Analysis

  • max time kernel
    122s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2023 14:33

General

  • Target

    chr.exe

  • Size

    66KB

  • MD5

    50b2b692da0c363e301709a28b30afaf

  • SHA1

    098e00413ba405bcc72b71a5869c2d151e93448a

  • SHA256

    d25339ece508876c8900d27721f042391a4cc2769805afa377556a416a192c49

  • SHA512

    d463babcae95c3c200af5ae59aa5f89e2edeb267bb15e843f8a241e17794db1672067cba421ba38cda4e161151d93e5eb2e3bb06cd5ce6bc98d651ebf58f06ce

  • SSDEEP

    1536:UJOjk0yzcRvVSfD8tzsy/jV49Gko0S/aATWJvQ3MJea9yn90+x:UJ70yK4D6P+YxpABJD9F+x

Malware Config

Extracted

Family

xworm

Version

5.0

C2

162.212.154.8:41589

Mutex

1fGBFdYzxtDnKgy4

Attributes
  • Install_directory

    %AppData%

  • install_file

    OneDrive.exe

  • telegram

    https://api.telegram.org/bot6875063177:AAG1OPJLZ36MPY8oqR1DVb1VHR2wOmnCudg/sendMessage?chat_id=2136313574

aes.plain

Extracted

Family

limerat

Attributes
  • aes_key

    devil

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/rPy10VvM

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    Windows Session Manager.exe

  • main_folder

    AppData

  • pin_spread

    false

  • sub_folder

    \Windows\

  • usb_spread

    false

Signatures

  • Detect Xworm Payload 4 IoCs
  • LimeRAT

    Simple yet powerful RAT for Windows machines written in .NET.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\chr.exe
    "C:\Users\Admin\AppData\Local\Temp\chr.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\one.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2724
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /F /TN "one" /SC ONLOGON /TR "C:\Windows\System32\one.exe" /RL HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:2828
    • C:\Windows\System32\one.exe
      "C:\Windows\System32\one.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\one.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'one.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3000
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\OneDrive.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1832
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'OneDrive.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1060
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\System32\ses.exe'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2760
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /F /TN "ses" /SC ONLOGON /TR "C:\Windows\System32\ses.exe" /RL HIGHEST
      2⤵
      • Creates scheduled task(s)
      PID:3020
    • C:\Windows\System32\ses.exe
      "C:\Windows\System32\ses.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=ses.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fbeaf380cb94b0d54b042cc3ea23702c

    SHA1

    a9374afa01bf47d4362b049d3a919614f063d71d

    SHA256

    d2048a863779e1f3213256a6bd4d2a356f147aab0049fb8f466752e4408fefd4

    SHA512

    c6246f2b641af66b14b8110b8a2a7c71330093682f43400a436d3b7cca5009dbe1018db3bdb2e06813b94f6240eb3f837e66c79c7cba1ab1d34a54167ded8b02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1b2d627b23955ca85762e09efad1cd01

    SHA1

    cd3a3f136329c51d71d12c25f1c550b38d112aa1

    SHA256

    5ebb3d913e606c0495e5f963fb69200026498bb5e417b4a7ea81bfae0813053a

    SHA512

    25bc0d03cd1d3ab7a0aa86242572054fd40fdbc61c7c6b80e594e61bc95a13198cbff180422d8383c64096afbadfe6d101ad601a63c2cca3c2a54b0206b7a568

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78e7cc5f90a0847aa3f348dc0741106d

    SHA1

    cd4083a3bd948df616efc45b813d0ac4b1651530

    SHA256

    c65c8542a571d7cb9209429cc2a0fd5214e1e0f3b4409812855f65b599b2e0c3

    SHA512

    eb41a8c15de4f197c7f40b39c8683077f278b7c38a9cd8aa6fd136b2e60f82775b230ad2d45d8042ff46e5590dd1c3a056c3559d94ac1431dd12122eb6e84b19

