Resubmissions

08/04/2025, 19:22

250408-x3c8zayqx7 10

08/04/2025, 19:18

250408-xz9srsy1ct 10

08/04/2025, 19:14

250408-xx4hzaypz5 10

08/04/2025, 19:01

250408-xn9zdsyya1 10

08/04/2025, 18:53

250408-xj5twaymw5 10

Analysis

  • max time kernel
    105s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 19:18

Errors

Reason
Machine shutdown

General

Malware Config

Signatures

  • BadRabbit

    Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

  • Badrabbit family
  • CryptoLocker

    Ransomware family with multiple variants.

  • Cryptolocker family
  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Dharma family
  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (414) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Contacts a large (1144) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Downloads MZ/PE file 9 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 15 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 38 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 9 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2cc,0x2a4,0x2d0,0x2c8,0x2dc,0x7ffffaf0f208,0x7ffffaf0f214,0x7ffffaf0f220
      2⤵
        PID:1512
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1712,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:3
        2⤵
        • Downloads MZ/PE file
        PID:4280
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2280,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:8
        2⤵
          PID:4552
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2228,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:2
          2⤵
            PID:1028
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3488,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:1
            2⤵
              PID:2080
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3492,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:1
              2⤵
                PID:732
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4200,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=4208 /prefetch:1
                2⤵
                  PID:3976
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4252,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=4276 /prefetch:2
                  2⤵
                    PID:4516
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5132,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5140 /prefetch:8
                    2⤵
                      PID:4004
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5300,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5284 /prefetch:8
                      2⤵
                        PID:1036
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5404,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5468 /prefetch:1
                        2⤵
                          PID:4048
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5104,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5056 /prefetch:1
                          2⤵
                            PID:4376
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5788,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:8
                            2⤵
                              PID:2056
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5820,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5884 /prefetch:8
                              2⤵
                                PID:5112
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=6400,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6600 /prefetch:1
                                2⤵
                                  PID:68
                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5072,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6540 /prefetch:8
                                  2⤵
                                    PID:3380
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5072,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6540 /prefetch:8
                                    2⤵
                                      PID:1908
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=5352,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5328 /prefetch:1
                                      2⤵
                                        PID:4124
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6724,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6896 /prefetch:8
                                        2⤵
                                          PID:4248
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7028,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7020 /prefetch:8
                                          2⤵
                                            PID:3892
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7176,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7204 /prefetch:8
                                            2⤵
                                              PID:3120
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7232,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7360 /prefetch:8
                                              2⤵
                                                PID:3380
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7388,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7516 /prefetch:8
                                                2⤵
                                                  PID:400
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7668,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7676 /prefetch:8
                                                  2⤵
                                                    PID:5148
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7832,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7840 /prefetch:8
                                                    2⤵
                                                      PID:5168
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7696,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7868 /prefetch:8
                                                      2⤵
                                                        PID:5692
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=6712,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7408 /prefetch:1
                                                        2⤵
                                                          PID:2416
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=7876,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7456 /prefetch:1
                                                          2⤵
                                                            PID:228
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=7216,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6716 /prefetch:1
                                                            2⤵
                                                              PID:428
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6528,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5368 /prefetch:8
                                                              2⤵
                                                                PID:3360
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5036,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:8
                                                                2⤵
                                                                  PID:868
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=708,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6652 /prefetch:8
                                                                  2⤵
                                                                    PID:5576
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7652,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7920 /prefetch:8
                                                                    2⤵
                                                                      PID:5628
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7816,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7684 /prefetch:8
                                                                      2⤵
                                                                        PID:5632
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --always-read-main-dll --field-trial-handle=5004,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7704 /prefetch:1
                                                                        2⤵
                                                                          PID:1112
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7952,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7596 /prefetch:8
                                                                          2⤵
                                                                            PID:2112
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5216,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6628 /prefetch:8
                                                                            2⤵
                                                                              PID:4416
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --always-read-main-dll --field-trial-handle=5896,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7372 /prefetch:1
                                                                              2⤵
                                                                                PID:5724
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6716,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5260 /prefetch:8
                                                                                2⤵
                                                                                  PID:5720
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7608,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7720 /prefetch:8
                                                                                  2⤵
                                                                                    PID:2000
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --always-read-main-dll --field-trial-handle=7224,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7920 /prefetch:1
                                                                                    2⤵
                                                                                      PID:6044
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5000,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7552 /prefetch:8
                                                                                      2⤵
                                                                                        PID:5356
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6992,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5020 /prefetch:8
                                                                                        2⤵
                                                                                          PID:5360
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=8164,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=8104 /prefetch:1
                                                                                          2⤵
                                                                                            PID:5216
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6696,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7812 /prefetch:8
                                                                                            2⤵
                                                                                              PID:5180
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7904,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7460 /prefetch:8
                                                                                              2⤵
                                                                                                PID:6056
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --always-read-main-dll --field-trial-handle=6996,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=4424 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:2260
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7972,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=8160 /prefetch:8
                                                                                                  2⤵
                                                                                                    PID:1908
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7348,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7592 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:4348
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --always-read-main-dll --field-trial-handle=2548,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7784 /prefetch:1
                                                                                                      2⤵
                                                                                                        PID:1112
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7880,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7820 /prefetch:8
                                                                                                        2⤵
                                                                                                          PID:5316
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5852,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7772 /prefetch:8
                                                                                                          2⤵
                                                                                                            PID:5212
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --always-read-main-dll --field-trial-handle=7956,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5752 /prefetch:1
                                                                                                            2⤵
                                                                                                              PID:4272
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7636,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=5228 /prefetch:8
                                                                                                              2⤵
                                                                                                                PID:5988
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5916,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7236 /prefetch:8
                                                                                                                2⤵
                                                                                                                  PID:5172
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --always-read-main-dll --field-trial-handle=5304,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7620 /prefetch:1
                                                                                                                  2⤵
                                                                                                                    PID:784
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6632,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7704 /prefetch:8
                                                                                                                    2⤵
                                                                                                                      PID:5336
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6204,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=8168 /prefetch:8
                                                                                                                      2⤵
                                                                                                                        PID:5224
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7432,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=7308 /prefetch:8
                                                                                                                        2⤵
                                                                                                                          PID:5232
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6152,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:8
                                                                                                                          2⤵
                                                                                                                            PID:6680
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7284,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6088 /prefetch:8
                                                                                                                            2⤵
                                                                                                                              PID:17784
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6052,i,5327370720655200516,13811129528172476619,262144 --variations-seed-version --mojo-platform-channel-handle=6136 /prefetch:8
                                                                                                                              2⤵
                                                                                                                                PID:17764
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                              1⤵
                                                                                                                                PID:2000
                                                                                                                              • C:\Windows\System32\rundll32.exe
                                                                                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                1⤵
                                                                                                                                  PID:2116
                                                                                                                                • C:\Users\Admin\Downloads\Cerber5.exe
                                                                                                                                  "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                                                                                  1⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Enumerates connected drives
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:5996
                                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                    C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                                                                                                                    2⤵
                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:2436
                                                                                                                                  • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                    C:\Windows\system32\netsh.exe advfirewall reset
                                                                                                                                    2⤵
                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:6736
                                                                                                                                • C:\Users\Admin\Downloads\Birele.exe
                                                                                                                                  "C:\Users\Admin\Downloads\Birele.exe"
                                                                                                                                  1⤵
                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Impair Defenses: Safe Mode Boot
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:5756
                                                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                    taskkill /F /IM explorer.exe
                                                                                                                                    2⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Kills process with taskkill
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:5064
                                                                                                                                • C:\Users\Admin\Downloads\BadRabbit.exe
                                                                                                                                  "C:\Users\Admin\Downloads\BadRabbit.exe"
                                                                                                                                  1⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in Windows directory
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:6080
                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                    C:\Windows\system32\rundll32.exe C:\Windows\infpub.dat,#1 15
                                                                                                                                    2⤵
                                                                                                                                    • Loads dropped DLL
                                                                                                                                    • Drops file in Windows directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:3048
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      /c schtasks /Delete /F /TN rhaegal
                                                                                                                                      3⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:5424
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /Delete /F /TN rhaegal
                                                                                                                                        4⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:3928
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      /c schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2216154474 && exit"
                                                                                                                                      3⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:1384
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /Create /RU SYSTEM /SC ONSTART /TN rhaegal /TR "C:\Windows\system32\cmd.exe /C Start \"\" \"C:\Windows\dispci.exe\" -id 2216154474 && exit"
                                                                                                                                        4⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:6544
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      /c schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 19:38:00
                                                                                                                                      3⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:6056
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /Create /SC once /TN drogon /RU SYSTEM /TR "C:\Windows\system32\shutdown.exe /r /t 0 /f" /ST 19:38:00
                                                                                                                                        4⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:6616
                                                                                                                                    • C:\Windows\CCF0.tmp
                                                                                                                                      "C:\Windows\CCF0.tmp" \\.\pipe\{18ADB326-8214-42F9-A695-E2F64E44F59D}
                                                                                                                                      3⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:5400
                                                                                                                                • C:\Users\Admin\Downloads\Annabelle.exe
                                                                                                                                  "C:\Users\Admin\Downloads\Annabelle.exe"
                                                                                                                                  1⤵
                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                                                                                                  • Modifies Windows Defender Real-time Protection settings
                                                                                                                                  • UAC bypass
                                                                                                                                  • Disables RegEdit via registry modification
                                                                                                                                  • Event Triggered Execution: Image File Execution Options Injection
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Impair Defenses: Safe Mode Boot
                                                                                                                                  • Adds Run key to start application
                                                                                                                                  • Checks whether UAC is enabled
                                                                                                                                  • System policy modification
                                                                                                                                  PID:2804
                                                                                                                                  • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                    vssadmin delete shadows /all /quiet
                                                                                                                                    2⤵
                                                                                                                                    • Interacts with shadow copies
                                                                                                                                    PID:6548
                                                                                                                                  • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                    vssadmin delete shadows /all /quiet
                                                                                                                                    2⤵
                                                                                                                                    • Interacts with shadow copies
                                                                                                                                    PID:6444
                                                                                                                                  • C:\Windows\SYSTEM32\vssadmin.exe
                                                                                                                                    vssadmin delete shadows /all /quiet
                                                                                                                                    2⤵
                                                                                                                                    • Interacts with shadow copies
                                                                                                                                    PID:6544
                                                                                                                                  • C:\Windows\SYSTEM32\NetSh.exe
                                                                                                                                    NetSh Advfirewall set allprofiles state off
                                                                                                                                    2⤵
                                                                                                                                    • Modifies Windows Firewall
                                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                    PID:5384
                                                                                                                                  • C:\Windows\System32\shutdown.exe
                                                                                                                                    "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                                                                                                    2⤵
                                                                                                                                      PID:17324
                                                                                                                                  • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                    "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:4052
                                                                                                                                    • C:\Users\Admin\AppData\Local\system.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\system.exe"
                                                                                                                                      2⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:6516
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6560
                                                                                                                                      • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                                                        C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:6580
                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6812
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                          4⤵
                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:464
                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6820
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                          4⤵
                                                                                                                                          • Adds Run key to start application
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:4184
                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6828
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                          4⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:6216
                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6836
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                          4⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:6244
                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6844
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                          4⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:5036
                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6852
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                          4⤵
                                                                                                                                          • UAC bypass
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:2300
                                                                                                                                  • C:\Users\Admin\Downloads\$uckyLocker.exe
                                                                                                                                    "C:\Users\Admin\Downloads\$uckyLocker.exe"
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Sets desktop wallpaper using registry
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:3532
                                                                                                                                  • C:\Users\Admin\Downloads\InfinityCrypt.exe
                                                                                                                                    "C:\Users\Admin\Downloads\InfinityCrypt.exe"
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Checks processor information in registry
                                                                                                                                    PID:2992
                                                                                                                                  • C:\Users\Admin\Downloads\CryptoLocker.exe
                                                                                                                                    "C:\Users\Admin\Downloads\CryptoLocker.exe"
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:1776
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                                                                                                      "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"
                                                                                                                                      2⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Adds Run key to start application
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:2172
                                                                                                                                      • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                                                                                                        "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C
                                                                                                                                        3⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:1504
                                                                                                                                  • C:\Users\Admin\Downloads\CoronaVirus.exe
                                                                                                                                    "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                                                                                                                    1⤵
                                                                                                                                    • Drops startup file
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Adds Run key to start application
                                                                                                                                    • Drops desktop.ini file(s)
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    PID:4104
                                                                                                                                    • C:\Windows\System32\mshta.exe
                                                                                                                                      "C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                                                                                                                      2⤵
                                                                                                                                        PID:34276
                                                                                                                                      • C:\Windows\System32\mshta.exe
                                                                                                                                        "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                                                                                                                        2⤵
                                                                                                                                          PID:35616
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                                                                                                        1⤵
                                                                                                                                          PID:5336
                                                                                                                                          • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                                                                                                            C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                                                                                                                            2⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:2288
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\Downloads\Birele.exe
                                                                                                                                          1⤵
                                                                                                                                            PID:5300
                                                                                                                                            • C:\Users\Admin\Downloads\Birele.exe
                                                                                                                                              C:\Users\Admin\Downloads\Birele.exe
                                                                                                                                              2⤵
                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Adds Run key to start application
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:6340
                                                                                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                taskkill /F /IM explorer.exe
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Kills process with taskkill
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:6460
                                                                                                                                          • C:\Windows\system32\vssvc.exe
                                                                                                                                            C:\Windows\system32\vssvc.exe
                                                                                                                                            1⤵
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            PID:6176
                                                                                                                                          • C:\Windows\system32\LogonUI.exe
                                                                                                                                            "LogonUI.exe" /flags:0x4 /state0:0xa38ad855 /state1:0x41c64e6d
                                                                                                                                            1⤵
                                                                                                                                              PID:16100

