Resubmissions

25/03/2025, 13:12

250325-qfl42aznw9 10

25/03/2025, 13:09

250325-qdtq4aznv6 10

25/03/2025, 13:05

250325-qbtcjszns3 10

25/03/2025, 13:01

250325-p9k86awxat 10

25/03/2025, 12:55

250325-p58tnawwe1 10

25/03/2025, 12:51

250325-p3txqazmt6 10

05/02/2025, 11:16

250205-ndjvsavrdm 10

16/07/2024, 08:54

240716-kt64gavakp 10

Analysis

  • max time kernel
    114s
  • max time network
    116s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    25/03/2025, 13:01

General

  • Target

    6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe

  • Size

    71KB

  • MD5

    8f033c07f57f8ce2e62e3a327f423d55

  • SHA1

    57ac411652d7b1d9accaa8a1af5f4b6a45ef7448

  • SHA256

    6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b

  • SHA512

    f3712e7d5d55b27a4c20de07cce136e6d58ce62fa146d29b34dece6248e4456139703c50df10cb318346311cfeee0a8449d49163e821744efcde3ecfe8b880df

  • SSDEEP

    768:zncoLkaCbCq2l52DbnoPV0Yglwlu1y7e7th3BuItxn:QoLkaCb12l0DbCV6Wqyixn

Malware Config

Extracted

Path

C:\Users\Restore_Files.html

Ransom Note
<p style='text-align: center;'><img src='https://odkrywcyplanet.pl/wp-content/uploads/2020/05/galaktyka-Cosmos-Redshift-7.jpg' alt='' width='235' height='167' /></p> <p style='text-align: center;'>A S T R A L O C K E R 2.0</p> <p style='text-align: center;'>&nbsp;</p> <p style='text-align: center;'><span class='Y2IQFc' lang='en'>What happened?</span><br />----------------------------------------------<br />All Your files has been succesfully<span style='background-color: #ffffff; color: #000000;'> <strong>encrypted</strong></span> due to security problem with Your PC.</p> <p style='text-align: center;'>All Your backups are deleted, or encrypted.</p> <p style='text-align: center;'>Can I recover my files?<br />----------------------------------------------<br />Sure! But You need special decryptor for that.<br />If You want to recover Your files, you need to cooperate.</p> <p style='text-align: center;'>What can I do to get my files back?<br />----------------------------------------------<br />You can buy my decryption software, this software will allow you to recover all of your data and remove the ransomware from your computer.<br />The price for the software is about 50$ (USD). Payment can be made in Monero, or Bitcoin (Cryptocurrency) only.</p> <p style='text-align: center;'>What guarantees?<br />----------------------------------------------<br />I value my reputation. If i do not do my work and liabilities, nobody will pay me. This is not in my interests.<br />All my decryption software is perfectly tested and will decrypt your data.</p> <p style='text-align: center;'>How do I pay, where do I get Monero or Bitcoin?<br />----------------------------------------------<br />Purchasing Monero or Bitcoin varies by country, it's best to do a quick google search yourself to learn how to buy Monero or Bitcoin. You need to pay 50$ in Bitcoin or Monero.</p> <p style='text-align: center;'>You can buy Bitcoin here:<br />https://localbitcoins.com/</p> <p style='text-align: center;'>Where i can pay?<br />----------------------------------------------<br />Monero Address:<br />48CEU93NRDqCmH3qfksLRLeQJ9mjbFCUXEyZkStiRDWtDodmAtd7voHF1sHa17MgmoYmMoErrJstV6nC1DqYoKxT38r6TUh<br />Bitcoin Addres:<br />bc1qpawwquwas0gd88u66hgxp222p52madqp5lk5xw</p> <p style='text-align: center;'>Contact<br />----------------------------------------------<br />After payment contact:<br />[email protected]<br />and send Your <strong>personal ID</strong> with transaction ID (if you are paying with Bitcoin)</p> <p style='text-align: center;'>Warning! If you report these emails, they may be suspended and NOBODY gets help.<br />It is in Your INTEREST to get the decryptor.</p> <p style='text-align: center;'>Your personal ID is:<br /><strong>ID12_Yashma</strong></p> <p style='text-align: center;'>1)Don't change the extension of the files. You will harm the files.<br />2)Don't move encrypted files.<br />3)<strong>Don't try to recover files by Yourself.</strong> This is impossible. Your files are encrypted with Curve25519 encryption algorithm, You can't decrypt files without private key.<br />4)Don't report to authoritaries. If You do it, key will be deleted, and Your files will be encrypted forever.</p> <p style='text-align: center;'>5)The price will be lower if you email me within 24 hours after encrypting your files.</p>
Emails

