Analysis

  • max time kernel
    139s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 04:17

General

  • Target

    https://s28667145.weebly.com/memz-download.html

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://s28667145.weebly.com/memz-download.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fe2046f8,0x7ff9fe204708,0x7ff9fe204718
      2⤵
        PID:4092
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
        2⤵
          PID:5112
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5052
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:8
          2⤵
            PID:2000
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
            2⤵
              PID:2744
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
              2⤵
                PID:1672
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:1
                2⤵
                  PID:3688
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:1
                  2⤵
                    PID:4880
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                    2⤵
                      PID:3304
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:8
                      2⤵
                        PID:1000
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3328
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:1
                        2⤵
                          PID:5216
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:1
                          2⤵
                            PID:5496
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                            2⤵
                              PID:5604
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1
                              2⤵
                                PID:5688
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5604 /prefetch:8
                                2⤵
                                  PID:5320
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5492 /prefetch:8
                                  2⤵
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5324
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                                  2⤵
                                    PID:548
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:1
                                    2⤵
                                      PID:5948
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:1
                                      2⤵
                                        PID:5920
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:1
                                        2⤵
                                          PID:5180
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6684 /prefetch:1
                                          2⤵
                                            PID:5156
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3180 /prefetch:8
                                            2⤵
                                              PID:5788
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:1
                                              2⤵
                                                PID:5224
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6568 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5216
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1312 /prefetch:1
                                                2⤵
                                                  PID:2584
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:1
                                                  2⤵
                                                    PID:3496
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:2
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5432
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:4568
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:3068
                                                    • C:\Windows\System32\rundll32.exe
                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                      1⤵
                                                        PID:5844
                                                      • C:\Program Files\7-Zip\7zG.exe
                                                        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\XWorm.V5.2\" -ad -an -ai#7zMap25663:82:7zEvent2182
                                                        1⤵
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of FindShellTrayWindow
                                                        PID:6020
                                                      • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\crack.exe
                                                        "C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\crack.exe"
                                                        1⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Enumerates system info in registry
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4312
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools
                                                          2⤵
                                                            PID:2028
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9fe2046f8,0x7ff9fe204708,0x7ff9fe204718
                                                              3⤵
                                                                PID:1036

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            dbac49e66219979194c79f1cf1cb3dd1

                                                            SHA1

                                                            4ef87804a04d51ae1fac358f92382548b27f62f2

                                                            SHA256

                                                            f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562

                                                            SHA512

                                                            bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            a9e55f5864d6e2afd2fd84e25a3bc228

                                                            SHA1

                                                            a5efcff9e3df6252c7fe8535d505235f82aab276

                                                            SHA256

                                                            0f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452

                                                            SHA512

                                                            12f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            1752666005849a9536b73a22319329c1

                                                            SHA1

                                                            7201f80c0e1ed428483fda5b02c403e5e59d87de

                                                            SHA256

                                                            90adb746bed12f2fa430b5e64decb10ca7309ca4fbf4efa1c8dcbd1c0587ec15

                                                            SHA512

                                                            9ebf9e93be30793f2c803b6d9ba23759f200ce199cd07d88051469abb79ce99c8b464018c008836fff36ec969d55882e44ce12c90f8e377f1a45503a23565ac8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            7fdf61468b0a7a36d67294b754a6a2ba

                                                            SHA1

                                                            35bb8c1dd8f523b68ddac5f5138a2456904e3247

                                                            SHA256

                                                            ce1807324651fe7f0923529c49c5156e0bcc5453bb5765d6b24a500c3dd8782e

                                                            SHA512

                                                            26bad8da6e3f667c57b8660dc22dba1abe1274b288de94c9c72f2584d233d435fd5cae25137f5157578d63a4f13a62db40167e0404e30ee18bfac6582c88528b

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            37a26f17aebc094784904be08ba659e4

                                                            SHA1

                                                            475fb409510d97807e854ba83f525731fa105931

                                                            SHA256

                                                            96c8750d45234e942a55714ac3160c69c126e26d5b37d92c289d96da39f99551

                                                            SHA512

                                                            adf30ef2dcc02982fbb86a5506a2ed30e35a20e8112ed3e93e35dcf261143789782782179044a1f84253852bf7793d14df80bcfbab45cd17651ba288b8ffaf1f

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            44481af275951bfb8585a0885f51ddcf