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac6eb9002fdd1e541474d2a1ef07a02d

    SHA1

    52ade788eef15a3291eddeeef002df8ddc3dc886

    SHA256

    433e996e11008342fda57b5ed78a5b018a22af497b27ca1e843f38263d815d9e

    SHA512

    aa39a6a90392fd676238986eb537028bcd19f67bc45c9ec5120fe2172dc984ad4132348b30f22b39ec6eb2683336001c6a18330e6304b7a2c1297cfa2a39baa0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6e5445c9f7bd8d59e46c2c371a4c1172

    SHA1

    6034e05033d0bbd4dc61b76acee45ac52ba33add

    SHA256

    6be281fb879b1700d8356129196781cf096af58145087746f3dc126ada08e76d

    SHA512

    dee32e39459653eed2109188b9ae947356b67cc63ceea5c8fffd01aafc1c2c23860c350ee15dc96183301a81b17de785d27aea44c84cfa471f618e1bfc68f9fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6682d19db6ce58cdc851ecf8a01702f

    SHA1

    e2ed509f92a2ba2b66e5629ab72d8a22d9c2dda5

    SHA256

    bc7d4d0a2967d9ed1ca431589989f9eb9e9bbda481e56a135dca49dfc95d6aee

    SHA512

    03e9035e8566403870cc24c13b13657973a5e909430c0b26290ac70a177f60d2acf08db9f874aa60c30596042f85137ed9a0b58422726ec147d5d75a2f60ccc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8533970c6384ed0ab9f95a1cb475e9fd

    SHA1

    9739c55a44b4eef24901984941b2b2cd5d5aba9b

    SHA256

    d9728d5edb446862878d6938cef9f5afb189b37d0781455c35443c725f6d81c0

    SHA512

    9bc3ba8a1a0f85f2d51bb78fe0ff08b369043292a386696fb363edcff878f3ca73a8b2f314525cef1bdf965644799176d6f395d7fb38bd05e25fc5f03e00f3a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3dafc95563f16e338211c456a73d0830

    SHA1

    7652d7d112eb5a557fee9ad74adbf766d920d6f6

    SHA256

    0814b89a1804985e44e22031098c98db272fc09b55c656b507f8708534359b72

    SHA512

    5c7adc9b2f96ff13dbaee03424847e5cebc9e1df37a073bb94c2d278f308a406990d0f5d3db9d034b7d0b2c5ee7b00ca275ba9f240d86c45400a3b1932aad497

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9441023b23620b89830f513eb4ffdb14

    SHA1

    7583e0689cc00b6ccc0f78861fce9d9c48c49b78

    SHA256

    564c44add929516edea6d6a19f17f9e3993cc867325893c62ebc5c53dbd7d334

    SHA512

    0a2cc66eb7bd4d248613f0a50f966b8f59dc8e4cba3bf964535fff0fac30a4c48ccfaa6b6b5a379460d60f4f83a4e14a25bbc879f0db7e462dbe09742408c89e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    20e5848a4c01f3d3e95ba15b63351914

    SHA1

    b854d9e2fa0e0d94568769203a7f6727a5d02895

    SHA256

    8d6580d36df3753fd7690f3321c2d0cd6a36b57c52d0ca689a7c5526699a3ad2

    SHA512

    c7b06af95c2a1557b0bc4aa17770371120f008b7927d5c136341dc6fc4e8198ed22529728a90c0ded3e57a5f46b40e981c3375e8d0bce55ebdb771f3713aef68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3c7b5175beb8443c6c1e4cbe5856119

    SHA1

    00eb69426d3743748a49b8fedd2e4a284a65873c

    SHA256

    8bbb5851f1f2e09f197997c3bd10728b3777333f8a780770c407ef0046807363

    SHA512

    1c5b8f8bc8278b14c8715fd1fbdd24ab9c389fb809f50bb40b3cf0a208eabb303d718dd2559406210471f47691bca664724aad87f979e144ad8ad76d10e3085f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    99f5c47c121a3d82025e3d2e76459092

