0b8927dd1333abcb73f3f0066271b7275dce4ed16f4215d7c0398ade52df5079e19b373253ff735aa0ceacd92190a199a4b24b4887a68d493def9a0e1ffe401

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe590f87.TMP

                                                                        Filesize

                                                                        467B

                                                                        MD5

                                                                        eefb61a5afab2d3021ebc98cfba9022c

                                                                        SHA1

                                                                        3f9d8562d64716aec27ef9def9b24f03ba1c416a

                                                                        SHA256

                                                                        d948e34e708369adbee28bdeb6feaefbdf27770f15d7c98c3d2aba765987c9ca

                                                                        SHA512

                                                                        010b290b1520cb9049e36537cafb969fdd9c29dabd36337866858c500eddefe0d1af90a155ecb18c4f9e7d7f2cf36fe484ffda062ea34f3511404579501222ef

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        30KB

                                                                        MD5

                                                                        6643cf4a0bd10fc13a983390d6cb00dd

                                                                        SHA1

                                                                        3ed58348ce73854432be6cc8f087e0f6ca24b543

                                                                        SHA256

                                                                        f8f005cb5b8d14e6d64fa4c5480c661524d4b6f9a5f807509e123993c83fcaf9

                                                                        SHA512

                                                                        d8febcc073763dafc9aac994dc52568559699cdc28a2544dbf3c765c6aab07d1afb1c10349e36ef623ea7b8feb7650ad1609170a01991b382f5b22f28a854f0a

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        0dae8910d83155683a025c38d8795387

                                                                        SHA1

                                                                        38c50cc730b5319c38f8b8f26aa93b2bda2e14ac

                                                                        SHA256

                                                                        72fd28a2c8e5d689d63539c5541881e215689630026e7928721e8fbed3d68340

                                                                        SHA512

                                                                        6af7f87d94212b361889f2e7d6b5b84874c1ee7225ceb81672162e3d725d8e7c5de84ad6e7b3fccb1a8b292fb7c29b19dcc3de8cff23321fc53b5c66b64c94bc

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        c5a17655c034d9abb7089100816e3df8

                                                                        SHA1

                                                                        ded1097c59f310f34876a435eaa78fe0e6a9c611

                                                                        SHA256

                                                                        46299db11bb3e692f665166b517a09e9f20cf7b5b37e6d5e5896260cb45fb7f9

                                                                        SHA512

                                                                        2d5ba5a5be4a0969d37099afe142d918d4071bfd8e3d2395255c51b383721c8974d0ebb71ee0e8ced49ce33b5e85ea0ebfbdc562702e6eb334acf09b6ea4aaaf

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        39KB

                                                                        MD5

                                                                        e6372e42f7b6267928a6865819ceedb9

                                                                        SHA1

                                                                        56ef0da92be317ba07c5fece42037421f9771306

                                                                        SHA256

                                                                        8d8d9cca198fe06787374b5f24c9f17ff5bb427716eb17254a4b8ec164989731

                                                                        SHA512

                                                                        4a16e6960673abe220520148164f6e8e400323222867bd5ccce5be00d746d74a495a6ad3cd24d438d0937668dcdf04b3d802940f1d9234b8b1d668c5c8c9e04d

                                                                      • C:\Users\Admin\AppData\Local\Temp\0c2b17d7-5075-4a98-af8e-48c000c0b293.tmp

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        78e47dda17341bed7be45dccfd89ac87

                                                                        SHA1

                                                                        1afde30e46997452d11e4a2adbbf35cce7a1404f

                                                                        SHA256

                                                                        67d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550

                                                                        SHA512

                                                                        9574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5

                                                                      • C:\Users\Admin\AppData\Local\Temp\a1d3e4a6-09c0-4ad3-abcf-e7f0fb392557.tmp

                                                                        Filesize

                                                                        1B

                                                                        MD5

                                                                        5058f1af8388633f609cadb75a75dc9d

                                                                        SHA1

                                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                        SHA256

                                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                        SHA512

                                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir4468_1740837620\fb325dad-7f29-48f4-9764-6dc6486f959d.tmp

                                                                        Filesize

                                                                        152KB

                                                                        MD5

                                                                        dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                        SHA1

                                                                        d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                        SHA256