                                                                                                                                            Network

                                                                                                                                            MITRE ATT&CK Enterprise v16

                                                                                                                                            Replay Monitor

                                                                                                                                            Loading Replay Monitor...

                                                                                                                                            Downloads

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\icudtl.dat.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              16B

                                                                                                                                              MD5

                                                                                                                                              ca45fc1a6416285eea7d0d379c6a71b6

                                                                                                                                              SHA1

                                                                                                                                              ef351e2c7c97467b575adddc7c5e40bab22c9449

                                                                                                                                              SHA256

                                                                                                                                              8064bcf9de9294136a51bb796f89545fd8bbc8a0078aa5c68b6151297bc032bc

                                                                                                                                              SHA512

                                                                                                                                              5a204e159f8bd1b5eae8873a1046ea45f76112c10a9f28755ad5f401b28aa2a4521b6dbe761478fed8f78073fcbe5708a901029f10ef3bf24366ca66a224d2e6

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              720B

                                                                                                                                              MD5

                                                                                                                                              5a8f0d2b202e3213527312dd31511180

                                                                                                                                              SHA1

                                                                                                                                              760c9644b6232a9ab0549fe2b78c4d881e2bfdca

                                                                                                                                              SHA256

                                                                                                                                              a1ef082358f9c9d1697fdd528323043e3f6d40c93b3901c097ca4d59effb6432

                                                                                                                                              SHA512

                                                                                                                                              967b0ccb4d8e9cb082347bf9a96f13286b20814b2ce216c70825cda85270ce55c350cff7c5761be4398cb9e57b9f73e386029fc83924eab71fd66e1979e00f97

