Analysis

  • max time kernel
    121s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2023 14:32

General

  • Target

    chr.exe

  • Size

    66KB

  • MD5

    50b2b692da0c363e301709a28b30afaf

  • SHA1

    098e00413ba405bcc72b71a5869c2d151e93448a

  • SHA256

    d25339ece508876c8900d27721f042391a4cc2769805afa377556a416a192c49

  • SHA512

    d463babcae95c3c200af5ae59aa5f89e2edeb267bb15e843f8a241e17794db1672067cba421ba38cda4e161151d93e5eb2e3bb06cd5ce6bc98d651ebf58f06ce

  • SSDEEP

    1536:UJOjk0yzcRvVSfD8tzsy/jV49Gko0S/aATWJvQ3MJea9yn90+x:UJ70yK4D6P+YxpABJD9F+x

Malware Config

Extracted

Family

xworm

Version

5.0

C2

162.212.154.8:41589

Mutex

1fGBFdYzxtDnKgy4

Attributes
  • Install_directory

    %AppData%

  • install_file

    OneDrive.exe

  • telegram

    https://api.telegram.org/bot6875063177:AAG1OPJLZ36MPY8oqR1DVb1VHR2wOmnCudg/sendMessage?chat_id=2136313574

aes.plain

Extracted

Family

limerat

Attributes
  • aes_key

    devil

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/rPy10VvM

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Windows Session Manager.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \Windows\

  • usb_spread

    false

Signatures

  • Detect Xworm Payload 4 IoCs
  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\chr.exe
    "C:\Users\Admin\AppData\Local\Temp\chr.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\one.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2676
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /F /TN "one" /SC ONLOGON /TR "C:\Windows\System32\one.exe" /RL HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:2892
    • C:\Windows\System32\one.exe
      "C:\Windows\System32\one.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\one.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2532
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'one.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:388
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\OneDrive.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2796
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'OneDrive.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2908
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\ses.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /F /TN "ses" /SC ONLOGON /TR "C:\Windows\System32\ses.exe" /RL HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:1992
    • C:\Windows\System32\ses.exe
      "C:\Windows\System32\ses.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=ses.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1604 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    89fe2364dede6aa6f6681e326402b68a

    SHA1

    d4042afc9197bba969eb03d65d7388b0859aa5e7

    SHA256

    7f9e67760172650aada1eccc4a5ceea1294a874de1658000b25117beccdb5600

    SHA512

    ae964ca726f3eb300048ebe491a96cbb29ff08814b8c808e60db7792b882ea717a42778f978785489323a235000106cf45dfb7222596f89552511eeb3071f867

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64483ae6f2577101e582e55fd92b5a83

    SHA1

    ede74248e52973bc286f5b125b5f0f52bf9fee9e

    SHA256

    92c301b16ed357983f0ba1ee550280a96265011505935fe8ac629ebbba4fddde

    SHA512

    6cf16121694b70661c31b2e1fd85037cc41b7c0ccbcea5b953efce57961de14ecae5d1032f5044079c800d7edc1235067cb914b96a6fa4c991eb6ec9b657ad5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7d9a01db3e3126b384ac406e034a98f

    SHA1

    4674dc60eab2cd79704b3f78afc5dc5e159d6df9

    SHA256

    620502e16ed3c5249bbe7c2269a9fb43ac16f32709585ba378ec053ccc0382bc

    SHA512

    ae43b464a51c6d74e25ca4cf7717917891ab0ef79ca1fc7298bb44cb1fb07f0d5f43c5672f886ea59b578dcf7320eeefa3a5535867d3496b8813711a5f85479f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9351e322522a8a16bfbbe2fbab33d469

    SHA1

    3d1f31efce8c112374bdeced25900426aad8f870

    SHA256

    cd1ff60e333878eedadae20d279a10c05709a8413eb32672494aac26518028d7

    SHA512

    57c08de23ac2d2eda80f3d7757cca50c1c845d55746975027eb1709825e4425bd04ca77cb111eb84653dcf8d3995a0eeff7a2a7135d43266671eea09d7db12e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4eb4375a793fe8108f2bea97b46a3eaa