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Chaos family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 63 IoCs
  • Drops file in Windows directory 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe
    "C:\Users\Admin\AppData\Local\Temp\6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:3864
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2024
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4332
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:1464
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:1040
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\Restore_Files.html
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1800
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2ec,0x33c,0x7ffe5cc0f208,0x7ffe5cc0f214,0x7ffe5cc0f220
          4⤵
            PID:464
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1916,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:3
            4⤵
              PID:1292
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2192,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=2188 /prefetch:2
              4⤵
                PID:2084
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2564,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=2604 /prefetch:8
                4⤵
                  PID:3460
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3540,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:1
                  4⤵
                    PID:4784
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3564,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:1
                    4⤵
                      PID:2032
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4172,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:1
                      4⤵
                        PID:1628
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4288,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=4332 /prefetch:2
                        4⤵
                          PID:2456
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5332,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=5324 /prefetch:8
                          4⤵
                            PID:2272
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4828,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:8
                            4⤵
                              PID:4212
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3572,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=5292 /prefetch:8
                              4⤵
                                PID:4532
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3724,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=5384 /prefetch:8
                                4⤵
                                  PID:1416
                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5916,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=5936 /prefetch:8
                                  4⤵
                                    PID:4488
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5916,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=5936 /prefetch:8
                                    4⤵
                                      PID:2592
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=6120 /prefetch:8
                                      4⤵
                                        PID:3536
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6064,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=6256 /prefetch:8
                                        4⤵
                                          PID:2664
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6252,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=6380 /prefetch:8
                                          4⤵
                                            PID:4488
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6368,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=6304 /prefetch:8
                                            4⤵
                                              PID:2768
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5704,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=6544 /prefetch:8
                                              4⤵
                                                PID:5124
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6700,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=6532 /prefetch:8
                                                4⤵
                                                  PID:5176
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6732,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=6868 /prefetch:8
                                                  4⤵
                                                    PID:5188
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6708,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=6876 /prefetch:8
                                                    4⤵
                                                      PID:5672
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4528,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=5140 /prefetch:8
                                                      4⤵
                                                        PID:6116
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5112,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=4480 /prefetch:8
                                                        4⤵
                                                          PID:6108
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4540,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=4476 /prefetch:8
                                                          4⤵
                                                            PID:6100
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1144,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=5424 /prefetch:8
                                                            4⤵
                                                              PID:5396
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5708,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:8
                                                              4⤵
                                                                PID:2592
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5416,i,1031264753201407375,8976236124988297137,262144 --variations-seed-version --mojo-platform-channel-handle=4320 /prefetch:8
                                                                4⤵
                                                                  PID:5168
                                                          • C:\Windows\system32\vssvc.exe
                                                            C:\Windows\system32\vssvc.exe
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2488
                                                          • C:\Windows\system32\wbengine.exe
                                                            "C:\Windows\system32\wbengine.exe"
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:668
                                                          • C:\Windows\System32\vdsldr.exe
                                                            C:\Windows\System32\vdsldr.exe -Embedding
                                                            1⤵
                                                              PID:1724
                                                            • C:\Windows\System32\vds.exe
                                                              C:\Windows\System32\vds.exe
                                                              1⤵
                                                              • Checks SCSI registry key(s)
                                                              PID:880
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                              1⤵
                                                                PID:3736
                                                              • C:\Windows\System32\sihclient.exe
                                                                C:\Windows\System32\sihclient.exe /cv Z1d6HwrYdEanCuHOilRGRA.0.2
                                                                1⤵
                                                                  PID:5188

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\2012_x64_0_vcRuntimeMinimum_x64.log

                                                                  Filesize

                                                                  1B

                                                                  MD5

                                                                  d1457b72c3fb323a2671125aef3eab5d

                                                                  SHA1

                                                                  5bab61eb53176449e25c2c82f172b82cb13ffb9d

                                                                  SHA256

                                                                  8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

                                                                  SHA512

                                                                  ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b.exe.log

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  b08c36ce99a5ed11891ef6fc6d8647e9