    SHA1

    250b2b8fc0160e3ee3b607ef788e5785676b7706

    SHA256

    458b3193a708890c0a93784a371cd314cead3d89abe9930d99e0d04ff5b0ff9d

    SHA512

    e971e240241000c46c79976307269700f567995826f6a81c14830df34842257cf9f0d3d66e25c72587c9cb525d0d641a630320e15f9cdb47d8cb52b946f69dc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6bf9a7e1faefb396e3336415bcce15b1

    SHA1

    6c7f67675503a6b4a839d06718b2a63b38888ca9

    SHA256

    e1cdc3a3202caab02b167b50096d41d5acdd2595c08a2d617cde4bd5fd8b8947

    SHA512

    3e30d2c325d45b903779ffe804074f86b0d984d8d57fc5c1e9f5244c13dfa3815917b88e4e31348aaddf9ee8772aa06ba3840d38dc84a1e77d0ad162680f2d72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    70abf70617a1f6872b99750dc121d469

    SHA1

    cd76358b64cf9232dcc9fee0874d487f43a40e8a

    SHA256

    3e3c11c89aa8376faa377f16bac85833f04cbda821b0ed7798af1a7a8409e08b

    SHA512

    07f57d85db2065d08299e1bdfe912f2d89789050ddd86b3a102b6f7c668a10795baf3721f16801428cb3147e83edf1d214a024d4744aded8eeacd86e49f21ec1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad7f1d09fc389d9aed02318e65105aba

    SHA1

    a8a2df2d9545795bd8878e1c0baf40eb955068cc

    SHA256

    edad6e5244589b34918bab3f27bcba0f9f5883b1cb828da86cc7ae80dd0d57ae

    SHA512

    c8ce8f7df6df6515380801842c10ea9ee47e834ea7deaa8bc0b2ad15a7073662232ef36e066397595fa358588d490ad70c6b9d79033b24de7f3450193c6ec1a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e932335fcb92fe6bbbb178107e8e0e5

    SHA1

    85c743169ca79c563a09fcc66dd42373a4b63b01

    SHA256

    29b1b2e00f903f946e6b3e67f9a44cfa8d0b0a0988d7db807776616b7d366505

    SHA512

    9a2a73d5c15cfd56a9e267f7774f08a9ec29776f2b6838874c81697bd501a20799a64ef4abb53670b668432a10fbe3ae4ccdb43b3dfd4a7e8cd7d1d48bd96757

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bec1e9b52309e40458d6a6ae0015bf28

    SHA1

    e2aea9d164f2ebe496fbbc5aa469c5bcd666d91e

    SHA256

    f52c5d91b4c7dfda2534d06da991801f2063b065e6820a4a13f1dbe6c4cb7470

    SHA512

    488b8afe803e51c308da4d425f6f647f473f884598a30b26f2be0033a8af9cb6dac1a7dd61ca6ccfe805bf37e5f15da0a029f34ba74c475776f80849a9fc7cd0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fb1a925345b35934b6b8add502f47868

    SHA1

    8f1a94c00114293593048867e24c4a430d1ef21a

    SHA256

    6cfaf5a7f1ef1fc9d9fe10322af0b815507ec7d219cbbf27b0b7671fac4e0779

    SHA512

    5f2e0a267dee5f24a16f3647d740ff03436bb5ceb158d9b60b257deb8a8a4aefd827692e878b1d51e0226eb631bf1f74328f650849433b0f27f75a724f15f7ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    387d05f4358ad5c82ad1447d284c737c

    SHA1

    3ac5ae40658e9b3d9e0daea4afb98e1b9b25bddd

    SHA256

    10c9d841f5f46420f01a93c957248f3d0dce5da026cc59dc223926438e66c138

    SHA512

    fa1643c99d355752b254e9d8c2a86dc963aad8c547360bc618363f5dffdbacfc20ba5145a31d2b1830152bb29714f8e85c155c9d2d79289305238e8456f26c44