    SHA1

    fcc5d9f2fbc62bb60971799f4799ebe09db591f5

    SHA256

    919d6342cadd7a8b51dab56b21c93c0ff0d3e5e1fb1b5e9073ad1f29757a9e5b

    SHA512

    e4fcf3a7be3e0492018039fe7182f0853908dc2b31b5a97c60e79cb6aea56536faf2a993afd89a973a86784327f396ff39a9ee121745ed5d718630b11b63b5e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9afeacd1848fb276a90660787a6252a9

    SHA1

    34a454b2b490edba04b76fb721ecac01d1135905

    SHA256

    5cfbad3cc040f90dbac80ed4239bf86832bfc92b7684b1922c4b0c5e7093c983

    SHA512

    d5d7ff33e77e7fe179d2ade96e66abc589325dcff741a2efc26077b34e5835af86236d2f81886eb1f910d02a95e87f5e0c128fba2434ec386b58220dbc15bfae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9eb7d360ab3ea1b6088cac8cd14cf772

    SHA1

    a2e14ecd2ce89b94a5ad11cac116d24176aef680

    SHA256

    437908968d288853197344305a49913b9c1f9215b43217a4bcb4c5c751fec111

    SHA512

    0fce19e51eaad1b7b97db6dc974b32f930d2ba9044f02f569c6b170cdb457774ad03d9ee36f6e9e5d7a3e59ef7e5f0d6f5da448be9d09e4a306ad9ee4b4c9ef5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    90cdd30c8f8198b9518035787efb0670

    SHA1

    7cb92d16146f4e2a9d2d5d9ae4ccd4a2925bb46b

    SHA256

    8ce2a6445e4a5d19ff4e7a7b7915d01e36f95582250513fefb7ed600a3614243

    SHA512

    76bd792bcea38aafe524e3f1fbc2b642843168ea180e71a84b2cc274ae531a562e8f70a0cf653ab933c4c313c33c8b8b84d367751869ea0018698eef653298d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9e5ff76f7358eb664d6c3a2b7ec63561

    SHA1

    7e8a0a4b2586c26a6bca25fcd0f9335eed80f91c

    SHA256

    36a7f88a439fde36538fae475abd8976efc99405c29c0c1e2ea3c577a5e8fe7e

    SHA512

    dd698402040a26c880a76562a5d65caa8a9722eff835b225f4a3885e4a916008d80ffe9368cedd4ad0ee6c3d241e7f72bf31d60e1a21ab94b403f38a2146380c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36d25a450daf9a09a63f48a4d9e86c95

    SHA1

    4423d7dffc662b6cc70f0e08bb8d47038181d7d5

    SHA256

    82de91788a83198a031b8974db7baa3f4f930c23d9f045c29c479ab2d647e4f5

    SHA512

    77177844f44662387c81c0d03e1c7a1876b85f109e251b501f6a1a7510ed58dd4de4e3de07dac78d7f6db29f44c6f984cca4fe90090c7ed55676408220b4801c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d89a2fcd401a9d17df34fa837e0d4b78

    SHA1

    27bca6878d6512ffcdc5bc3e9464f2719f8ddbd4

    SHA256

    f6c95f3971ae9ff589ebd41052e1bb31f11d1138e11be7d25337592dd0b58ad2

    SHA512

    591b9e4542263babfc23da56591aaf46081c1c62568679f04526788efb19a481c4316d9caa62f75c635007b1c071249a22bb792bbc82427f9e9c8b88f8cc1ded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3b464426bfc939cdff2493de706650d2

    SHA1

    db5f2ee69fc400fc3b3cebd9433748e95a454e8e

    SHA256

    91054910ee5ecea6a3056c8ca3450100be106d4821170c38663187b37bb690f9

    SHA512

    24d5989bf7a62cae29809ac7c419cb83843fff02b84885d881ad7afaa31018740f573e737aedd827c13dab538c1a5e789ce58ab4506ba010efe03badc354495b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94fc820dde7e7fe611b76593ff8ba474