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              688B

                                                                                                                                              MD5

                                                                                                                                              67dca752a3fd866402600562c9a28958

                                                                                                                                              SHA1

                                                                                                                                              68806060a7373635c5ad6261468b03407ed9e539

                                                                                                                                              SHA256

                                                                                                                                              bf26c92e06b40a695cc6d0afbf51609fe567fe584a7a95cca06382dd8ab024d6

                                                                                                                                              SHA512

                                                                                                                                              1e19d7d7202674e04cfaca5435969e11cae2f5b3c17492b5b711b1bcf09807e527f06d82b2e9915bf02c539b3157b64d7951e06a18af72d1cb476818f75f8940

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons2x.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              1KB

                                                                                                                                              MD5

                                                                                                                                              cbefc6c5c645f3346f9184a8170fe3b5

                                                                                                                                              SHA1

                                                                                                                                              fc93e199404e28aad8c889dd4b8892a92db7f5f2

                                                                                                                                              SHA256

                                                                                                                                              a10a75ebe69662c6c2d5aad6f27fb0db66a1204f799519248c3ed55f20f515da

                                                                                                                                              SHA512

                                                                                                                                              40ba41b42a2c3975957d3a944e85142887206d79949be0c5fc18c199c519f84786a09fbe5c6352fe4e40f51df209b9e8f8813c99e594452107b6b544fd24d89d

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              448B

                                                                                                                                              MD5

                                                                                                                                              6f4babfa5a4d45f2565d65a48181a212

                                                                                                                                              SHA1

                                                                                                                                              5a4bdba73b031c335e8c88651f3ad5e2a3928d21

                                                                                                                                              SHA256

                                                                                                                                              175b12e25dfca7ced53ff8715cfbd048b3be5a60616f1725b40fb5ffa9408ed0

                                                                                                                                              SHA512

                                                                                                                                              81e8873bdc33c6d667975550502f5b8e97a130df83a23e57bfd91f9010f1cd660a8d7e6faaa28777232bad95acdbaa461ed7c68ba14ecba95f716bc63e8ebae5

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_2x.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              624B

                                                                                                                                              MD5

                                                                                                                                              64951c95ccb2a39ae4026249240e0151

                                                                                                                                              SHA1

                                                                                                                                              5eec7e0a43b092dc4f5288360d9f24fb30158e88

                                                                                                                                              SHA256

                                                                                                                                              31ba2e849a3efb61dd6f95ece2200a8658be5642eaed123682dafe0564aff9c6

                                                                                                                                              SHA512

                                                                                                                                              8724f8fb28aa328fcaafa39fdfb54134e5fcabb1e859e2908d270200fb7f1bcee5b37cea5ecb1efdcbbbf53c360d023c07ddb0ed0dd84675c74b9a6ec18c2139

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              400B

                                                                                                                                              MD5

                                                                                                                                              4e73ccf9f1851146292af1a9fb244331

                                                                                                                                              SHA1

                                                                                                                                              9c940bf7139238711f9a2db34be73a7f7d54fe88

                                                                                                                                              SHA256

                                                                                                                                              222995e71a0eeee3483d66c05513db5fa87a5f4cd44894a37aa02582e9f69243

                                                                                                                                              SHA512

                                                                                                                                              675923fc4583c34ea237a6877d8c7d2c64d763aa22f66644e76458bbee078c47080e8394ab91774b65da050101eaa7fe9a8ebf0f901d003b2894591c26897347

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_hover_2x.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              560B

                                                                                                                                              MD5

                                                                                                                                              44e0dee0952658e40774a28260d53de8

                                                                                                                                              SHA1

                                                                                                                                              4409a4fd7ce5c384bf25c865ab409f4ff5b43891

                                                                                                                                              SHA256

                                                                                                                                              d8585917a101f93134333df538ff30e1c79c4aa2316f0de21ab3b203105f8854

                                                                                                                                              SHA512

                                                                                                                                              48d43dd845ccff4357ba6449feb2d3926b95c447f4c02c7438ce346207a80b1ad0c956dbc85e51c25f2e0875e25f4dd081998e73d5e6de91356e479e87cbc600

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              400B

                                                                                                                                              MD5

                                                                                                                                              86307678ee2479584224c75089167af2

                                                                                                                                              SHA1

                                                                                                                                              c482755c7159e9acd2ba3e9be0a31e9d2f424a94

                                                                                                                                              SHA256

                                                                                                                                              bb6deed3aa604d361388709cf7263c8ba0836a1091a11c3153d81a6052ad9e72

                                                                                                                                              SHA512

                                                                                                                                              9ae10cc6f569d3c294b07eea5634f3a8126c0ac51129987a812847d73b750bb69541b0dcde1312aa2acf44618718dd39a0c8640d9b3dfe93ec04c1cf02c82575

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_2x.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              560B

                                                                                                                                              MD5

                                                                                                                                              47b3023998531d9d6a79b9495d7f57ea

                                                                                                                                              SHA1

                                                                                                                                              b66fdca09423dfc262f378a6f42376bcd1c5b5a4

                                                                                                                                              SHA256

                                                                                                                                              dda9197c4daa48a576e26a909a77a3f37242f85715574daf7dc8aa1ccaa98fbf

                                                                                                                                              SHA512

                                                                                                                                              aab01921cefb80c8625f8c40588141902ba94ebfa8547f9e860e18f678dc6017dbf403d688016a6347709033cba99532f1a89ab789586dcbd104ec022acf4eb3

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              400B

                                                                                                                                              MD5

                                                                                                                                              4dc033b587d49f6ce4ed208f2991ef8a

                                                                                                                                              SHA1

                                                                                                                                              6707361b07f98a54146d1d95e83bfdbdf04c630a

                                                                                                                                              SHA256

                                                                                                                                              6b3646547200923ef51055249595cd04742067994b8cd02690c4f3fc1424411f

                                                                                                                                              SHA512

                                                                                                                                              a307209e81225294707813bef1b833a4997971c3deea03a87a44de444cd3678a0719fa0852bfc940b2c05da045150fa424e47fcce7ad49f7827f5834c323b584

                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\dark\rhp_world_icon_hover_2x.png.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              560B

                                                                                                                                              MD5

                                                                                                                                              82f55cf2a2c8abb3e00b6d0277e2c4da

                                                                                                                                              SHA1

                                                                                                                                              e44ac2e00d7ff2f17616d5994ede5759c73fcc1f

                                                                                                                                              SHA256

                                                                                                                                              2589b5928e796adb3aea8b4ac468f7a01f5f874ae1715fd82f7cd3d9461b4aa4

                                                                                                                                              SHA512

                                                                                                                                              4c5e230fb8d63abe35dcb78b27ecb5c884e331231de57379cf5edb86741c8c5b8eb3ba3c4b1d8401cdc8a138abd2ab238c5df97bc8ee47bf56bdab8aabc29cb5

                                                                                                                                            • C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                              MD5

                                                                                                                                              aa7fcc3fd9feaadcff0d78832e400bd1

                                                                                                                                              SHA1

                                                                                                                                              56a53402e33bd63d78d4cb790669ff44c3922a2c

                                                                                                                                              SHA256

                                                                                                                                              95d5fbb50de07baf2e3a2fb0897727ebe1b90dac0b705d8f49dd5e4f42051f74

                                                                                                                                              SHA512

                                                                                                                                              83ac02fd579182b9215ee4a359a55ca554930f1b13c80acfa3afd6d9ece26673a2579797e929619acf41c07321b3bb6d2d0bd9190c62b4f9791c8052535d5d5f