  • C:\Users\Admin\AppData\Local\Temp\CabD1F2.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarD2A1.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    9ce12aa1f620b6e0f1d75cbade241559

    SHA1

    d751e59445db67c41cd9afbd9be3b048bf9fddc7

    SHA256

    dcab63c2bd87c57d178e7fbe3b5aa8072f66ec615be19ff7bc188c4af45bc18e

    SHA512

    87523af779931d8f7cbf8d92cbda4c01d2de57e986f9e7147702b0322bc23936bbac0ab94475dee66f12298abed22604dd6f981e363f6e80f9fa33b4ac3624fb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    cfedd2d17e14c9729c1647b0012ee29c

    SHA1

    1a8215a6a0f3e172ad38c1cf3b044bccc220225d

    SHA256

    c1d9e18479fe424c8b4fead0d1d040245b7080b9983ead0275c3930e67961ad9

    SHA512

    d2ef823aaa46fa928d6ff6d205d579b1e5331d95f905303dfde846516bd6498be9d001f004a9709a84534a6d3684ec4b6d5d52f288e39bb94f44059282b00537

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    9ce12aa1f620b6e0f1d75cbade241559

    SHA1

    d751e59445db67c41cd9afbd9be3b048bf9fddc7

    SHA256

    dcab63c2bd87c57d178e7fbe3b5aa8072f66ec615be19ff7bc188c4af45bc18e

    SHA512

    87523af779931d8f7cbf8d92cbda4c01d2de57e986f9e7147702b0322bc23936bbac0ab94475dee66f12298abed22604dd6f981e363f6e80f9fa33b4ac3624fb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    2d5030223a9392cc0285aeaa3a99eeb6

    SHA1

    5dfd024fc67abebdcaa13767d899bfb3d925cd0f

    SHA256

    ca225c6a64e51383fc388f8e4a0989e09a7fcd02ebf519b1c6be48dde25ee10e

    SHA512

    59028997cb43e9ab4a07fc9e67a7940074c59587a9d5ce2cabaf3645202adc23fce9bbff612e91e1b7ce3503d2096a1f1648881cc89aff6c66e7aa8b654c8320

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    9ce12aa1f620b6e0f1d75cbade241559

    SHA1

    d751e59445db67c41cd9afbd9be3b048bf9fddc7

    SHA256

    dcab63c2bd87c57d178e7fbe3b5aa8072f66ec615be19ff7bc188c4af45bc18e

    SHA512

    87523af779931d8f7cbf8d92cbda4c01d2de57e986f9e7147702b0322bc23936bbac0ab94475dee66f12298abed22604dd6f981e363f6e80f9fa33b4ac3624fb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UPVZQMBSY8SEMNAD05HE.temp

    Filesize

    7KB

    MD5

    2d5030223a9392cc0285aeaa3a99eeb6

    SHA1

    5dfd024fc67abebdcaa13767d899bfb3d925cd0f

    SHA256

    ca225c6a64e51383fc388f8e4a0989e09a7fcd02ebf519b1c6be48dde25ee10e

    SHA512

    59028997cb43e9ab4a07fc9e67a7940074c59587a9d5ce2cabaf3645202adc23fce9bbff612e91e1b7ce3503d2096a1f1648881cc89aff6c66e7aa8b654c8320

  • C:\Users\Admin\AppData\Roaming\OneDrive.exe

    Filesize

    142KB

    MD5

    2f2fed589cef6c6973db3dd854a6ba13

    SHA1

    6a121feaa70814260efcc50a0b48696cd0cf570e

    SHA256

    1d77e69e717573061d58bb385dfe760cbbfbb205a9e1c1ea3428a25ac7319c36

    SHA512

    c8d942892f514afbd5a8f888897b31e6e4d4c2e2d155bf1561dfba03ff382a5c12e810f5bb2cd9ff461524f4dd4012e85363537568ca7b36ad51c2bd4d95aade