    SHA1

    f44756d472778d2a71ab2c51a0d848074b47e80b

    SHA256

    3cd87be8c81583c7c0dff40c7e2ba3673753e5ea96bb049d2c70e91dfec4b0d9

    SHA512

    cba834d7862e8c632eab297c34ab31c78f22b8fbebd6133c212f03cdce524ee152b6cb5ced9e395fc70deab8d7eb0275d0590454e9ca0dcd026e310b8763e283

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3b7108a016fb7ae0f0ab9a1e8159776

    SHA1

    8b64365131ef33fa4e6168f675e796e8a66300ca

    SHA256

    e23e2df847b9dab81e963d8d75ebc7426192230d952fa58452e333bc5027ab7a

    SHA512

    5751ab595a1ef87dc4a1ed0e8e654be630f77e0b32e9fcbfcdaf904befc055aee3fbf4f6a6d8753a391d7788a681ad1a771a744ddd7f8f8af53a9894537939de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82a30ba4abc287e41284feec288b6211

    SHA1

    28cb8805b7fa974f883c8285038b517f33db502b

    SHA256

    9b23994d77230a66be29af9cdf4c2f23c52414d6da69abb43ccbe3752678d028

    SHA512

    5c670f52205956803126b05744ef3beff34793cbbfed5be09ed41ba04dd3e5c936d8fb1cab9535beefbb462dca08175bc0188492428ea8d9b67d06e624fb5a34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fdc44fbfbe5a55ee0bf07c5a259a98d9

    SHA1

    e166e5ce073d7ad3a9ee74ae0ad4fdc8b0750429

    SHA256

    f439e539674bda60b2f6b059309be827f179f65dfb721f2442d0f8088d19ea58

    SHA512

    f1eec66f3474fcd811d7795e64eee63cd2c6653a96a6b393dfb1da6d315c729e6271c590e4c7e255b2c1b006009a118915392008dacda0494c4801b9be27be5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    72e0272e0b36406461ea861719d66bb7

    SHA1

    024012eef46a94682882a9683211ef46087b2b3b

    SHA256

    475604f5bdb66cf10ee715240d3dea47cb6c5a5a582fdaa74e8036329b29a588

    SHA512

    0c77d3d757c9c37514227a5fe73d26931839ff953e56b3a37a2e019c4ecfb426768ce62f433018f1b52fe4ed5d46f924ee625f0802a578c2be126fc90f583b0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5124aaf686f74ee87e0c65e19e216064

    SHA1

    aadcaa180af945b983adb78f1f0a1d2fe9690199

    SHA256

    aef7eee84e815ac29eee38f542af595a38be4a9a915aa6a1888828f9691d20e6

    SHA512

    436e4434066ef40a98c5bf251dd2894fd5edbdf81eef77607c57c3331547104917c2e8f6f3954de25763ecb82859d2e358740d7685838d7062b3e7b1cc4c1a6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d14afc2cc307f8bbbe5244e14fc1d815

    SHA1

    86bb5acad921e6fe897487eef4884d70febcbb22

    SHA256

    f7b153f578b3215195936a8249b0f1bde75f9d7cf61fce492b4a4fc0276b71b1

    SHA512

    25e912c487b9dba8dc5f96f7d3fa1015b9fda424bc073c13870c81e5fe79d902f33f948537a367facbd19074bb36e2043f892887ccd30b1d2739435989235ba9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82f53229a21125a419832bb6de42f704

    SHA1

    669054a77d3b78c0540826775173ebbb40b4981a

    SHA256

    59d3f56ec44295eb1a979ff307cfa69c4a14349aac835b0d8fe2873265f3a680

    SHA512

    7495b369879729e736a298e0e6df52c01b8ef409b265d9b43f0109a0497dd5d8bc28082f822e6b1bf3ead35315f6e170939a741ed455494eacff5f65e7ff085a