                                                                                                                                            • C:\Program Files (x86)\Microsoft\EdgeCore\132.0.2957.140\dxcompiler.dll.id-EF6486BC.[[email protected]].ncov.392363B5A7EC85DC94391179E0A2EDF9389F7C6C7125191901C06E20CE7773C5

                                                                                                                                              Filesize

                                                                                                                                              21.0MB

                                                                                                                                              MD5

                                                                                                                                              8673197a376f069cacd1b25af1aed10b

                                                                                                                                              SHA1

                                                                                                                                              913ad834b1c6d6ca1137c7beb89ee1034c0afbed

                                                                                                                                              SHA256

                                                                                                                                              cdfe2ab174507d6c0bf5967fbb00ba0ac1dc2ec1ad485723293709106a85a4a9

                                                                                                                                              SHA512

                                                                                                                                              0463801ebe40c33ff5ad0bcc128835a971b0c27df9652280add83d8d03be7b7213bde1428ba01b19b92c5e7e6dbdd5db95316a6be05308cad8c7ebe73230e81b

                                                                                                                                            • C:\Program Files\7-Zip\7z.dll.id-EF6486BC.[[email protected]].ncov

                                                                                                                                              Filesize

                                                                                                                                              2.6MB

                                                                                                                                              MD5

                                                                                                                                              28e19d6115448113bfd48d98212255c7

                                                                                                                                              SHA1

                                                                                                                                              e31dfa57df20f34300454240a289a855e41fdce2

                                                                                                                                              SHA256

                                                                                                                                              b1758a6411d76d919be6fd4d20b26ccc34d24bcbee9d536f8f353743002b6b84

                                                                                                                                              SHA512

                                                                                                                                              990439ac7f407eab69f4947e8edc880de1c4ae93f72fa9cd8b22b4e6b3da8d931047bb31c503d5b3c17475ff1d6b95edd4f28cc86c1cac131fb661750cd40101

                                                                                                                                            • C:\Program Files\chrome_Unpacker_BeginUnzipping3456_2084867785\manifest.json

                                                                                                                                              Filesize

                                                                                                                                              134B

                                                                                                                                              MD5

                                                                                                                                              049c307f30407da557545d34db8ced16

                                                                                                                                              SHA1

                                                                                                                                              f10b86ebfe8d30d0dc36210939ca7fa7a819d494

                                                                                                                                              SHA256

                                                                                                                                              c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54

                                                                                                                                              SHA512

                                                                                                                                              14f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json

                                                                                                                                              Filesize

                                                                                                                                              3KB

                                                                                                                                              MD5

                                                                                                                                              f9fd82b572ef4ce41a3d1075acc52d22

                                                                                                                                              SHA1

                                                                                                                                              fdded5eef95391be440cc15f84ded0480c0141e3

                                                                                                                                              SHA256

                                                                                                                                              5f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6

                                                                                                                                              SHA512

                                                                                                                                              17084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                              Filesize

                                                                                                                                              280B

                                                                                                                                              MD5

                                                                                                                                              4013ebc7b496bf70ecf9f6824832d4ae

                                                                                                                                              SHA1

                                                                                                                                              cfdcdac5d8c939976c11525cf5e79c6a491c272a

                                                                                                                                              SHA256

                                                                                                                                              fb1a67bdc2761f1f9e72bbc41b6fc0bf89c068205ffd0689e4f7e2c34264b22a

                                                                                                                                              SHA512

                                                                                                                                              96822252f121fb358aa43d490bb5f5ce3a81c65c8de773c170f1d0e91da1e6beb83cb1fb9d4d656230344cd31c3dca51a6c421fda8e55598c364092232e0ad22

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                              Filesize

                                                                                                                                              280B

                                                                                                                                              MD5

                                                                                                                                              fed4ab68611c6ce720965bcb5dfbf546

                                                                                                                                              SHA1

                                                                                                                                              af33fc71721625645993be6fcba5c5852e210864

                                                                                                                                              SHA256

                                                                                                                                              c41acdf5d0a01d5e9720ef9f6d503099950791b6f975ba698ccd013c4defa8c4

                                                                                                                                              SHA512

                                                                                                                                              f9ab23b3b4052f7fda6c9a3e8cd68056f21da5d0fcf28061331900cac6f31ef081705804d9a9d4103ee7d9c9bdb6aa4237987b7e821d2d96cd52da24219e55ee

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                              Filesize

                                                                                                                                              8KB

                                                                                                                                              MD5

                                                                                                                                              6024c65ed5738d72e04112f46f547811

                                                                                                                                              SHA1

                                                                                                                                              4267ea59fd11248254bd7a46db8a2203dadc1a31

                                                                                                                                              SHA256

                                                                                                                                              56e68fe11d9e5b5487a2bcf55cea008bf40356c0ce647064b4089c8f5eb68ff6

                                                                                                                                              SHA512

                                                                                                                                              b17588a3c85ada3426b52ca4805204d168a239d88b398eff8b69836df20fac5f8680fa14173811b7b9d62e2fa2f2284ed6a645d878a2b9f123331d884e1131d7

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                              Filesize

                                                                                                                                              8KB

                                                                                                                                              MD5

                                                                                                                                              20fe53eebed2e7387b9c99da3a9d64d2

                                                                                                                                              SHA1

                                                                                                                                              cd6fdf045920381393cd37d7249049b18f9c746f

                                                                                                                                              SHA256

                                                                                                                                              5f9956b939f68cafece58850ad13d9eb71ff5fd04428a47253c5e0e5b63889ad

                                                                                                                                              SHA512

                                                                                                                                              9831850a075686a015559cc14d50992ab3688ae2fe4b5ceaeebe81813e522248d054ee1669267d1f648a60e11f5f51104e20a8067ccb2328bfe7eafb317c85b0

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe585138.TMP

                                                                                                                                              Filesize

                                                                                                                                              3KB

                                                                                                                                              MD5

                                                                                                                                              b70f1438b64c2d139e4f2f295f52869a

                                                                                                                                              SHA1

                                                                                                                                              bb4833aa762972eb2b700b8713c9c57de015d72b

                                                                                                                                              SHA256

                                                                                                                                              667e02cb7e6b67cff7c3dd3c3518fe18c04fbe6fa5a718ad3d4ed176137092be

                                                                                                                                              SHA512

                                                                                                                                              7527b0a3ebd669b5059b13d9466e86d965c5516ff59e9946360f4594c4d089721e6ef52b0cd003c85f5364b969b73c9d36253927b9dfd9866b5e3cb41861262f

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                                                              Filesize

                                                                                                                                              69KB

                                                                                                                                              MD5

                                                                                                                                              164a788f50529fc93a6077e50675c617

                                                                                                                                              SHA1

                                                                                                                                              c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                                                                                              SHA256

                                                                                                                                              b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                                                                                              SHA512

                                                                                                                                              ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js

                                                                                                                                              Filesize

                                                                                                                                              9KB

                                                                                                                                              MD5

                                                                                                                                              3d20584f7f6c8eac79e17cca4207fb79

                                                                                                                                              SHA1

                                                                                                                                              3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                                                                                                              SHA256

                                                                                                                                              0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                                                                                                              SHA512

                                                                                                                                              315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                              Filesize

                                                                                                                                              6KB

                                                                                                                                              MD5

                                                                                                                                              67afeb34bc42e44a1b805f8d4e337a58

                                                                                                                                              SHA1

                                                                                                                                              84aa92832b4ff26842e70b4484174b728e5fd90d

                                                                                                                                              SHA256

                                                                                                                                              98c8f49614c5ae0c03fac7d1c217ecbe6026141b46a5d284b55f18626337bc04

                                                                                                                                              SHA512

                                                                                                                                              0fbce621ff70e3683107b84811f4bcc9817522d0997aa3659f257c9fc85c90bd17da696dddd4029a2bb93231c62c4ce9992a724d31654c16acdb9646d4b9ecd0