  • C:\Windows\System32\one.exe

    Filesize

    142KB

    MD5

    2f2fed589cef6c6973db3dd854a6ba13

    SHA1

    6a121feaa70814260efcc50a0b48696cd0cf570e

    SHA256

    1d77e69e717573061d58bb385dfe760cbbfbb205a9e1c1ea3428a25ac7319c36

    SHA512

    c8d942892f514afbd5a8f888897b31e6e4d4c2e2d155bf1561dfba03ff382a5c12e810f5bb2cd9ff461524f4dd4012e85363537568ca7b36ad51c2bd4d95aade

  • C:\Windows\System32\one.exe

    Filesize

    142KB

    MD5

    2f2fed589cef6c6973db3dd854a6ba13

    SHA1

    6a121feaa70814260efcc50a0b48696cd0cf570e

    SHA256

    1d77e69e717573061d58bb385dfe760cbbfbb205a9e1c1ea3428a25ac7319c36

    SHA512

    c8d942892f514afbd5a8f888897b31e6e4d4c2e2d155bf1561dfba03ff382a5c12e810f5bb2cd9ff461524f4dd4012e85363537568ca7b36ad51c2bd4d95aade

  • C:\Windows\System32\ses.exe

    Filesize

    28KB

    MD5

    ab9502a920271fd1cf060f388a45fcd0

    SHA1

    c7292f1d76eae037d3ea5dbbc171eee21bc944d8

    SHA256

    e0fb281db34b9fa35971cb1af42175d6b5650c46f261771361a1aeed70565787

    SHA512

    7fcf30539e0cf74d4f27904c4205d0d8fd209ffec2ca97fdd1277c3096e1dc8c910ce239b7bd622d4275d4ea24f5be2ca0ae6a3a2687e492fd7774712c620452

  • C:\Windows\System32\ses.exe

    Filesize

    28KB

    MD5

    ab9502a920271fd1cf060f388a45fcd0

    SHA1

    c7292f1d76eae037d3ea5dbbc171eee21bc944d8

    SHA256

    e0fb281db34b9fa35971cb1af42175d6b5650c46f261771361a1aeed70565787

    SHA512

    7fcf30539e0cf74d4f27904c4205d0d8fd209ffec2ca97fdd1277c3096e1dc8c910ce239b7bd622d4275d4ea24f5be2ca0ae6a3a2687e492fd7774712c620452

  • memory/1060-101-0x0000000002A90000-0x0000000002B10000-memory.dmp

    Filesize

    512KB

  • memory/1060-99-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1060-96-0x0000000002360000-0x0000000002368000-memory.dmp

    Filesize

    32KB

  • memory/1060-97-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1060-100-0x0000000002A90000-0x0000000002B10000-memory.dmp

    Filesize

    512KB

  • memory/1060-102-0x0000000002A90000-0x0000000002B10000-memory.dmp

    Filesize

    512KB

  • memory/1060-98-0x0000000002A90000-0x0000000002B10000-memory.dmp

    Filesize

    512KB

  • memory/1060-95-0x000000001B3A0000-0x000000001B682000-memory.dmp

    Filesize

    2.9MB

  • memory/1060-103-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/1832-76-0x000000001B1C0000-0x000000001B4A2000-memory.dmp