                                                                  SHA1

                                                                  db95af417857221948eb1882e60f98ab2914bf1d

                                                                  SHA256

                                                                  cc9248a177495f45ec70b86c34fc5746c56730af36ace98ac7eb365dbafda674

                                                                  SHA512

                                                                  07e62581eace395b0a9699d727761648103180c21155d84ea09140f9e1c9690705c419118545aa67a564334bbde32710225fe3aa92b0b4b4210cb91f0058b1ea

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                  Filesize

                                                                  280B

                                                                  MD5

                                                                  29f13140c50c2394177caf96baf3a5c0

                                                                  SHA1

                                                                  680e35060382a846752eb208b62de077d31fd1eb

                                                                  SHA256

                                                                  f4554eb3e1e133edb5f5f01e19539ffc52adc0b346e19c4742a815e7a92b2dcb

                                                                  SHA512

                                                                  d964d066a2913d3b6eb73925160d7e9d79a94ae5c6e3956cd361b54fe53833b311990a91346917bc90b227301d864939f6a5a417ff52ef9fe8e21971b1a661fc

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                  Filesize

                                                                  280B

                                                                  MD5

                                                                  a46a324553367dc0b13a007305e4f102

                                                                  SHA1

                                                                  005a700ac0bf4429024f9e857e2281f82f370aed

                                                                  SHA256

                                                                  a718f2fe90be4422382450b4959840a13d6d18dea09d3da5394624198a126063

                                                                  SHA512

                                                                  d3b9fcde15be13451aa441070d9143fc53faa6a2725adea7fb9c340bcb9d7ea183dc1b36c0f8ec21c1748c80bc8fa03a14f198c2fc914c9f8e81702bd8e18399

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  4ae85f00dc927092c06dd5e1e28aa6be

                                                                  SHA1

                                                                  d5ff152bd00db8331bfcb7edca1df8a6baee1871

                                                                  SHA256

                                                                  a7b90e949fcea5cefa3f3218a49cebb57f1525ce4b54d5987bfd70ecc6833884

                                                                  SHA512

                                                                  6ccd6db7e44b01f7a449436e4a7a4c2bc6214f2469bbebfbe7d4503adbfb7b5dd8249b1338f607c478a787f03e181c1cd409b47be805081845bd103320e3c13d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe580a9a.TMP

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  7b8f992b8fe88c1810e0fdaa58cc978b

                                                                  SHA1

                                                                  7f6c5f12dcf206b556b9e32431364d6c9c776628

                                                                  SHA256

                                                                  32fa87e9d34076aaeb01a9ba52c071aa9540c583b83bf50573d9b98251b8ab46

                                                                  SHA512

                                                                  40cfdf0e4c261f75649f32f472cdb2f9a5297016aa6019824229583ff000671a502d5566421452e3bf547d688e2b6c6741dbed76a5b236cde83a314994084ec7

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                  Filesize

                                                                  69KB

                                                                  MD5

                                                                  164a788f50529fc93a6077e50675c617

                                                                  SHA1

                                                                  c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                  SHA256

                                                                  b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                  SHA512

                                                                  ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js

                                                                  Filesize

                                                                  9KB

                                                                  MD5

                                                                  3d20584f7f6c8eac79e17cca4207fb79

                                                                  SHA1

                                                                  3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                                  SHA256

                                                                  0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                                  SHA512

                                                                  315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                  Filesize

                                                                  107KB

                                                                  MD5

                                                                  40e2018187b61af5be8caf035fb72882

                                                                  SHA1

                                                                  72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                                  SHA256

                                                                  b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                                  SHA512

                                                                  a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  6216cc8f4f28e1089b761e8415913b3b

                                                                  SHA1

                                                                  b621c80e850358f3ba54e27c5c64930bff8c0c75

                                                                  SHA256

                                                                  2f598be81a33001a73e2ef97734743807845356db10ec9b545ee120760b35e89

                                                                  SHA512

                                                                  a20376962cb833f3c485e6447aa73dfa3726bb1c7721628af5d89728840d800a28047ad58101d27c4dcc7a1f6aab840d61b13d6df913334e0a9e629c38a2e752

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                  Filesize

                                                                  111B

                                                                  MD5

                                                                  285252a2f6327d41eab203dc2f402c67

                                                                  SHA1

                                                                  acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                  SHA256

                                                                  5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                  SHA512

                                                                  11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                  Filesize