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                              Filesize

                                                                                                                                              111B

                                                                                                                                              MD5

                                                                                                                                              285252a2f6327d41eab203dc2f402c67

                                                                                                                                              SHA1

                                                                                                                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                                                              SHA256

                                                                                                                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                                                              SHA512

                                                                                                                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                              Filesize

                                                                                                                                              2B

                                                                                                                                              MD5

                                                                                                                                              d751713988987e9331980363e24189ce

                                                                                                                                              SHA1

                                                                                                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                              SHA256

                                                                                                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                              SHA512

                                                                                                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                                                                                              Filesize

                                                                                                                                              211B

                                                                                                                                              MD5

                                                                                                                                              e93372ee5555a524f1afe93120255a0e

                                                                                                                                              SHA1

                                                                                                                                              6fba6359a2bce5ff9d8724ad7f0b4654d92fe173

                                                                                                                                              SHA256

                                                                                                                                              9a0b9704e774fddc4ec1c2f0b31a9186168cfc37daa52d59cac105dd0d40c7d1

                                                                                                                                              SHA512

                                                                                                                                              7f5b63d6ad757826661f7186045b14fb6d674166fbc1d031e84ad7c9f41c9dec822cb6d461e0be17af83591283ded346079367b6d87a81550907bcf18714857b

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries~RFe581364.TMP

                                                                                                                                              Filesize

                                                                                                                                              40B

                                                                                                                                              MD5

                                                                                                                                              20d4b8fa017a12a108c87f540836e250

                                                                                                                                              SHA1

                                                                                                                                              1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                                                                                              SHA256

                                                                                                                                              6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                                                                                              SHA512

                                                                                                                                              507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                              Filesize

                                                                                                                                              17KB

                                                                                                                                              MD5

                                                                                                                                              f7f40353ff758f919fc4e3b83ccc2081

                                                                                                                                              SHA1

                                                                                                                                              0698b8f8f82ae85e233c7e77d306f09ff8b7362f

                                                                                                                                              SHA256

                                                                                                                                              5847c7d953735a4dcc2fb7f371104c6a0773225884d3e1acf1a9c266cdd8619d

                                                                                                                                              SHA512

                                                                                                                                              3e300a91d1d562c360ac28feb8b6f67e7f2283c1d1aa8469236bb355f94f5e39aa71a66496da5bb00f7990619f697ee5634166d8713b0ab1b3e8d6dd60d3ca53

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                              Filesize

                                                                                                                                              16KB

                                                                                                                                              MD5

                                                                                                                                              d0fd25bd1c19bf018d0c29c29684c868

                                                                                                                                              SHA1

                                                                                                                                              87dfd84cd1aaa6a89e4bb33f0e8721a99fa827ff

                                                                                                                                              SHA256

                                                                                                                                              aa29b5c60965b6273646fc0116b77fd4b016c651437b7126edbdf9ee45ffdb98

                                                                                                                                              SHA512

                                                                                                                                              da963d8c010c8b5ebbcdf344dbd83a16422b889df838b2bdb459e419c2caa5d67f437adf1eaf3ab66dbba571b7bba09e12e6e61ef3b8fbc3e9c8532bf23f3d18

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                              Filesize

                                                                                                                                              16KB

                                                                                                                                              MD5

                                                                                                                                              ac300e5971e4aa14f8ac748c5d962494

                                                                                                                                              SHA1

                                                                                                                                              9ac57b5095ae4cfb7c3635d96056262c8c9255da

                                                                                                                                              SHA256

                                                                                                                                              4d3d9f7790ad3800c968fb56e66a292c1f6530901eab9f68e5244cd2f6b308a6

                                                                                                                                              SHA512

                                                                                                                                              01bb7c446d93fc9f271fad6df77f299e93b1a5f2f1a43172f37bd413752b587678569811178c0346be4036a24c52410c4c2eacf716463cde3f46127c26794d32

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                              Filesize

                                                                                                                                              15KB

                                                                                                                                              MD5

                                                                                                                                              0067ead4031258297c7a3c0e99a31ac9

                                                                                                                                              SHA1

                                                                                                                                              f05b9f4eca918de550cdfc0f5864c4dbe24e957d

                                                                                                                                              SHA256

                                                                                                                                              f9fba6ed6cbbf2d1fe3aaf6c992eca9782013f86d6fd64772eafa3fbead9d25a

                                                                                                                                              SHA512

                                                                                                                                              89e284e111e34d8a912be35d1724364eb06368a0c78b19566193da820f1506e6497b1641c8378e466ec64219260fd76de4b67c92e19007dec1b9b97e23ad0168

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                              Filesize

                                                                                                                                              32KB

                                                                                                                                              MD5

                                                                                                                                              39a839571fecebca0673b86bb7a314dd

                                                                                                                                              SHA1

                                                                                                                                              7667c3077eaeb2f84df276ee87c4c5ca1d44af8b

                                                                                                                                              SHA256

                                                                                                                                              cfabe64bd3e0679a39b24f5c3a02d77f4ad878c54fb49f602633b6101e176375

                                                                                                                                              SHA512

                                                                                                                                              10acf22457d910da06ac6ed157f5b13182150bf59c7626a17498f108b883f1aa1ad38f1e95cd38da801f416399f8d9c97366d78050b947555866f9adb59ae9ea

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index

                                                                                                                                              Filesize

                                                                                                                                              600B

                                                                                                                                              MD5

                                                                                                                                              4f733ca57c56ce3cb1ec4df8fa0c5da7

                                                                                                                                              SHA1

                                                                                                                                              e6f4a48892f1d20005206df0eee929051e631f03

                                                                                                                                              SHA256

                                                                                                                                              f4c60ffb53bfbedb9fe6529da43930178e78ca12554a7f1ec317e8ff7950866d

                                                                                                                                              SHA512

                                                                                                                                              f45c30e3ff6e617ffc02389df7b2ed92432b9ddb356e2ed36e31321766dcf4ebc99e7a397a014ac9a4a0424dfe390e8c8f259ef003b41e034046d58b58a79936

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              feac69bb3c41ff7d5e1cf37fd936c550

                                                                                                                                              SHA1

                                                                                                                                              7436d9360265dfbd282937231aff6de071cfbe04

                                                                                                                                              SHA256

                                                                                                                                              1079edccf6b0afe17f5426174c44a36cb36ca4de481ab20d59bf8a710b8aee54

                                                                                                                                              SHA512

                                                                                                                                              198b12b066aeefc603cad81ca4ceced18992f4aceb81029e6637866d186ac2d6252364c9bf962b38199bd2388f764c3b7f645e6691f778e0578a79d0a847c866

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\bb9a4039-5fee-44f8-a618-d20a135c468d\index-dir\the-real-index~RFe57c12d.TMP

                                                                                                                                              Filesize

                                                                                                                                              600B

                                                                                                                                              MD5

                                                                                                                                              2111e2f93416adc2d1c9e2705723dfe8

                                                                                                                                              SHA1

                                                                                                                                              df87da8baa4f9116058b295deab7328141eb3963

                                                                                                                                              SHA256

                                                                                                                                              add27bdf505636058549d31869db21bc16f13010dc6376190429d058a0c0cf4a

                                                                                                                                              SHA512

                                                                                                                                              335784b9c5cc7cf0ce5c012432581d28409de5ec1cd2a353949eeda780cc8d27c16300795f3bedc0cb9398e3b1312aecc1c3536d3b8049960aa0722e7d253d90