  • C:\Users\Admin\AppData\Local\Temp\CabA91E.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarA98E.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16GZ97OHBV57QK1SI154.temp

    Filesize

    7KB

    MD5

    2865247c195e950717e36d5014ad1f7d

    SHA1

    f3c1e96d2411eb1987470c85ba40cd0d3768a915

    SHA256

    9cc3ac5a3f94b2f4f60003cda02da13180b7894add52c66042e850a209d95941

    SHA512

    7169cfd4a69cccc135212bd650347d2b7504f44f1aa6436876c07fb34390ff01fa0d62cd902694bbd7c2d344c6766de37dbe365df1fd60c047493a4414199875

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    abe67404a205a3947eac6b3df536c669

    SHA1

    134246eacfb03eb88d41e0e3755397cc8999c20b

    SHA256

    045cf9d33f31234e896b319d2d03c6e082abe51f6afed3a11800395f95d2200e

    SHA512

    445e72c3bcf4711d80961d217aabbbb488b2be52a09ca9b020cff7120a866438f944e780264e468c16bd2b4d10c790ac73f16febaf06ad35fa7a01423f6e0b7d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    abe67404a205a3947eac6b3df536c669

    SHA1

    134246eacfb03eb88d41e0e3755397cc8999c20b

    SHA256

    045cf9d33f31234e896b319d2d03c6e082abe51f6afed3a11800395f95d2200e

    SHA512

    445e72c3bcf4711d80961d217aabbbb488b2be52a09ca9b020cff7120a866438f944e780264e468c16bd2b4d10c790ac73f16febaf06ad35fa7a01423f6e0b7d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    d03dc56ed03a30722cde63b8d73562ca

    SHA1

    610c71e9ce0a440899c10215e095738b26f2ff77

    SHA256

    30d5e291299197f6e7f5542ec104dbe6b6ff3a5ccf89b81aa15a503fc3c6065e

    SHA512

    5132d7c10e17f0ab060545112284859026df00c4aec663774e3f3cedf75683cb5ad99ea0474a6ea89bf4606dae2c0dc4a4812803f4243c2b187b497af06f5dad

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    2865247c195e950717e36d5014ad1f7d

    SHA1

    f3c1e96d2411eb1987470c85ba40cd0d3768a915

    SHA256

    9cc3ac5a3f94b2f4f60003cda02da13180b7894add52c66042e850a209d95941

    SHA512

    7169cfd4a69cccc135212bd650347d2b7504f44f1aa6436876c07fb34390ff01fa0d62cd902694bbd7c2d344c6766de37dbe365df1fd60c047493a4414199875

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    2865247c195e950717e36d5014ad1f7d

    SHA1

    f3c1e96d2411eb1987470c85ba40cd0d3768a915

    SHA256

    9cc3ac5a3f94b2f4f60003cda02da13180b7894add52c66042e850a209d95941

    SHA512

    7169cfd4a69cccc135212bd650347d2b7504f44f1aa6436876c07fb34390ff01fa0d62cd902694bbd7c2d344c6766de37dbe365df1fd60c047493a4414199875

  • C:\Users\Admin\AppData\Roaming\OneDrive.exe

    Filesize

    142KB

    MD5

    2f2fed589cef6c6973db3dd854a6ba13

    SHA1

    6a121feaa70814260efcc50a0b48696cd0cf570e

    SHA256

    1d77e69e717573061d58bb385dfe760cbbfbb205a9e1c1ea3428a25ac7319c36

    SHA512

    c8d942892f514afbd5a8f888897b31e6e4d4c2e2d155bf1561dfba03ff382a5c12e810f5bb2cd9ff461524f4dd4012e85363537568ca7b36ad51c2bd4d95aade