                                                                  2B

                                                                  MD5

                                                                  d751713988987e9331980363e24189ce

                                                                  SHA1

                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                  SHA256

                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                  SHA512

                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  12KB

                                                                  MD5

                                                                  c433d250f526c0d769a118fc404f90d2

                                                                  SHA1

                                                                  8200e24b642a07a2a48d6db2d6ddbbc2a21913ad

                                                                  SHA256

                                                                  6d7731cf1dac5aae6d54030d8cb0f18470ac1b33cf3e9c7159ef81bd4916b6ae

                                                                  SHA512

                                                                  6baa0306dbf792b6002cb9118b25275f4604d6aea76ee991339d9f4b1df8020c941aad33f4f7744f0efea97f2111f876812ac629b13c5a4b63a12ee3cb704be3

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  13KB

                                                                  MD5

                                                                  b79764a7534dbe1fcac9998bf6a53850

                                                                  SHA1

                                                                  699fce6de928a48c35c88edbc2cf1ca9e5390cac

                                                                  SHA256

                                                                  bef0ffcebdd144360723b84f1b2aa7019382c161b0666333b9982802169d5811

                                                                  SHA512

                                                                  4d882e45a7ea34df5afa76087b1b0069e0482da622389ad6b4b4d61a1e3990c0c5939ab9708b7b2ee46e87354985e90bf5fd0666875cdf9d6f22dbe9e817ebc6

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                  Filesize

                                                                  36KB

                                                                  MD5

                                                                  04aab222618ae4306e0767b6e6109a5d

                                                                  SHA1

                                                                  5630f5f36aae9de84b6bad04d458e9cb98466bc3

                                                                  SHA256

                                                                  1fa441e7433245bf28b256606616105195cbc407e0a21ff94999008705c92ee2

                                                                  SHA512

                                                                  8cbae35f88d306984b07e08a59cda17492d3523d61f16d4b1e0df6a982be9d58e7eec0eabca7ce765b96313f5a0040cda3df8d6b45b6d9b8afe56cf0313ceb4a

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                  Filesize

                                                                  876B

                                                                  MD5

                                                                  825cc379344257834eefe7ab40f00493

                                                                  SHA1

                                                                  462433fe08b58a446590cb62a8ab2d8be3c40d51

                                                                  SHA256

                                                                  c6f9f8faf458bfd8c3043d7da9387f165cfc5ae6bfe28f894ef2a00137d33c52

                                                                  SHA512

                                                                  f7f3ae99eebff007cb7771e7da4db08929cba357b4681f9f29598805dadd8f8e84053bf149bd683d5756ab5ba552d56705b668d99d8909e09454a9da01008e50

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                  Filesize

                                                                  23KB

                                                                  MD5

                                                                  e4ead49e00c1ed3ae34990d3ab6a829c

                                                                  SHA1

                                                                  e730a57216a28de6f4139892299cdcea1f5b8b9f

                                                                  SHA256

                                                                  5f54b2064beb5deb5a47db048a6deb056fdffe1437217aa8c17527461fbdfc2e

                                                                  SHA512

                                                                  6777a9c46faf4f9277be9c72efcc28c8c71834944a0a37b6b6113495df96f31d2bd0cb84775fcf34a3b141ccde2344d8aa6321bb510692d5e5b6e3a65103ec0e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe58a5a1.TMP

                                                                  Filesize

                                                                  467B

                                                                  MD5

                                                                  baa5280282b5f4c3ae4b00b413f2f2f1

                                                                  SHA1

                                                                  13b39d02fbc126a29e65f498481c57e9eb383190

                                                                  SHA256

                                                                  6661de4061b48aac5303ea00a02d703acbbf02af17deecb928ee3b744cf0e283

                                                                  SHA512

                                                                  cd0c76787dcd6ddc1590b59fb86c0cba3fe7cbe46681f60ea3b54bf167a2f46c2346ac3a3b4a1cccf7a8c32796dc1764cfc08fca842c4c4e9c5c9971368ca303

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                                  Filesize

                                                                  21KB

                                                                  MD5

                                                                  97ffbea42e9a0795865f12dedaa14292

                                                                  SHA1

                                                                  82b1a9a09d849ca8e55914ceb05677991729de10

                                                                  SHA256

                                                                  84db83a7515ea99283ea322d6ae8a7e806287e7e98771a53a5d0e3ff362ecd16

                                                                  SHA512

                                                                  884e56e3e7419a5ce22725d8b39b6d9424c882185762fe6ebb3a5c67d65e87b846ecce8a26491019acd3ba79641f489a32e20e2c7b99576315352cca1f5a13a4