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\d5806065-9d71-425f-b355-a8f00337e4d3\index-dir\the-real-index

                                                                                                                                              Filesize

                                                                                                                                              72B

                                                                                                                                              MD5

                                                                                                                                              d792bfcb2a400c18e59f6c03f0e9fc1e

                                                                                                                                              SHA1

                                                                                                                                              fc4a2ece7bc131101a6d3b3520d64c29d72ddbb4

                                                                                                                                              SHA256

                                                                                                                                              17aaa7f7422f42ed472d652be3563308e7c476bae37d9a71b4133f09855c083c

                                                                                                                                              SHA512

                                                                                                                                              d56f5edd0eee65265157b5fd6bba8a9d1d804b40b92297e86518e8d59ccc265c832d7ce78af648022fe62bd2c3d1d09e83b9b6af10406761f8a40f611ebc1c04

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\d5806065-9d71-425f-b355-a8f00337e4d3\index-dir\the-real-index

                                                                                                                                              Filesize

                                                                                                                                              72B

                                                                                                                                              MD5

                                                                                                                                              d035bc17981c994f25bdbcd3a6b29578

                                                                                                                                              SHA1

                                                                                                                                              cde5b51033580f278a69351c46ea95831f38dc7e

                                                                                                                                              SHA256

                                                                                                                                              11faacf545bd4e7d5b7b2feae6440d6f8d7e2db418766b3acb70eacb7c6cc155

                                                                                                                                              SHA512

                                                                                                                                              6d19c9f2dd01b65c9117c932a1cc4292bda3648114387a8033b0c8bb9eba86e7a563dbe5a23441c51e03afd3220475121fb9df3792b0f2401f245f66b785f56f

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                                                                                                                              Filesize

                                                                                                                                              253B

                                                                                                                                              MD5

                                                                                                                                              99db51fde850225cdedeca7342bc9f46

                                                                                                                                              SHA1

                                                                                                                                              dcdd81c3a9d230286a88afe23d67acc762e7a446

                                                                                                                                              SHA256

                                                                                                                                              6fe5d6026709be189b725d5500c8de172b938d24a6e7fe85b6dca8f46b8d4d8a

                                                                                                                                              SHA512

                                                                                                                                              c6c4064d73ca712c9677a346eef2d0bd03d6d0ec5d3d22a4cc52059a9dbf64a69f036e1f6b4b25b26b96a304c2455ba6bfb0960689bf48d1ded07d87fea7a7e9

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                              Filesize

                                                                                                                                              72B

                                                                                                                                              MD5

                                                                                                                                              dbb5b9b8edfda22123ec23d7e3dea987

                                                                                                                                              SHA1

                                                                                                                                              3f3a8935de961f465d6e8c448601a8de8bed3f4d

                                                                                                                                              SHA256

                                                                                                                                              8f5f6263d455cd6c34ecbd291a7ad5aff152fc9d3adf751b4880971f9b29f492

                                                                                                                                              SHA512

                                                                                                                                              014a3723660a6241a4952972b6043511c5461190149a53e1b8f8c5409867c90ebc2f15cc7d84b4ff24a17e6177aacf9232dc75be0801cbcfc8df03c9831cecb4

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe581c7c.TMP

                                                                                                                                              Filesize

                                                                                                                                              48B

                                                                                                                                              MD5

                                                                                                                                              0f7c87cf49a9ec5bf99130e0c5663763

                                                                                                                                              SHA1

                                                                                                                                              874b931966f7d0b7625cdb8bf0ec7ac667773140

                                                                                                                                              SHA256

                                                                                                                                              dfab9a7fbe2b5e6e2621b3ee52469c914304a0ef5802fa143ebe8f1a58cc38d8

                                                                                                                                              SHA512

                                                                                                                                              3b5a9e82edfebdeb87f5f61907bee7797bd229e194a39a9ceb4e0aa1de0fe469cb769e26d0ecc73bbca7a896ec68c04455f4a992a1b9f53284e8f4edd7b478d7

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                                                                              Filesize

                                                                                                                                              4KB

                                                                                                                                              MD5

                                                                                                                                              9556b7c12b241f6b83b56132fdf09b99

                                                                                                                                              SHA1

                                                                                                                                              e03b8f4415dce05c42004753af798c07f2aae90b

                                                                                                                                              SHA256

                                                                                                                                              6667eccb65440d459e9e4f3914d76838f196819f2f4d5110df990bbe9a4c2083

                                                                                                                                              SHA512

                                                                                                                                              a2d4723799daac1d066bb6b1100c71f29595eec78f97f10db1518259c4aad7da84dfd021047483dbb301d0fe418ea5348b2d19180e8851d5585f83205129e9b1

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                                              Filesize

                                                                                                                                              876B

                                                                                                                                              MD5

                                                                                                                                              0cf6e3a1971504b4c7a174419b3308d1

                                                                                                                                              SHA1

                                                                                                                                              b372c87dcbd50cb2b2fc37183ae0e05c6b73f769

                                                                                                                                              SHA256

                                                                                                                                              bc88018ddb0e3843d3694b7ac62dc1d081c7581e3c644a15c13b9f61a1cc9e47

                                                                                                                                              SHA512

                                                                                                                                              b4c02513565e91992fde9220a75e49ab90ae26f817ae0bce7760d61a4f929f7515323e3662a5af14effcf4b59f4ecb1a453b2d97eb7e50f80f83b6ec805dfc35

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                                              Filesize

                                                                                                                                              23KB

                                                                                                                                              MD5

                                                                                                                                              a513f6bb42b7af39f5b83779e5932440

                                                                                                                                              SHA1

                                                                                                                                              9b4583c3fcc53c371d0ffc4ff0b055d79f8ac613

                                                                                                                                              SHA256

                                                                                                                                              6e2124a5c907c04b9d171c495096bfec1494760ce90b3e75583c5a38f7c727fd

                                                                                                                                              SHA512

                                                                                                                                              34708e74c91a48ed98f38d6925096de222321be7a2cc20138c40216e755ca805f0b50a885023c495c53c79c1c61981f5f4273a78d3b281b9e9d1e063995dd6b9

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe589fd5.TMP

                                                                                                                                              Filesize

                                                                                                                                              467B

                                                                                                                                              MD5

                                                                                                                                              f061f2727530649384477fc8369b6954

                                                                                                                                              SHA1

                                                                                                                                              236c907c440a04f07723b73f4fbb49a535d46a6d

                                                                                                                                              SHA256

                                                                                                                                              80ff28c585af8ea1af4a4dd5b2eb4190581cb165c0a09ba8b4a4a071da33b0e8

                                                                                                                                              SHA512

                                                                                                                                              d13d09cd951fe733502cdb87635e192fe53a203006aeddcadfabc03e7b6937ec3c8d62656ec1884d5cedaee13dfb36402b5959faee91dc44d8d1b4c666ead00c

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                                                                                                              Filesize

                                                                                                                                              22KB

                                                                                                                                              MD5

                                                                                                                                              3f8927c365639daa9b2c270898e3cf9d

                                                                                                                                              SHA1

                                                                                                                                              c8da31c97c56671c910d28010f754319f1d90fa6

                                                                                                                                              SHA256

                                                                                                                                              fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2

                                                                                                                                              SHA512

                                                                                                                                              d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe58a0bf.TMP

                                                                                                                                              Filesize

                                                                                                                                              3KB

                                                                                                                                              MD5

                                                                                                                                              47430e0e9ad4838b6b88191b7966810f

                                                                                                                                              SHA1

                                                                                                                                              8933b4ce19e396751f93687305d3d378c48e2e0f

                                                                                                                                              SHA256

                                                                                                                                              98c1f419b9efe0d2a9f4350442d90916bd07593d9ecde4706030d1502cfb90d2

                                                                                                                                              SHA512

                                                                                                                                              e3a4e44240a11ce2173acfe66f6b52bdae8fc9c97dfdca441700ab47b5c73a46b71405da95a2cc08c34507fddf4349923c33da57da244e45b5019b9898e6b65c