                                                            SHA1

                                                            0e288de8f00ad662cfc657211b69dc02fc580fc4

                                                            SHA256

                                                            e998491682617d235c746937c04e3d2303512fcfc0c3871ea58744d969032a56

                                                            SHA512

                                                            930ad6c3344d63514ce2f8c9f1953874b0d2780922f39189f3782606157e4f8d2ebefa5b97ea613516487de79abd7be892d498367e3adc335ae61840913d4b90

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            0ba40d83184c5552f33c88126ffa95b9

                                                            SHA1

                                                            abb04bf2dbf330107fdfc7603a4ae7d2b98d0858

                                                            SHA256

                                                            49f58ab5925c4985d9294bf324f664c73fcde439d95b0b06bd1aba8e5075e127

                                                            SHA512

                                                            b54cb80b3c9830fd12b505a5de9968f089ba382cb81f4c88b862638b2b0841cfd99121c4d870f5971e0f44bb819edfd557866136174a71b26092d7985faa8ee2

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            7KB

                                                            MD5

                                                            b6965a1c2782c2fbceb77dea7f3695d6

                                                            SHA1

                                                            fd5b08c40fa9e9425979d66fbde7d7c990f3fa95

                                                            SHA256

                                                            41d1af7e657230ce62925b201982132b0fd573d02a9b277a493243817d2b969c

                                                            SHA512

                                                            daa5e9e25f5159aca5504ed33de8a6164b9d063ab2a62e31da262e39e7d8a7a2ffafb52269a540803401a687c437bc81cf0da9dc24e3bfdc0e61ec82226e41f0

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            bfabdefa4240e5778a4765840e338f6c

                                                            SHA1

                                                            39f5df422d2622ae3fd71aa11ad7ea1af657b101

                                                            SHA256

                                                            3d4d59f352f94aa4a1eeab387c8831ed4b5299358c1db41e469a588f14c7a253

                                                            SHA512

                                                            91aa447208091a13978a919c1038fd9b9698e3db206dd047de7be0ca0da303ff5e8ec2bf08bee75b6379473a37e81a2eb32da78c82e96c425dd77f2a747a8e95

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            233f69b5695eb2a0e5dce32ed5d407a7

                                                            SHA1

                                                            2c66fec7b06b2f2618979392e77db3787539e23d

                                                            SHA256

                                                            857c4f2fb6a0b163ee584d878d5548913c73ebf603741548d1086649e9b16593

                                                            SHA512

                                                            6e522b2ce18f52d71d1416795263867152a87ddc9bc3740458697205b41ae7ef695c8e53996a41eb2fc63b65fa9113ac9bb0d0c1d8faa6e8a132e92f5acf9db8

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            2af3a80c738a68ea499ef2cf0a15d32c

                                                            SHA1

                                                            32e0f72863d6e8ba27ed56cfd14f6fe23e4feb86

                                                            SHA256

                                                            cc10b062795f502db17a417d3cff50360a0291b0afbec6f315d01301acd505fb

                                                            SHA512

                                                            dc45f99d9e3c80903e1f2afae1dac8185410ec02b0f3793919007b036f775410233a4b6af1cb7cc8e33dd801b10208a62be8c73befc23bd35307943986e50f94

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            a0ed8a9fdad206d07d7a55145c0ebcfe

                                                            SHA1

                                                            00694e9618f870bffc0d47c90657d532748410f3

                                                            SHA256

                                                            57e354a05fc9ac127fb8927e8788b35dc3bdfcd911e6523e4b7639e27bbb764d

                                                            SHA512

                                                            21b1f5ea3ed776dc265512bbd2f11b05f171fdabd6dcee14e1375101434c2164abd15ad39b2b70104afd9eecbdb5ccb60679e4a477c0cf4b8871466025344b98

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            9d0c27279e7a99aac2b3365b73a9fdad

                                                            SHA1

                                                            f76bfd5a49a37d0133e9e62cd202fa4bf6237688

                                                            SHA256

                                                            5149662e8e5fc1c2778e1e6694c6063eaee31a4f758ba1a528b94e0c621d13c2

                                                            SHA512

                                                            7fdd67069a8130a7a136969b3a47cd04860959c4e4c19f6b9d4e4a0f7f60cfa003788c96a8ff338ed90677be9cd0d3ccea5c24e43886c4cc5256b3033d066e82

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe578d4c.TMP

                                                            Filesize

                                                            371B

                                                            MD5

                                                            7f8317bf253fa4254076c61a95b46fd1

                                                            SHA1

                                                            02f7be355bfc306ac9761a4a1edcd9cdbb6cd43d

                                                            SHA256

                                                            0328101fc36e2c6747dce0551deadac3329930c7dcc008c07ffcf4aa5d9f35d0

                                                            SHA512

                                                            8e74fe5d5133a791d882bb17d1206ffc3845cfb29cd9f64bbf712a0f331381963bffc184af9c38884fc48a0f5248bfbbe06174fb4f2ae654db33d61d28dd620e