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe58a69b.TMP

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  c7569efb2fa9fe93c0ea2f0896f54036

                                                                  SHA1

                                                                  e231c700b778b624f6065b035e5803fdd8b4db4b

                                                                  SHA256

                                                                  2422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f

                                                                  SHA512

                                                                  c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  c13e1740db238e0f3e191e793058bc0c

                                                                  SHA1

                                                                  2ee7db70a1712dd98a5cf12d28581c51a15d49a3

                                                                  SHA256

                                                                  3a9a795c6cdd9435f6fd8d40dba3fc7032477ac42a64e868ee4a0b8b6e6c8714

                                                                  SHA512

                                                                  3c1f2113d56deb052688c7d00ea424f741110103e893e22f8928cfdd04250d9c559075e49d690f75b8aaf5291edaf303f15debf340410eff50cf8674581798ae

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  6e4d555ada897fe4b49e0cdb800618ac

                                                                  SHA1

                                                                  15896581086aca75ae1d408975015b12809269fa

                                                                  SHA256

                                                                  31202af124bb696a1bd9c5bc08c85928674b3dccb822663a8a0ec4b7ef0a3a0a

                                                                  SHA512

                                                                  2224d613aeb79015fcb9764e289bf3f2ee452d0ac1956fbd36b394abe55c4494f225b1426d6db0085eca660b9187e485a1abbd497e8f4e70c27c1b37b831e50d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  30KB

                                                                  MD5

                                                                  18ae5dca3cce8e355a9586446e9f6bae

                                                                  SHA1

                                                                  20b5edd670331c63515e2a6658e3eb5a28527bed

                                                                  SHA256

                                                                  d7de0b38b687e6bc5167d96abb012cb2f44bcd3a730fc5a04acb673fd38f79b5

                                                                  SHA512

                                                                  57de33cb2a18dbd6e521d59b545dabdf99c0d088dc3e4417ad014d3f59021065708f47f39b151a50695ae40aa11c59f1c9b73c27d631dc4d1957a04bfeb47bd9

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  34KB

                                                                  MD5

                                                                  f5fbb5d6dd120d38e94732abfc3d3bbe

                                                                  SHA1

                                                                  0a3872e75257a22b4fa931ecb21f794ee471d21a

                                                                  SHA256

                                                                  cc5ec1a35320182cb9fb7d71c7ca2e99abd15f7d663fc34e1034a091ef936bdf

                                                                  SHA512

                                                                  e63ecdbe61bb04b45ad95ddfb8e25b70019f4171d680d26fd9fe421f96ba20a9fc2214b1e98cbfa11e16cafac82b06221678f07de2d963e61d6af21c51780d58

                                                                • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  55fe75e815e86a87f70a55cb79bca244

                                                                  SHA1

                                                                  585e940ab14ddd518ec0bda0e011b4ecfab1c11f

                                                                  SHA256

                                                                  009742c453eede852da661724843a56ac7a39517730a3aed7ecf3d6b9c1da77b

                                                                  SHA512

                                                                  8eb9045d0cfcf57349e4c344d887ad87745a05359c0476b705851c5ef74f74bea15e520bdc83f8fbf466fed6c0811b3ff07a9c0150dbd41c706b4c05d963e1cb

                                                                • C:\Users\Admin\AppData\Local\Temp\c1914886-aac2-4ca0-8b30-354bae74f7c4.tmp

                                                                  Filesize

                                                                  1B

                                                                  MD5

                                                                  5058f1af8388633f609cadb75a75dc9d

                                                                  SHA1

                                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                  SHA256

                                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                  SHA512

                                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Firefox.lnk..hacked

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  c0a9296d26b01a2611f323cce5382a88

                                                                  SHA1

                                                                  1d60d1ea8d345823d4fe69a0d92b895113945a76

                                                                  SHA256

                                                                  9b50221f1ca8a1e500ff0ba74419e15ad9ce69dbdb3369e97f77d1d0082dbc6b

                                                                  SHA512

                                                                  d32c9682e95bc6f9c5df91c1f09639194ea6729ce4065e9849ab682fffe5e28f7e1d21c3f7bdde61ae3cae7bd984284c25fda92c417e0797974ae30cc2bc38a3

                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\OneDrive.lnk..hacked

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  e637405618255e63fc7b779f1d4bab07