  • C:\Windows\System32\one.exe

    Filesize

    142KB

    MD5

    2f2fed589cef6c6973db3dd854a6ba13

    SHA1

    6a121feaa70814260efcc50a0b48696cd0cf570e

    SHA256

    1d77e69e717573061d58bb385dfe760cbbfbb205a9e1c1ea3428a25ac7319c36

    SHA512

    c8d942892f514afbd5a8f888897b31e6e4d4c2e2d155bf1561dfba03ff382a5c12e810f5bb2cd9ff461524f4dd4012e85363537568ca7b36ad51c2bd4d95aade

  • C:\Windows\System32\one.exe

    Filesize

    142KB

    MD5

    2f2fed589cef6c6973db3dd854a6ba13

    SHA1

    6a121feaa70814260efcc50a0b48696cd0cf570e

    SHA256

    1d77e69e717573061d58bb385dfe760cbbfbb205a9e1c1ea3428a25ac7319c36

    SHA512

    c8d942892f514afbd5a8f888897b31e6e4d4c2e2d155bf1561dfba03ff382a5c12e810f5bb2cd9ff461524f4dd4012e85363537568ca7b36ad51c2bd4d95aade

  • C:\Windows\System32\ses.exe

    Filesize

    28KB

    MD5

    ab9502a920271fd1cf060f388a45fcd0

    SHA1

    c7292f1d76eae037d3ea5dbbc171eee21bc944d8

    SHA256

    e0fb281db34b9fa35971cb1af42175d6b5650c46f261771361a1aeed70565787

    SHA512

    7fcf30539e0cf74d4f27904c4205d0d8fd209ffec2ca97fdd1277c3096e1dc8c910ce239b7bd622d4275d4ea24f5be2ca0ae6a3a2687e492fd7774712c620452

  • C:\Windows\System32\ses.exe

    Filesize

    28KB

    MD5

    ab9502a920271fd1cf060f388a45fcd0

    SHA1

    c7292f1d76eae037d3ea5dbbc171eee21bc944d8

    SHA256

    e0fb281db34b9fa35971cb1af42175d6b5650c46f261771361a1aeed70565787

    SHA512

    7fcf30539e0cf74d4f27904c4205d0d8fd209ffec2ca97fdd1277c3096e1dc8c910ce239b7bd622d4275d4ea24f5be2ca0ae6a3a2687e492fd7774712c620452

  • \??\PIPE\srvsvc

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • memory/388-66-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/388-69-0x0000000002650000-0x00000000026D0000-memory.dmp

    Filesize

    512KB

  • memory/388-72-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/388-71-0x0000000002650000-0x00000000026D0000-memory.dmp

    Filesize

    512KB

  • memory/388-68-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/388-65-0x0000000002510000-0x0000000002518000-memory.dmp

    Filesize

    32KB

  • memory/388-70-0x0000000002650000-0x00000000026D0000-memory.dmp

    Filesize

    512KB

  • memory/388-64-0x000000001B3B0000-0x000000001B692000-memory.dmp

    Filesize

    2.9MB

  • memory/388-67-0x0000000002650000-0x00000000026D0000-memory.dmp

    Filesize

    512KB

  • memory/2532-46-0x00000000025A4000-0x00000000025A7000-memory.dmp

    Filesize

    12KB

  • memory/2532-50-0x000007FEED800000-0x000007FEEE19D000-memory.dmp

    Filesize

    9.6MB

  • memory/2532-42-0x000007FEED800000-0x000007FEEE19D000-memory.dmp

    Filesize

    9.6MB

  • memory/2532-43-0x00000000025A0000-0x0000000002620000-memory.dmp

    Filesize

    512KB

  • memory/2532-47-0x000007FEED800000-0x000007FEEE19D000-memory.dmp

    Filesize

    9.6MB

  • memory/2532-48-0x00000000025AB000-0x0000000002612000-memory.dmp

    Filesize

    412KB

  • memory/2532-49-0x00000000025A0000-0x0000000002620000-memory.dmp

    Filesize

    512KB

  • memory/2608-107-0x000000001B3C0000-0x000000001B440000-memory.dmp

    Filesize

    512KB

  • memory/2608-22-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2608-21-0x00000000003A0000-0x00000000003C8000-memory.dmp