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            6752a1d65b201c13b62ea44016eb221f

                                                            SHA1

                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                            SHA256

                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                            SHA512

                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            36cb073bee24858d456c8d5ac3643689

                                                            SHA1

                                                            9bae79c34a0dc4d73fb4696cdb29596b2033d6b2

                                                            SHA256

                                                            4b8e0382a45ea23c8ac8edaec5806875edbd046446ca603ec9be9873d81ff9a3

                                                            SHA512

                                                            46ade186cfc135b4443ee107cbe255650de4a8556267fdad812da014cef38e81964cb0df3c425e2d115e11f2ed2853963df6bd3c14378dcfaea0b296c9ba88b1

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            8918cd8ea29f0fa72bbdee1567a2db1b

                                                            SHA1

                                                            86afebe6be39767881d06f67b9b773888428fa39

                                                            SHA256

                                                            79435904e5285b3e734d65dada6ce7e886a2871e7b0ad50bc8de3f5e7fdbfb6a

                                                            SHA512

                                                            5cabbe891cea8f69de5c36a117029f3b771a0f5df09e57297b73bd1a85d740d77dec1f58a8cd4ccfe9dfe29d8b0eb9466b9a9f553916029ed8c82932a11f1f3a

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            051293857ed2f8f7832136a92571cb7d

                                                            SHA1

                                                            595cce186c5711b4d417a54d21cdb195af1ae5ba

                                                            SHA256

                                                            73b1aeae2d3427e644168bff395e3b671fd53ce7221112a232101cbae1ef1dc1

                                                            SHA512

                                                            563be49eb46d7e5a93e0cd7b68471409994b21afc63b69276f51cd74737777ae9fe3b9f9196703bf03a8978ba4bd6ddbb80a52d36bf36b8ea3a70047bda5708f

                                                          • C:\Users\Admin\AppData\Local\Temp\TMzpx\TMzpx.dll

                                                            Filesize

                                                            112KB

                                                            MD5

                                                            2f1a50031dcf5c87d92e8b2491fdcea6

                                                            SHA1

                                                            71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f

                                                            SHA256

                                                            47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed

                                                            SHA512

                                                            1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2.rar

                                                            Filesize

                                                            30.4MB

                                                            MD5

                                                            2a16b9474dd55ed48f1602c4a17a3b60

                                                            SHA1

                                                            f279b4a379e4c30e134ccb6a2837dbceecce9d13

                                                            SHA256

                                                            6a4beba8dda5d6d9b9f301c6bcf100b05d8c192453ee7d293efbe95f9a0f76c9

                                                            SHA512

                                                            b2ceeeb17f77c589068259ba07c2c1ccef420af17398f26b6bb92729771c6fb67bcbb2a139243c77dbdfc9dcddcc3e71a805b1645d70afcbbc08b27c7c0881e4

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\GeoIP.dat

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            8ef41798df108ce9bd41382c9721b1c9