    Filesize

    2.9MB

  • memory/1832-81-0x0000000002400000-0x0000000002480000-memory.dmp

    Filesize

    512KB

  • memory/1832-84-0x0000000002400000-0x0000000002480000-memory.dmp

    Filesize

    512KB

  • memory/1832-83-0x0000000002400000-0x0000000002480000-memory.dmp

    Filesize

    512KB

  • memory/1832-86-0x000007FEEEF90000-0x000007FEEF92D000-memory.dmp

    Filesize

    9.6MB

  • memory/1832-80-0x000007FEEEF90000-0x000007FEEF92D000-memory.dmp

    Filesize

    9.6MB

  • memory/1832-77-0x000007FEEEF90000-0x000007FEEF92D000-memory.dmp

    Filesize

    9.6MB

  • memory/1832-79-0x0000000002400000-0x0000000002480000-memory.dmp

    Filesize

    512KB

  • memory/1832-78-0x00000000024E0000-0x00000000024E8000-memory.dmp

    Filesize

    32KB

  • memory/2200-0-0x0000000000860000-0x0000000000876000-memory.dmp

    Filesize

    88KB

  • memory/2200-35-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2200-49-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2200-2-0x000000001BA60000-0x000000001BAE0000-memory.dmp

    Filesize

    512KB

  • memory/2200-1-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2620-27-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2620-82-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2620-20-0x0000000000100000-0x0000000000128000-memory.dmp

    Filesize

    160KB

  • memory/2620-535-0x000000001B150000-0x000000001B1D0000-memory.dmp

    Filesize

    512KB

  • memory/2620-106-0x000000001B150000-0x000000001B1D0000-memory.dmp

    Filesize

    512KB

  • memory/2724-7-0x000007FEEEF90000-0x000007FEEF92D000-memory.dmp

    Filesize

    9.6MB

  • memory/2724-8-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/2724-9-0x000000001B360000-0x000000001B642000-memory.dmp

    Filesize

    2.9MB

  • memory/2724-11-0x0000000002470000-0x0000000002478000-memory.dmp

    Filesize

    32KB

  • memory/2724-10-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/2724-12-0x00000000027A0000-0x0000000002820000-memory.dmp

    Filesize

    512KB

  • memory/2724-13-0x000007FEEEF90000-0x000007FEEF92D000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-33-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-28-0x0000000002590000-0x0000000002598000-memory.dmp

    Filesize

    32KB

  • memory/2760-36-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2760-26-0x000000001B210000-0x000000001B4F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2760-34-0x00000000028F0000-0x0000000002970000-memory.dmp

    Filesize

    512KB

  • memory/2760-29-0x00000000028F0000-0x0000000002970000-memory.dmp

    Filesize

    512KB

  • memory/2760-32-0x00000000028F0000-0x0000000002970000-memory.dmp

    Filesize

    512KB

  • memory/2760-31-0x00000000028F0000-0x0000000002970000-memory.dmp

    Filesize

    512KB

  • memory/2760-30-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-54-0x000007FEEEF90000-0x000007FEEF92D000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-104-0x0000000002660000-0x00000000026E0000-memory.dmp

    Filesize

    512KB

  • memory/2940-55-0x000007FEEEF90000-0x000007FEEF92D000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-57-0x0000000002660000-0x00000000026E0000-memory.dmp

    Filesize

    512KB

  • memory/2940-52-0x0000000002660000-0x00000000026E0000-memory.dmp

    Filesize

    512KB

  • memory/2940-51-0x000007FEEEF90000-0x000007FEEF92D000-memory.dmp

    Filesize

    9.6MB

  • memory/2940-53-0x000000000266B000-0x00000000026D2000-memory.dmp

    Filesize

    412KB

  • memory/2940-56-0x0000000002660000-0x00000000026E0000-memory.dmp

    Filesize

    512KB

  • memory/3000-66-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3000-67-0x0000000002A50000-0x0000000002AD0000-memory.dmp

    Filesize

    512KB

  • memory/3000-69-0x0000000002A50000-0x0000000002AD0000-memory.dmp

    Filesize

    512KB

  • memory/3000-64-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3000-65-0x0000000002A50000-0x0000000002AD0000-memory.dmp

    Filesize

    512KB

  • memory/3000-70-0x000007FEEDE50000-0x000007FEEE7ED000-memory.dmp

    Filesize

    9.6MB

  • memory/3000-68-0x0000000002A54000-0x0000000002A57000-memory.dmp

    Filesize

    12KB