                                                                        fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                        SHA512

                                                                        65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\File Explorer.lnk..hacked

                                                                        Filesize

                                                                        768B

                                                                        MD5

                                                                        b318a530e450fceb051d53304f734b74

                                                                        SHA1

                                                                        17b1c5668532d28c5587e67b0823219839e36858

                                                                        SHA256

                                                                        f51a37b8d33314a7ff3532573f6cd3f06dc97429541b204a94fc977f56a47d02

                                                                        SHA512

                                                                        013b9635566dbfdad17a5ee43be1df26e1ffb00750d1d6fe667b979cd4f769c1716e6dc862b1527d6d35959932040ef2d5435f036d9154f9a32fabfe6c34f026

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk..hacked

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        4d1712301e47205221bfc6e3a6fceeda

                                                                        SHA1

                                                                        2852fb81cd59e7a25a11f0198f04f6bdd6aabdfe

                                                                        SHA256

                                                                        9f90ed7ef82717e667b15ecf61b11fad50aacd6564d44adc3f8b9acbd3005724

                                                                        SHA512

                                                                        4ed1076f11e31e43d50e8f8831109d158dd7311aada85848e364d55dcf3846d158ba0bb120d551e85a0be30fec987988ac1590c7208957b609adb3b44de8f443

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Google Chrome.lnk..hacked

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        baa42ed15739838fd8d4513f72a56a75

                                                                        SHA1

                                                                        aba3d0f4b5fbb5768d39db3f6789b1f67eda8b05

                                                                        SHA256

                                                                        1fc5ecaa01e7566774aabae02af57ca8c28810f30b6a3cd54f67d17521480cb4

                                                                        SHA512

                                                                        9edc3b7843c22fae6e2ef6c60b262e21f352ce35ab0fdbb1575845a4840cde0c37693425d8e9075c674be0e7d72dda33b92ef98b5d4bea4d6b10fad184739d18

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools.lnk..hacked

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        14621d314d51c9d35731a7d2aa61e247

                                                                        SHA1

                                                                        a1ced64103fc8436eeea235dfbfe2176d4310c1e

                                                                        SHA256

                                                                        70162aaa3b63ccb78a9d63d9c0fc5aeaa20773fd94dc09bd9cacf9e00389611e

                                                                        SHA512

                                                                        80c45d6cc0cb68998b809be7f0428f8c75a3f7745fbb2da94fb232690ed5ee61f38bc4300ba0dbda4eb0e2bcdc16ef15fbe466c837e4cc15b1f8623b8e776b21

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\File Explorer.lnk..hacked

                                                                        Filesize

                                                                        768B

                                                                        MD5

                                                                        a491de219be5ab8faf6c9665086973ac

                                                                        SHA1

                                                                        e5039974602d5da869927fb31903cf176d63d3db

                                                                        SHA256

                                                                        6abd04b4f7cca9d77f0cede7aaa8eeaf6413a63cd2adf622b8615924a35d0d0b

                                                                        SHA512

                                                                        9dee5c03f5ee109b9b020f577a88d8a4748fe2ffab55dd5439eb88b4811a3af733396b79e7a837164b57ec8e11eb8499750e499c12f3e6e5fe170c06c04b5c77

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\OneDrive.lnk..hacked

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        131b7a6234ed187248fb803d9ac039a2

                                                                        SHA1

                                                                        0cf15406b6bbcd64d9e503d239651bdde1094679

                                                                        SHA256

                                                                        53b38a29ddcc18005a9b54760bee37fc4df522f328410d885ca954b39405e624

                                                                        SHA512

                                                                        c52eae95f2e0e970c457d54ad3da0e2572aec084735aff2578c1f7d65ae700d35e1a6ae3b32157286157dbe55f2a9f08a80ddec1956d58a60719b5bf3bd27b21

                                                                      • C:\Users\Admin\AppData\Roaming\svchost.exe

                                                                        Filesize

                                                                        71KB

                                                                        MD5

                                                                        8f033c07f57f8ce2e62e3a327f423d55

                                                                        SHA1

                                                                        57ac411652d7b1d9accaa8a1af5f4b6a45ef7448

                                                                        SHA256

                                                                        6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b

                                                                        SHA512

                                                                        f3712e7d5d55b27a4c20de07cce136e6d58ce62fa146d29b34dece6248e4456139703c50df10cb318346311cfeee0a8449d49163e821744efcde3ecfe8b880df