                                                            SHA1

                                                            1e6227635a12039f4d380531b032bf773f0e6de0

                                                            SHA256

                                                            bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

                                                            SHA512

                                                            4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\Guna.UI2.dll

                                                            Filesize

                                                            1.9MB

                                                            MD5

                                                            bcc0fe2b28edd2da651388f84599059b

                                                            SHA1

                                                            44d7756708aafa08730ca9dbdc01091790940a4f

                                                            SHA256

                                                            c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

                                                            SHA512

                                                            3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\Icons\icon (15).ico

                                                            Filesize

                                                            361KB

                                                            MD5

                                                            e3143e8c70427a56dac73a808cba0c79

                                                            SHA1

                                                            63556c7ad9e778d5bd9092f834b5cc751e419d16

                                                            SHA256

                                                            b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

                                                            SHA512

                                                            74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\Mono.Cecil.dll

                                                            Filesize

                                                            350KB

                                                            MD5

                                                            de69bb29d6a9dfb615a90df3580d63b1

                                                            SHA1

                                                            74446b4dcc146ce61e5216bf7efac186adf7849b

                                                            SHA256

                                                            f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc

                                                            SHA512

                                                            6e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\MonoMod.Backports.dll

                                                            Filesize

                                                            138KB

                                                            MD5

                                                            dd43356f07fc0ce082db4e2f102747a2

                                                            SHA1

                                                            aa0782732e2d60fa668b0aadbf3447ef70b6a619

                                                            SHA256

                                                            e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6

                                                            SHA512

                                                            284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\MonoMod.Core.dll

                                                            Filesize

                                                            216KB

                                                            MD5

                                                            b808181453b17f3fc1ab153bf11be197

                                                            SHA1

                                                            bce86080b7eb76783940d1ff277e2b46f231efe9

                                                            SHA256

                                                            da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd

                                                            SHA512

                                                            a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\MonoMod.ILHelpers.dll

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            6512e89e0cb92514ef24be43f0bf4500

                                                            SHA1

                                                            a039c51f89656d9d5c584f063b2b675a9ff44b8e

                                                            SHA256

                                                            1411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0

                                                            SHA512

                                                            9ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\MonoMod.Utils.dll

                                                            Filesize

                                                            319KB

                                                            MD5

                                                            79f1c4c312fdbb9258c2cdde3772271f

                                                            SHA1

                                                            a143434883e4ef2c0190407602b030f5c4fdf96f

                                                            SHA256

                                                            f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a

                                                            SHA512

                                                            b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\RVGLib.dll

                                                            Filesize

                                                            241KB

                                                            MD5

                                                            d34c13128c6c7c93af2000a45196df81

                                                            SHA1

                                                            664c821c9d2ed234aea31d8b4f17d987e4b386f1

                                                            SHA256

                                                            aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7

                                                            SHA512

                                                            91f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\XWorm V5.2.exe

                                                            Filesize

                                                            12.2MB

                                                            MD5

                                                            8b7b015c1ea809f5c6ade7269bdc5610

                                                            SHA1

                                                            c67d5d83ca18731d17f79529cfdb3d3dcad36b96

                                                            SHA256

                                                            7fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e

                                                            SHA512

                                                            e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180

                                                          • C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\crack.exe

                                                            Filesize

                                                            109KB

                                                            MD5

                                                            e6a20535b636d6402164a8e2d871ef6d

                                                            SHA1

                                                            981cb1fd9361ca58f8985104e00132d1836a8736

                                                            SHA256

                                                            b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2

                                                            SHA512

                                                            35856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30

                                                          • \??\pipe\LOCAL\crashpad_2948_VESWEXXLDFYNAHOB

                                                            MD5

                                                            d41d8cd98f00b204e9800998ecf8427e

                                                            SHA1

                                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                            SHA256

                                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                            SHA512

                                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                          • memory/4312-624-0x000001EA2DED0000-0x000001EA2DED6000-memory.dmp

                                                            Filesize

                                                            24KB

                                                          • memory/4312-627-0x000001EA48120000-0x000001EA4815C000-memory.dmp

                                                            Filesize

                                                            240KB

                                                          • memory/4312-628-0x000001EA2F7D0000-0x000001EA2F7EA000-memory.dmp

                                                            Filesize

                                                            104KB

                                                          • memory/4312-625-0x000001EA2DF40000-0x000001EA2DF46000-memory.dmp

                                                            Filesize

                                                            24KB

                                                          • memory/4312-630-0x000001EA48F00000-0x000001EA49B38000-memory.dmp

                                                            Filesize

                                                            12.2MB

                                                          • memory/4312-617-0x000001EA2F730000-0x000001EA2F758000-memory.dmp

                                                            Filesize

                                                            160KB

                                                          • memory/4312-638-0x000001EA4A340000-0x000001EA4AF2C000-memory.dmp

                                                            Filesize

                                                            11.9MB

                                                          • memory/4312-615-0x000001EA2F780000-0x000001EA2F7C2000-memory.dmp

                                                            Filesize

                                                            264KB

                                                          • memory/4312-640-0x000001EA48BE0000-0x000001EA48DD4000-memory.dmp

                                                            Filesize

                                                            2.0MB

                                                          • memory/4312-621-0x000001EA48060000-0x000001EA480BE000-memory.dmp

                                                            Filesize

                                                            376KB

                                                          • memory/4312-613-0x0000000000470000-0x0000000000490000-memory.dmp

                                                            Filesize

                                                            128KB

                                                          • memory/4312-623-0x000001EA480C0000-0x000001EA48116000-memory.dmp

                                                            Filesize

                                                            344KB

                                                          • memory/4312-619-0x000001EA2DF60000-0x000001EA2DF66000-memory.dmp

                                                            Filesize

                                                            24KB