                                                                  SHA1

                                                                  5a479f72b792b0259f4c38737a0cbc5ed4aec293

                                                                  SHA256

                                                                  e53308d0242e3976c3a36d04fbf2ddfec7fa5ed3fe6050cf1631c87ffaf028a6

                                                                  SHA512

                                                                  68b2732b08e586411ec49f57c6af6b1fc7e5f7688b61f235622111c9117f5efb12992767d518ecdf1a8d4a05b9a6046ca6f5291f3712beb7ddf5618bc66049e6

                                                                • C:\Users\Admin\AppData\Roaming\svchost.exe

                                                                  Filesize

                                                                  71KB

                                                                  MD5

                                                                  8f033c07f57f8ce2e62e3a327f423d55

                                                                  SHA1

                                                                  57ac411652d7b1d9accaa8a1af5f4b6a45ef7448

                                                                  SHA256

                                                                  6bda9faf719bb7a55e822667d909086193d323d8fa06b1a3d62437fcf6a9e24b

                                                                  SHA512

                                                                  f3712e7d5d55b27a4c20de07cce136e6d58ce62fa146d29b34dece6248e4456139703c50df10cb318346311cfeee0a8449d49163e821744efcde3ecfe8b880df

                                                                • C:\Users\Admin\Desktop\ApproveProtect.xlsx..hacked

                                                                  Filesize

                                                                  10KB

                                                                  MD5

                                                                  157cdbab28d3279fc25a97f126379d2b

                                                                  SHA1

                                                                  945d43a6d9ccd7a7c15fdb8c800e8cc51c7d07a3

                                                                  SHA256

                                                                  7178c7cdf58eb610d843aae6c3bd0fcf77f29a561e29c29b3c71137067a73f39

                                                                  SHA512

                                                                  1eb1be38e99cbb9db3b1f140e9b33a175b39950358dd482e6a7edcc3a0b5d82853fbdb62a4f0823656049267c455f5b22c71494d33eee3389a61f80fa18d4578

                                                                • C:\Users\Admin\Desktop\CompleteFormat.xlsx..hacked

                                                                  Filesize

                                                                  546KB

                                                                  MD5

                                                                  70cf56607dd15a2365fd54764b93ae51

                                                                  SHA1

                                                                  e5986b4a713082ed02cb03169912be39952478a0

                                                                  SHA256

                                                                  b75af403fdc6b4b1240b0fdaefeab50ff2b2e10385ebc6cf746b48f4caa671f6

                                                                  SHA512

                                                                  f3d27f6ecaf27ed62bd69bf17601f9e66c2af911641b6d6a3d279fbe076734c18de44e49900a8693498bc28ed3b418635d38dea0a4fe5de78ac6c33df6b0e03d

                                                                • C:\Users\Admin\Desktop\DismountFormat.ico..hacked

                                                                  Filesize

                                                                  393KB

                                                                  MD5

                                                                  a2c46f5e24aa8988962cca1eae223977

                                                                  SHA1

                                                                  1027894102c0d75b5c32ce684d4af05cda3e335f

                                                                  SHA256

                                                                  a5eae45f2d0da371aad4ee1889760c195645c3c7740c7607e778c90b902d0ae2

                                                                  SHA512

                                                                  12d7ad1fe9ae49938f2742ac201da65013700620c5ffc144ec7f6d9aa36f8669656d0b7dd9d51bc1ef6e37402b93a88774c8b652c4668c72a39db43a22d94203

                                                                • C:\Users\Admin\Desktop\DismountSelect.xlsx..hacked

                                                                  Filesize

                                                                  12KB

                                                                  MD5

                                                                  057dee960d0c83035182784919c3107d

                                                                  SHA1

                                                                  d9db4de82576bf1686e41e87e7a9121d718713f9

                                                                  SHA256

                                                                  9f7d338fe950ca1c29443033225699d156dbb34f24af1cedfc896f3005de450b

                                                                  SHA512

                                                                  f73b9bc43e2fd2e4f48f09d58aa2c334fcf30ccd6912e3f49cf9d40e8c168761a38d7815e980926704dfc6b2056d531202bc998abf81116ec437b315bda20220

                                                                • C:\Users\Admin\Desktop\InstallEdit.rar..hacked

                                                                  Filesize

                                                                  355KB

                                                                  MD5

                                                                  d984ed540ffc0be3f1878d3b4093cfed

                                                                  SHA1

                                                                  b1f554dee466ca1b97e89106241ab5fc292ebebf

                                                                  SHA256

                                                                  4d5d626d8d88f30a045592f72c8e89b5f42daffa9ea31cf31e93b2d6bba95096

                                                                  SHA512

                                                                  643af5628fca76035709693d1cc2ec93e8da70390cdab868510b2b92d6eccdfff21946e6299d525a5304f2436b6b0af9f83a0ac321f106427db760f01f9728f5