                                                                      • C:\Users\Admin\Desktop\CompressResize.pps..hacked

                                                                        Filesize

                                                                        773KB

                                                                        MD5

                                                                        544be135b3624d8c2ef905207e7993da

                                                                        SHA1

                                                                        91aa6c8181508d0fe7ac4d66549d5ad165275604

                                                                        SHA256

                                                                        a84d990fdccb6c7c26c5643c857bde5536036839092f65b4c85c7490c477ef94

                                                                        SHA512

                                                                        1787f87070e3fbb798d07c440ee7d2ea73c50b854354065e7c3a7dedfcdc2ce488e1ee4c571d285be65e0e01e3267bd4e3dc8cef0b7d948b9021dc2cbbaaee64

                                                                      • C:\Users\Admin\Desktop\ConvertFromCompress.xlsx..hacked

                                                                        Filesize

                                                                        13KB

                                                                        MD5

                                                                        57415becb246f6cd2ec38e54f1404220

                                                                        SHA1

                                                                        49567789e71f0a15075573a960996bc12eb03de5

                                                                        SHA256

                                                                        8a04f4ada5a30fe8d21504a8ced74f2d52a80feec28d2e02875c9890816026db

                                                                        SHA512

                                                                        152b08bf01e76459eace0e6d2845743b4be8cd29e1b94e2ae2569e4948ef9723b52714e0fd9b6d6a39ce667a3201b2f94365377c3c453b079cc6d7fb8494bf0a

                                                                      • C:\Users\Admin\Desktop\DenySplit.odt..hacked

                                                                        Filesize

                                                                        522KB

                                                                        MD5

                                                                        12affe081eba7c63ac30a28304a0607f

                                                                        SHA1

                                                                        40be8268804955fe4dda908e79b2d65f1534a066

                                                                        SHA256

                                                                        f1f0af0f0a612805962c4b9d05708a732b4a3a03567726d7eda3df80b71443d5

                                                                        SHA512

                                                                        9f55c2626db84c305233dd6ff07f387bd294aaa3344a5909cbef2c472971e377bdbbe22a8a2fc3e231b0496ee351698603e4a041f8cb2b0eb4a43eec9e3d26be

                                                                      • C:\Users\Admin\Desktop\LockUpdate.wma..hacked

                                                                        Filesize

                                                                        940KB

                                                                        MD5

                                                                        f23d996ae89f2c3d06354b8c39f10f0b

                                                                        SHA1

                                                                        63a822731ecc1bf7fc85c38672e7cc7b182d3e29

                                                                        SHA256

                                                                        1a13c2d642592570d97ef6c7697f6869dce6cf7626ecf748e1c95cb2c154cc9e

                                                                        SHA512

                                                                        87e7283030f11a26e7229ce97184ccec22b90ca1b0efe3d20f67660497cc150ab532983efd61ca3f7595740ae5a6f7e5af3df1cbda878d9a234f4eda3eabd4fb

                                                                      • C:\Users\Admin\Desktop\Microsoft Edge.lnk..hacked

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        0519062716ec08b394f43b4d143d5876

                                                                        SHA1

                                                                        053f95d409af6ece6c19a651347a84d196d125e1

                                                                        SHA256

                                                                        3ac0f97ea2632ebd5dcb704164c8c09ab19eeacd4639bf52c6d5ea0aa99e498b

                                                                        SHA512

                                                                        b4df4ac11fc2aafd6062121091207aa3089f1a913bc63dd5f666a446989fdda205eb9fa007f0e24e6842a11689bf9964bef0e07345b7bd520ee0275ee91fd72a

                                                                      • C:\Users\Admin\Desktop\NewGroup.rar..hacked

                                                                        Filesize

                                                                        606KB

                                                                        MD5

                                                                        38189dd28b23d91fb560e7d1d5d91554

                                                                        SHA1

                                                                        011107452c0ea5a4f4d429e3c51201fb666b661b

                                                                        SHA256

                                                                        087ea6e2baa2a2be7a299b55eb85bacef51178f41e8247b813d80a4f1827af36

                                                                        SHA512

                                                                        3bbeb5762035305c862b387c8da1c9870797719e76c8aef75544756b77669bc591a13b1c78cdb8c28bf5e72ddc306ea833e89e8ee0500025a217d604ae55dacf