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                              Filesize

                                                                                                                                              7KB

                                                                                                                                              MD5

                                                                                                                                              2884779e905a206342f8c9e9f5ddd2c2

                                                                                                                                              SHA1

                                                                                                                                              6354fa17f598220e77684dd296c6d187cc2b9fa4

                                                                                                                                              SHA256

                                                                                                                                              7e88252327e3654e96e1c5b621982cabb3988a81dd642ed3c0fd1398556580ec

                                                                                                                                              SHA512

                                                                                                                                              e166e76ebf0d63713e671ca1a46cdb8bafdd7c6fd2bbe2f8b4c2c0ea90b1e06773e7e463f67705ea4a149cfa7b0d4aabc5e34bb430a1e78f17d9bf968e4fe039

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                              Filesize

                                                                                                                                              30KB

                                                                                                                                              MD5

                                                                                                                                              97ffb979c4a4cb81e7497662a8568356

                                                                                                                                              SHA1

                                                                                                                                              b33da44d83d270363251a7a48338770fe70d260e

                                                                                                                                              SHA256

                                                                                                                                              dff432aef80a1b9784d2c749d19717bc54a0baeaeff1cd0030f8a438ce5065d6

                                                                                                                                              SHA512

                                                                                                                                              ca752a65e5f865376b6be78181de1614d096f9e3a497f0207ff2bcc6176f6770c8892a3d7c70ca008c81c654959a4a5222b9ea128b3e641bc3e320ab82ec1c95

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                              Filesize

                                                                                                                                              34KB

                                                                                                                                              MD5

                                                                                                                                              79272593415d37d218b9936ae0abe978

                                                                                                                                              SHA1

                                                                                                                                              5df54cfe6f224155dac233c6d48badc0a327cd3f

                                                                                                                                              SHA256

                                                                                                                                              b9a4fa2cb460fa33687162f2fff39c7424a6e5c0d6406e4dae441fd92625be7b

                                                                                                                                              SHA512

                                                                                                                                              6af945d3249410bc13e007dbd2768754eeb6c578bf1407691f154c396d510a36f0064d4aca5ddffeacdb879cb0313afc6ccdf607da7188fd16c3fab62e7c66b0

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                              Filesize

                                                                                                                                              6KB

                                                                                                                                              MD5

                                                                                                                                              86f85f806059139b1aa5aad42979624c

                                                                                                                                              SHA1

                                                                                                                                              1e59e22a7242b38bd734e45c4d28831046984a5d

                                                                                                                                              SHA256

                                                                                                                                              7cb3ff79bd7f9bf02a3c33154f03d173d51da11d4e9e7725acd184cca3a14e8d

                                                                                                                                              SHA512

                                                                                                                                              4b0e75a4e295a627e0c8947c8ef8e4ee26a5410c66f79bee600537991b3f1f8ac17d1176f9939f5de07b811d67a0fce3f6e793c415cfc1a9952f166ea7b63513

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                                                              Filesize

                                                                                                                                              392B

                                                                                                                                              MD5

                                                                                                                                              9f9e2683e38c1e746dd7f1ab9baa31f1

                                                                                                                                              SHA1

                                                                                                                                              867e39abb08eb0a62f5b75c5c773d98daf17ee7e

                                                                                                                                              SHA256

                                                                                                                                              86de379804c294db1d278301c9a21267c370c1fad72c7bf5369b5ab544457b76

                                                                                                                                              SHA512

                                                                                                                                              c870ddb8f6a1ee1323546c145710d13815eb847bb90067305cda72e87269207165b6b6dd495da7a39064aab36f28096ae565919a0c0a833f86f61524031727d6

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                                                              Filesize

                                                                                                                                              392B

                                                                                                                                              MD5

                                                                                                                                              00d38620c8a61c890141daebe7797276

                                                                                                                                              SHA1

                                                                                                                                              dff151df9afc3061a81de91f52f4c51d9a3c68e4

                                                                                                                                              SHA256

                                                                                                                                              f1f404799795b3a7ad02d942dc45fc61ce5067445ceaa8f5f215b839311456a3

                                                                                                                                              SHA512

                                                                                                                                              a6eea4850dad2dc66c4ec2a331b1a6811e18b260ab11ec6dbbde1cd4372d0044cad875911a8d03e9d68aa039a07518f68effed43e1ac93e0b8e509506f115bf4

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter~RFe581519.TMP

                                                                                                                                              Filesize

                                                                                                                                              392B

                                                                                                                                              MD5

                                                                                                                                              100577c40c58471571526e1278fa0765

                                                                                                                                              SHA1

                                                                                                                                              91d91b015d3ec88a26928302c71de9e0962a0de7

                                                                                                                                              SHA256

                                                                                                                                              e478cf8527fa7211ac1273a85a23e06116c3c845bc7f401da165a049f0f428d7

                                                                                                                                              SHA512

                                                                                                                                              c8ae8a70ab12851b6fd043be70ce847239a485d76872aaa5417e8a7fe250794b6919c1d2484d57020226c6e51ee356e530d811f22c8a24e00deb7aaf72be7f05

                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                                              Filesize

                                                                                                                                              2KB

                                                                                                                                              MD5

                                                                                                                                              a64ba99d16a573d9ad9c239338ea2368

                                                                                                                                              SHA1

                                                                                                                                              a88a6ff9a3da8171e40309c7dea1cd60c24b9603

                                                                                                                                              SHA256

                                                                                                                                              dcb33be72f896b867d9d9b39e659147c6eb184b37d16d7a6066651036897b300

                                                                                                                                              SHA512

                                                                                                                                              d43ce9f8c060a1fc1c9af658b8b07639c2ad404245dd00d5100d90f5dd4cf5bcb0c5ab3fc6d7a59c253ecc5efd1727260faeae77a3a0a7f2a9e8f2c83cbcb519

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\d5058710-949b-4d35-9650-ff2addf1e72f.tmp

                                                                                                                                              Filesize

                                                                                                                                              1B

                                                                                                                                              MD5

                                                                                                                                              5058f1af8388633f609cadb75a75dc9d

                                                                                                                                              SHA1

                                                                                                                                              3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                              SHA256

                                                                                                                                              cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                              SHA512

                                                                                                                                              0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\e2377051-f450-4581-b1a4-c02fcc01fc1f.tmp

                                                                                                                                              Filesize

                                                                                                                                              10KB

                                                                                                                                              MD5

                                                                                                                                              78e47dda17341bed7be45dccfd89ac87

                                                                                                                                              SHA1

                                                                                                                                              1afde30e46997452d11e4a2adbbf35cce7a1404f

                                                                                                                                              SHA256

                                                                                                                                              67d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550

                                                                                                                                              SHA512

                                                                                                                                              9574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5

                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\scoped_dir3456_357980178\2dd3c8f7-6440-46ab-b613-4da5e647c22f.tmp

                                                                                                                                              Filesize

                                                                                                                                              152KB

                                                                                                                                              MD5

                                                                                                                                              dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                              SHA1

                                                                                                                                              d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                              SHA256

                                                                                                                                              fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                              SHA512

                                                                                                                                              65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                                            • C:\Users\Admin\Downloads\$uckyLocker.exe