                                                                • C:\Users\Admin\Desktop\InstallGroup.png..hacked

                                                                  Filesize

                                                                  381KB

                                                                  MD5

                                                                  9b4163d96ebca947a9e5887fcee76031

                                                                  SHA1

                                                                  d0fb30987a47742272b9b136a87a8284209d0e97

                                                                  SHA256

                                                                  75d163ed524de9ef6adda7abbc1cea1b91a8097ebd629e9da92b6b0428a51753

                                                                  SHA512

                                                                  65dfc8296ef47eb3d0508bc6eab6c25f9b831590f98f232e1801f6c5c34d6e92564ebceb632c52b7e70e267be48b4e5ddcedfff4e0d58170dd9b4ca9865ee404

                                                                • C:\Users\Admin\Desktop\RenameConvertTo.xlsx..hacked

                                                                  Filesize

                                                                  12KB

                                                                  MD5

                                                                  8022d4d8ffd7eb2773f8cf192eae3fb7

                                                                  SHA1

                                                                  efabf83f1efb189f00c4a1cabbe18101e84a4d59

                                                                  SHA256

                                                                  4e3a4fb62a29d72297d4c7168334f6882867366b82e62963fc219ff9ad62f548

                                                                  SHA512

                                                                  93035339d7b948c8f6de2bd0088c4fc07bd0f296e8074f48e557772b2e0ad0e0ffc305ca0f51301916cedac71b2bd0553aa0509f4306a57b5d2a263d5dc27d17

                                                                • C:\Users\Admin\Desktop\StopGrant.xlsx..hacked

                                                                  Filesize

                                                                  203KB

                                                                  MD5

                                                                  0139b85598c7559e1d0f6416dfc7bc04

                                                                  SHA1

                                                                  32a48298472caad0aa241f0dc3823f6e9632afc6

                                                                  SHA256

                                                                  c121db8904f18b38e51cfcb25dc58842189614056e8754d8d6bafb59763783d1

                                                                  SHA512

                                                                  cadcbe52af36b4c4658dfd16ca22a59c5749083c6e0a3b8d4fe22a12289935549b7ed0dd285c43f571cb60d13bfdd2b9bdc261bdeef9a7a95ff53b2e81cf15dc

                                                                • C:\Users\Admin\Desktop\UndoRequest.dot..hacked

                                                                  Filesize

                                                                  152KB

                                                                  MD5

                                                                  59221abc2ba44a1d683a9452e50608c0

                                                                  SHA1

                                                                  b3c0c56f8693162dd355be802b03cab564edf12c

                                                                  SHA256

                                                                  f00e938ea49d4717be598274bfdb83cc42a387b945707374cf35e4b7e5fb1494

                                                                  SHA512

                                                                  8482ca34748263877dedbae4e538db20db14d338c9606c43d27d0afc45bb024a67991770a5e3e536a9c5e7cc9d90424fede7e33570ede9a4312030c0d54e9ca8

                                                                • C:\Users\Admin\Desktop\UnregisterSearch.ppt..hacked

                                                                  Filesize

                                                                  228KB

                                                                  MD5

                                                                  f0d5c9c8ffac02224897c69b29817392

                                                                  SHA1

                                                                  ffa6cdbe42389e5571717d6245ea191ee26749b0

                                                                  SHA256

                                                                  3d65a778ecfea1e547126dbe586befee7d10ae66810cd2f9ddfb2a78812450b0

                                                                  SHA512

                                                                  9c0a3a08e93fb37a3e5385a23b24a7251e9ef268690cc526b9a88cc51be9276e0dac7509c13a1958c3be3eed32d2f776f02add5fd388e5c20c8534f54123b7d9

                                                                • C:\Users\Admin\Desktop\WatchDeny.cab..hacked

                                                                  Filesize

                                                                  266KB

                                                                  MD5

                                                                  eba3d6bedcb154749ed3324b40515e79

                                                                  SHA1

                                                                  d41ab6e43ff251e019237ef8ccb9b6cabc5a494a

                                                                  SHA256

                                                                  166d42971cde0f15d9054311495efee5aac233f866784e34d18be778b41387ad

                                                                  SHA512

                                                                  dfb8bb8da90c01122ef1ef232e9f650a1c12e5d291f73d27b1016cdebdae2bd034e9e63fc0b0dd7cb391f278e131cc315b0ad289aa2cafd8fe4143ad6e86b379