                                                                      • C:\Users\Admin\Desktop\ReadWatch.xlsx..hacked

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        acfa02b4d907a3cb365c7af59b9a576b

                                                                        SHA1

                                                                        a00b597d19198a6b0c9c9f9174bf5362e8a82e2e

                                                                        SHA256

                                                                        08e44c11f22a595b187dd927b964155e5aa2551be973b240cfa08f48ee2ae41c

                                                                        SHA512

                                                                        822a87072aa224ea5ed0c64925def516ca26d5813fd7c2eb3867065018c83187c413e5207266c10df367cf5400856aabc87813f39feea2c66c32dfdf57b0c2f9

                                                                      • C:\Users\Admin\Desktop\SubmitWatch.png..hacked

                                                                        Filesize

                                                                        1.0MB

                                                                        MD5

                                                                        08ae4d9f9736e27490911fbf88e25ff7

                                                                        SHA1

                                                                        26630bfaa0834a3cfce1f4fbc16aee0851df61e6

                                                                        SHA256

                                                                        ce6f1dc6f6bd7addcb1acc199822ccedd77344674239184a80b246355ea2e81d

                                                                        SHA512

                                                                        e00a08cbad8a82cd8241ba1ce409b3942aa272e4693ce4c0fa7dbda5e1e8a6502fff32eabce3025efcd9cb6c9a0512f16c19c267c2d457610d33b763202c334c

                                                                      • C:\Users\Admin\Desktop\TestConvertTo.dib..hacked

                                                                        Filesize

                                                                        1.2MB

                                                                        MD5

                                                                        d9eb9707f98147d294e4986997980912

                                                                        SHA1

                                                                        cc6443cab2269c1637ed8860a2eb506b07c5562b

                                                                        SHA256

                                                                        c0f53b58c1f0dcfb03e025a0148b8b276d9e9b58307a4a95bcd56893afb17808

                                                                        SHA512

                                                                        d462687f104c94b230ca97f7102f34f8b93f5863186e9f94412c52e846beeb0fb0f12b74cbb3429c26180260b711bae856f4f23d4399a5c4069840d0cb65585d

                                                                      • C:\Users\Admin\Desktop\TraceLimit.htm..hacked

                                                                        Filesize

                                                                        689KB

                                                                        MD5

                                                                        5464fdfffbbc678729c5be65454b8e24

                                                                        SHA1

                                                                        1f59c4bb3805e29fcc700ed4f684ab7201d44b33

                                                                        SHA256

                                                                        7398c8b047e780b5e67976df376627aa4c7b62ac81df3661b35fc3e79acba57c

                                                                        SHA512

                                                                        ecafc85645d2e5b279738edf2d19ebca6a94a8b17657b92df3c7998b11d6e7fc31000bdabff7c992a5e5605bdf6213fc52e3369762505abef5c1cd8783e4bfbb

                                                                      • C:\Users\Admin\Desktop\UpdateBackup.xltx..hacked

                                                                        Filesize

                                                                        481KB

                                                                        MD5

                                                                        628b83991ec3f918e4e394cd3ee3219e

                                                                        SHA1

                                                                        8e060603e2b69437a37bbee98439c93efae4a13e

                                                                        SHA256

                                                                        0319b9b11e0394f8767995ec7e9f574e11a56c39ad35e23cec25f4841d777f9a

                                                                        SHA512

                                                                        19df624cad44995cf573a2a78a48e6f4f263b56f0ce00452ec793450bb72247ace80ee175fe1a568f37d7ef5efdd7470232ef33f5a14c0907fde71a645ba971a

                                                                      • C:\Users\Public\Desktop\Acrobat Reader DC.lnk..hacked

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        a84ec965ee73f542a622d6f08abafde3

                                                                        SHA1

                                                                        cab739d665e1a3bca08934d82f38379c8f77ed51

                                                                        SHA256

                                                                        f76f6e15b870e6786be2bd4ee0d4ecf9c33fb08e10ed57770fa4859e2be320c0

                                                                        SHA512

                                                                        41cbe771ad0c27b80473852cd21c2a170df7a71425885d257c48246c4af6c81cb11fa12033c39297c3994c7703f053bd0847400f83db82cb67645e6f63e3e03e