    Filesize

    160KB

  • memory/2608-536-0x000000001B3C0000-0x000000001B440000-memory.dmp

    Filesize

    512KB

  • memory/2608-86-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2676-8-0x0000000001E60000-0x0000000001E68000-memory.dmp

    Filesize

    32KB

  • memory/2676-14-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/2676-13-0x00000000026B0000-0x0000000002730000-memory.dmp

    Filesize

    512KB

  • memory/2676-12-0x00000000026B0000-0x0000000002730000-memory.dmp

    Filesize

    512KB

  • memory/2676-11-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/2676-10-0x00000000026B0000-0x0000000002730000-memory.dmp

    Filesize

    512KB

  • memory/2676-9-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/2676-7-0x000000001B260000-0x000000001B542000-memory.dmp

    Filesize

    2.9MB

  • memory/2736-36-0x000007FEED800000-0x000007FEEE19D000-memory.dmp

    Filesize

    9.6MB

  • memory/2736-35-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/2736-28-0x000000001B1B0000-0x000000001B492000-memory.dmp

    Filesize

    2.9MB

  • memory/2736-29-0x000007FEED800000-0x000007FEEE19D000-memory.dmp

    Filesize

    9.6MB

  • memory/2736-31-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/2736-30-0x00000000023B0000-0x00000000023B8000-memory.dmp

    Filesize

    32KB

  • memory/2736-32-0x000007FEED800000-0x000007FEEE19D000-memory.dmp

    Filesize

    9.6MB

  • memory/2736-33-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/2736-34-0x0000000002750000-0x00000000027D0000-memory.dmp

    Filesize

    512KB

  • memory/2796-84-0x00000000029D0000-0x0000000002A50000-memory.dmp

    Filesize

    512KB

  • memory/2796-83-0x00000000029D0000-0x0000000002A50000-memory.dmp

    Filesize

    512KB

  • memory/2796-82-0x0000000001DF0000-0x0000000001DF8000-memory.dmp

    Filesize

    32KB

  • memory/2796-81-0x00000000029D0000-0x0000000002A50000-memory.dmp

    Filesize

    512KB

  • memory/2796-85-0x000007FEF15F0000-0x000007FEF1F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2796-79-0x000000001B1B0000-0x000000001B492000-memory.dmp

    Filesize

    2.9MB

  • memory/2796-87-0x00000000029D0000-0x0000000002A50000-memory.dmp

    Filesize

    512KB

  • memory/2796-88-0x000007FEF15F0000-0x000007FEF1F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2796-80-0x000007FEF15F0000-0x000007FEF1F8D000-memory.dmp

    Filesize

    9.6MB

  • memory/2908-97-0x000000001B110000-0x000000001B3F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2908-105-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/2908-104-0x00000000024C0000-0x0000000002540000-memory.dmp

    Filesize

    512KB

  • memory/2908-102-0x00000000024C0000-0x0000000002540000-memory.dmp

    Filesize

    512KB

  • memory/2908-101-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/2908-100-0x00000000024C0000-0x0000000002540000-memory.dmp

    Filesize

    512KB

  • memory/2908-99-0x000007FEEE1A0000-0x000007FEEEB3D000-memory.dmp

    Filesize

    9.6MB

  • memory/2908-98-0x0000000002300000-0x0000000002308000-memory.dmp

    Filesize

    32KB

  • memory/2944-51-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-0-0x0000000000DD0000-0x0000000000DE6000-memory.dmp

    Filesize

    88KB

  • memory/2944-58-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2944-2-0x000000001B880000-0x000000001B900000-memory.dmp

    Filesize

    512KB

  • memory/2944-1-0x000007FEF5260000-0x000007FEF5C4C000-memory.dmp

    Filesize

    9.9MB