                                                                • C:\Users\Public\Desktop\Acrobat Reader DC.lnk..hacked

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  a26f52ca894c6930246e05f661cc1ad8

                                                                  SHA1

                                                                  d0386c43dcf1b3e30dfbff50eab1d2a867b2c59e

                                                                  SHA256

                                                                  2d722ac5ffd277cc6455ee43d46516b5ef535183ca7da97ceb2b9ef76685bdb4

                                                                  SHA512

                                                                  5b089f00840438bce326e5752fb8046472100c87b03ce78599db3ea0e8c9d2d210962771fb5db7d749289f255a90f7c66a2c6b0d81ddfdc86625db88b2149d77

                                                                • C:\Users\Public\Desktop\Firefox.lnk..hacked

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  d11585ba7cc2d6c7df1eb1179491371b

                                                                  SHA1

                                                                  d131c454dd3a691fdacac70bc13c8a4f9c2e1754

                                                                  SHA256

                                                                  c3415cea92eb765e5366a93ff664fc2b3d0371f974b34c56712945ece6fb4f70

                                                                  SHA512

                                                                  4820c5bfcc94cb4e8945a0ae28faeae0acdac1ec03a26f2ec387b1baade87e2505f86a04e31ba21c956c16b31f36ffdc69297ad4a1630474cbf7d27e181421e9

                                                                • C:\Users\Public\Desktop\Google Chrome.lnk..hacked

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  f0f9bc261e98b764a44727fb2943dd3d

                                                                  SHA1

                                                                  9cbf9fdff67599430561aa48b0f3b658819448b7

                                                                  SHA256

                                                                  d84dcacdc28ddf791087cb0a948d57e2e3ef2f60766663b9ce990c82b62994e8

                                                                  SHA512

                                                                  c19a1020f4e4373e0decefde9167c261e5585ba9af9e5bef42121a0d4e3e46888065b3dfeb3fdcedb2a2bf75176e7b36bf470a87bf1388fa2d7d6221e51d20c4

                                                                • C:\Users\Public\Desktop\VLC media player.lnk..hacked

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  e4346556f8f4366fedaf747ae01b757f

                                                                  SHA1

                                                                  69145df58e14b89fc4c32ae99a2d4f9cdbeb53bd

                                                                  SHA256

                                                                  f5b4450226f67f00e615525712edd7c1e7fd6f3f2658d5138fa7e17314c47214

                                                                  SHA512

                                                                  ed8d9c92fb050fbe7a18666b4a4d051683ab60c47b17e6a2c118c30a9119cf4f81c5b63ad672ff2924c05e8a5fef0ba8693c641749e8a3c82dae3145b37e9429

                                                                • C:\Users\Restore_Files.html

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  cf0cc6e9f7b71141a348d2f8a9cc800f

                                                                  SHA1

                                                                  bd198c4263359f42901ee30c3c24fc0ee8b2bd9e

                                                                  SHA256

                                                                  5a78197d3cd89269832678d0a59244b21fb0d6a8a87c2a080f68975e9c2febb9

                                                                  SHA512

                                                                  4dd5ff23ba3401ffc050e34dd83f37aeef6e4e24ff29809309ddd40ffce4b4b9cab2764f53dbf843c4cf870e37590ece34c98d7bce9f50b193f632a3b1db38de

                                                                • memory/848-1324-0x00007FFE62BE0000-0x00007FFE636A2000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/848-21-0x00007FFE62BE0000-0x00007FFE636A2000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/3244-20-0x00007FFE62BE0000-0x00007FFE636A2000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/3244-4-0x00007FFE62BE0000-0x00007FFE636A2000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/3244-3-0x00007FFE62BE3000-0x00007FFE62BE5000-memory.dmp

                                                                  Filesize

                                                                  8KB

                                                                • memory/3244-2-0x00007FFE62BE0000-0x00007FFE636A2000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/3244-1-0x0000000000070000-0x0000000000088000-memory.dmp

                                                                  Filesize

                                                                  96KB

                                                                • memory/3244-0-0x00007FFE62BE3000-0x00007FFE62BE5000-memory.dmp

                                                                  Filesize

                                                                  8KB