                                                                      • C:\Users\Public\Desktop\Firefox.lnk..hacked

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        7de0a093543fe8861bda7a155cbfb9ce

                                                                        SHA1

                                                                        ff9ba9ed0f8774565f020747c0d9fcfb8ac715f7

                                                                        SHA256

                                                                        38a17d7ffa2c9e656c983a819a9b4c010a4ba7743005af26dde12ac8c14067a7

                                                                        SHA512

                                                                        1f5b1d2b3180d39a63b73b02e5c458390ec7b8d8302ee466abd2d8052f67cfca733493b81121af486d036e2166e4890b8fe051507f93ab8e6a703c7932c3d742

                                                                      • C:\Users\Public\Desktop\Google Chrome.lnk..hacked

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        5ce34c7c3628556af75771b7020f60a1

                                                                        SHA1

                                                                        f99c4cf0e1a53a5c5863b5ea8dbe4a4a35e3b411

                                                                        SHA256

                                                                        2633385b2836ee715665cfcb7f5df0b1d9b13be96e172f9c9855078eb4e819bc

                                                                        SHA512

                                                                        ee431a7f83f7c85c228ef28277bafa36796da1ed59b1296f0e453d29a1785e2223ddc59650384627c7bd9d3f1297570d30d9edd11b7453cfcc15e07615f38748

                                                                      • C:\Users\Public\Desktop\Microsoft Edge.lnk..hacked

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        451d05166a19e87c3b6fb94f69b457e4

                                                                        SHA1

                                                                        f23757c8e06c8fa3e9119dcd1147f89d35642d2e

                                                                        SHA256

                                                                        d07692adf7aaa5370e25db6b33dc8ecee2bef9758a2405d9b2b3f93b88317200

                                                                        SHA512

                                                                        aaf5d926436bc776aa7d4bea8fea6da145f64792ef204ef5d3012c320fbc9a4274d1b5a95e33f4e1ff93306ceb10c5852555e92f0db8ad928a486241313f9a2a

                                                                      • C:\Users\Public\Desktop\VLC media player.lnk..hacked

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        d8fc91f044da9c75b5501dafa530f103

                                                                        SHA1

                                                                        c7f9874f47a4d5fd2ce4e8c61d87c5f2932ac031

                                                                        SHA256

                                                                        460ff3b74b16cb2805a7ed53744acbd69b3db8dbd2701c5cf00d451f3dae2b92

                                                                        SHA512

                                                                        ee61e6d215d6a891cf5eb25432264533758c935c45f64814cb786ff72b3bfccc264715e6523c56c1d0219a162ad9216a10df5d24ded851ce795b1b81a3033cbc

                                                                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4468_1014996779\manifest.json

                                                                        Filesize

                                                                        43B

                                                                        MD5

                                                                        af3a9104ca46f35bb5f6123d89c25966

                                                                        SHA1

                                                                        1ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8

                                                                        SHA256

                                                                        81bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea

                                                                        SHA512

                                                                        6a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1

                                                                      • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4468_686104536\manifest.json

                                                                        Filesize

                                                                        134B

                                                                        MD5

                                                                        58d3ca1189df439d0538a75912496bcf

                                                                        SHA1

                                                                        99af5b6a006a6929cc08744d1b54e3623fec2f36

                                                                        SHA256

                                                                        a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437

                                                                        SHA512

                                                                        afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2

                                                                      • memory/920-1770-0x00007FFC71510000-0x00007FFC71FD2000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/920-17-0x00007FFC71510000-0x00007FFC71FD2000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/3584-4-0x00007FFC71510000-0x00007FFC71FD2000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/3584-3-0x00007FFC71513000-0x00007FFC71515000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/3584-18-0x00007FFC71510000-0x00007FFC71FD2000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/3584-0-0x00007FFC71513000-0x00007FFC71515000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/3584-2-0x00007FFC71510000-0x00007FFC71FD2000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/3584-1-0x0000000000760000-0x0000000000778000-memory.dmp

                                                                        Filesize

                                                                        96KB