                                                                                                                                              Filesize

                                                                                                                                              414KB

                                                                                                                                              MD5

                                                                                                                                              c850f942ccf6e45230169cc4bd9eb5c8

                                                                                                                                              SHA1

                                                                                                                                              51c647e2b150e781bd1910cac4061a2cee1daf89

                                                                                                                                              SHA256

                                                                                                                                              86e0eac8c5ce70c4b839ef18af5231b5f92e292b81e440193cdbdc7ed108049f

                                                                                                                                              SHA512

                                                                                                                                              2b3890241b8c8690aab0aed347daa778aba20f29f76e8b79b02953b6252324317520b91ea60d3ef73e42ad403f7a6e0e3f2a057799f21ed447dae7096b2f47d9

                                                                                                                                            • C:\Users\Admin\Downloads\7ev3n.exe

                                                                                                                                              Filesize

                                                                                                                                              315KB

                                                                                                                                              MD5

                                                                                                                                              9f8bc96c96d43ecb69f883388d228754

                                                                                                                                              SHA1

                                                                                                                                              61ed25a706afa2f6684bb4d64f69c5fb29d20953

                                                                                                                                              SHA256

                                                                                                                                              7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5

                                                                                                                                              SHA512

                                                                                                                                              550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

                                                                                                                                            • C:\Users\Admin\Downloads\Annabelle.exe.crdownload

                                                                                                                                              Filesize

                                                                                                                                              15.9MB

                                                                                                                                              MD5

                                                                                                                                              0f743287c9911b4b1c726c7c7edcaf7d

                                                                                                                                              SHA1

                                                                                                                                              9760579e73095455fcbaddfe1e7e98a2bb28bfe0

                                                                                                                                              SHA256

                                                                                                                                              716335ba5cd1e7186c40295b199190e2b6655e48f1c1cbe12139ba67faa5e1ac

                                                                                                                                              SHA512

                                                                                                                                              2a6dd6288303700ef9cb06ae1efeb1e121c89c97708e5ecd15ed9b2a35d0ecff03d8da58b30daeadad89bd38dc4649521ada149fb457408e5a2bdf1512f88677

                                                                                                                                            • C:\Users\Admin\Downloads\BadRabbit.exe

                                                                                                                                              Filesize

                                                                                                                                              431KB

                                                                                                                                              MD5

                                                                                                                                              fbbdc39af1139aebba4da004475e8839

                                                                                                                                              SHA1

                                                                                                                                              de5c8d858e6e41da715dca1c019df0bfb92d32c0

                                                                                                                                              SHA256

                                                                                                                                              630325cac09ac3fab908f903e3b00d0dadd5fdaa0875ed8496fcbb97a558d0da

                                                                                                                                              SHA512

                                                                                                                                              74eca8c01de215b33d5ceea1fda3f3bef96b513f58a750dba04b0de36f7ef4f7846a6431d52879ca0d8641bfd504d4721a9a96fa2e18c6888fd67fa77686af87

                                                                                                                                            • C:\Users\Admin\Downloads\Birele.exe

                                                                                                                                              Filesize

                                                                                                                                              116KB

                                                                                                                                              MD5

                                                                                                                                              41789c704a0eecfdd0048b4b4193e752

                                                                                                                                              SHA1

                                                                                                                                              fb1e8385691fa3293b7cbfb9b2656cf09f20e722

                                                                                                                                              SHA256

                                                                                                                                              b2dcfdf9e7b09f2aa5004668370e77982963ace820e7285b2e264a294441da23

                                                                                                                                              SHA512

                                                                                                                                              76391ac85fdc3be75441fcd6e19bed08b807d3946c7281c647f16a3be5388f7be307e6323fac8502430a4a6d800d52a88709592a49011ecc89de4f19102435ea

                                                                                                                                            • C:\Users\Admin\Downloads\Cerber5.exe

                                                                                                                                              Filesize

                                                                                                                                              313KB

                                                                                                                                              MD5

                                                                                                                                              fe1bc60a95b2c2d77cd5d232296a7fa4

                                                                                                                                              SHA1

                                                                                                                                              c07dfdea8da2da5bad036e7c2f5d37582e1cf684

                                                                                                                                              SHA256

                                                                                                                                              b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d

                                                                                                                                              SHA512

                                                                                                                                              266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

                                                                                                                                            • C:\Users\Admin\Downloads\CoronaVirus.exe

                                                                                                                                              Filesize

                                                                                                                                              1.0MB

                                                                                                                                              MD5

                                                                                                                                              055d1462f66a350d9886542d4d79bc2b

                                                                                                                                              SHA1

                                                                                                                                              f1086d2f667d807dbb1aa362a7a809ea119f2565

                                                                                                                                              SHA256

                                                                                                                                              dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0

                                                                                                                                              SHA512

                                                                                                                                              2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1

                                                                                                                                            • C:\Users\Admin\Downloads\CryptoLocker.exe

                                                                                                                                              Filesize

                                                                                                                                              338KB

                                                                                                                                              MD5

                                                                                                                                              04fb36199787f2e3e2135611a38321eb

                                                                                                                                              SHA1

                                                                                                                                              65559245709fe98052eb284577f1fd61c01ad20d

                                                                                                                                              SHA256

                                                                                                                                              d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9

                                                                                                                                              SHA512

                                                                                                                                              533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444

                                                                                                                                            • C:\Users\Admin\Downloads\InfinityCrypt.exe

                                                                                                                                              Filesize

                                                                                                                                              211KB

                                                                                                                                              MD5

                                                                                                                                              b805db8f6a84475ef76b795b0d1ed6ae

                                                                                                                                              SHA1

                                                                                                                                              7711cb4873e58b7adcf2a2b047b090e78d10c75b

                                                                                                                                              SHA256

                                                                                                                                              f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

                                                                                                                                              SHA512

                                                                                                                                              62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

                                                                                                                                            • memory/2804-1887-0x0000023065B10000-0x0000023066B04000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              16.0MB

                                                                                                                                            • memory/2804-2207-0x00000230691D0000-0x000002306A75E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              21.6MB

                                                                                                                                            • memory/2992-1879-0x0000000000E00000-0x0000000000E3C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              240KB

                                                                                                                                            • memory/2992-1891-0x00000000056E0000-0x00000000056EA000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              40KB

                                                                                                                                            • memory/2992-1892-0x00000000059D0000-0x0000000005A26000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              344KB

                                                                                                                                            • memory/2992-1880-0x00000000056F0000-0x000000000578C000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              624KB

                                                                                                                                            • memory/3048-1952-0x00000000021C0000-0x0000000002228000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              416KB

                                                                                                                                            • memory/3048-1888-0x00000000021C0000-0x0000000002228000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              416KB

                                                                                                                                            • memory/3048-1898-0x00000000021C0000-0x0000000002228000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              416KB

                                                                                                                                            • memory/3532-1886-0x00000000051F0000-0x0000000005282000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              584KB

                                                                                                                                            • memory/3532-1885-0x0000000005700000-0x0000000005CA4000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              5.6MB

                                                                                                                                            • memory/3532-1883-0x00000000008D0000-0x000000000093E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              440KB

                                                                                                                                            • memory/4104-6587-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.4MB

                                                                                                                                            • memory/4104-3314-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.4MB

                                                                                                                                            • memory/4104-1877-0x0000000000400000-0x000000000056F000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              1.4MB

                                                                                                                                            • memory/5756-2170-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              224KB

                                                                                                                                            • memory/5756-1873-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              224KB

                                                                                                                                            • memory/5756-1868-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              224KB

                                                                                                                                            • memory/5996-2185-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              204KB

                                                                                                                                            • memory/5996-22388-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              204KB

                                                                                                                                            • memory/5996-32362-0x0000000000440000-0x000000000044E000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              56KB

                                                                                                                                            • memory/6340-2390-0x0000000000400000-0x0000000000438000-memory.dmp

                                                                                                                                              Filesize

                                                                                                                                              224KB