Analysis

  • max time kernel
    426s
  • max time network
    428s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-05-2024 12:21

General

  • Target

    xeroExecutor.exe

  • Size

    78KB

  • MD5

    4ec487d0538495c269e0039d081d42fa

  • SHA1

    ecd574e1bbfda1119a778307609e85e6e696325b

  • SHA256

    4899596e68dd4b160a42a14c72f6be0d9a04a714023b0f54d770f8431ff925e8

  • SHA512

    4e778fe02eec094dc56ba55c4a4ebb7c395171acb333c755a9acc6a08e5ae3917b3c5a97c835399f64b2561de1f578aa5952b9376b901ed082617b2287aaeb6e

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+PKPIC:5Zv5PDwbjNrmAE+PWIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzNzcwMzYwNDc3MzcxNTk5OA.GpnuZW.icMd9S8Xo3T9RHsU9bXhiKpUJaK62FUGK13WN4

  • server_id

    1237709600602722354

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 21 IoCs
  • Drops file in System32 directory 13 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:556
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:992
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{4857493f-02be-478e-a442-cbb886a4b82a}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1332
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
        PID:636
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay
        1⤵
          PID:720
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k dcomlaunch -s LSM
          1⤵
            PID:892
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
            1⤵
              PID:1012
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts
              1⤵
                PID:344
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService
                1⤵
                  PID:380
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                  1⤵
                    PID:820
                    • c:\windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:3180
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                      1⤵
                        PID:1080
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog
                        1⤵
                        • Drops file in System32 directory
                        PID:1156
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k localservice -s nsi
                        1⤵
                          PID:1180
                        • c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s Themes
                          1⤵
                            PID:1268
                          • c:\windows\system32\svchost.exe
                            c:\windows\system32\svchost.exe -k localservice -s EventSystem
                            1⤵
                              PID:1280
                            • c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                              1⤵
                                PID:1308
                                • c:\windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:3108
                                • c:\windows\system32\svchost.exe
                                  c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp
                                  1⤵
                                    PID:1360
                                  • c:\windows\system32\svchost.exe
                                    c:\windows\system32\svchost.exe -k netsvcs -s SENS
                                    1⤵
                                      PID:1476
                                    • c:\windows\system32\svchost.exe
                                      c:\windows\system32\svchost.exe -k networkservice -s NlaSvc
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1532
                                    • c:\windows\system32\svchost.exe
                                      c:\windows\system32\svchost.exe -k networkservice -s Dnscache
                                      1⤵
                                        PID:1568
                                      • c:\windows\system32\svchost.exe
                                        c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder
                                        1⤵
                                          PID:1576
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                          1⤵
                                            PID:1692
                                          • c:\windows\system32\svchost.exe
                                            c:\windows\system32\svchost.exe -k localservice -s netprofm
                                            1⤵
                                              PID:1720
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                              1⤵
                                                PID:1752
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
                                                1⤵
                                                  PID:1776
                                                • c:\windows\system32\svchost.exe
                                                  c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
                                                  1⤵
                                                    PID:1824
                                                  • c:\windows\system32\svchost.exe
                                                    c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
                                                    1⤵
                                                      PID:1868
                                                    • c:\windows\system32\svchost.exe
                                                      c:\windows\system32\svchost.exe -k appmodel -s StateRepository
                                                      1⤵
                                                        PID:1880
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:2004
                                                        • c:\windows\system32\svchost.exe
                                                          c:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation
                                                          1⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1608
                                                        • c:\windows\system32\svchost.exe
                                                          c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
                                                          1⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2060
                                                        • c:\windows\system32\svchost.exe
                                                          c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
                                                          1⤵
                                                            PID:2348
                                                          • c:\windows\system32\svchost.exe
                                                            c:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent
                                                            1⤵
                                                            • Modifies data under HKEY_USERS
                                                            PID:2356
                                                          • c:\windows\system32\svchost.exe
                                                            c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2380
                                                          • c:\windows\system32\svchost.exe
                                                            c:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc
                                                            1⤵
                                                              PID:2512
                                                            • c:\windows\system32\svchost.exe
                                                              c:\windows\system32\svchost.exe -k netsvcs -s Browser
                                                              1⤵
                                                                PID:2588
                                                              • c:\windows\system32\svchost.exe
                                                                c:\windows\system32\svchost.exe -k networkservice -s CryptSvc
                                                                1⤵
                                                                • Drops file in System32 directory
                                                                • Modifies data under HKEY_USERS
                                                                PID:2596
                                                              • C:\Windows\sysmon.exe
                                                                C:\Windows\sysmon.exe
                                                                1⤵
                                                                  PID:2624
                                                                • c:\windows\system32\svchost.exe
                                                                  c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks
                                                                  1⤵
                                                                    PID:2652
                                                                  • c:\windows\system32\svchost.exe
                                                                    c:\windows\system32\svchost.exe -k netsvcs -s WpnService
                                                                    1⤵
                                                                      PID:2660
                                                                    • C:\Windows\system32\wbem\unsecapp.exe
                                                                      C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                      1⤵
                                                                        PID:2832
                                                                      • c:\windows\system32\svchost.exe
                                                                        c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
                                                                        1⤵
                                                                          PID:3124
                                                                        • c:\windows\system32\svchost.exe
                                                                          c:\windows\system32\svchost.exe -k netsvcs -s TokenBroker
                                                                          1⤵
                                                                            PID:3236
                                                                          • C:\Windows\Explorer.EXE
                                                                            C:\Windows\Explorer.EXE
                                                                            1⤵
                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3372
                                                                            • C:\Users\Admin\AppData\Local\Temp\xeroExecutor.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\xeroExecutor.exe"
                                                                              2⤵
                                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                              • Suspicious use of SetThreadContext
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:1424
                                                                              • C:\Windows\SYSTEM32\NetSh.exe
                                                                                "NetSh.exe" Advfirewall set allprofiles state off
                                                                                3⤵
                                                                                • Modifies Windows Firewall
                                                                                PID:4600
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  4⤵
                                                                                    PID:4840
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                2⤵
                                                                                • Enumerates system info in registry
                                                                                • Modifies data under HKEY_USERS
                                                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:664
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x138,0x13c,0x140,0x134,0xac,0x7ff8c5389758,0x7ff8c5389768,0x7ff8c5389778
                                                                                  3⤵
                                                                                    PID:1228
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1648 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:2
                                                                                    3⤵
                                                                                      PID:2996
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:8
                                                                                      3⤵
                                                                                        PID:4712
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:8
                                                                                        3⤵
                                                                                          PID:3816
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:1
                                                                                          3⤵
                                                                                            PID:684
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:1
                                                                                            3⤵
                                                                                              PID:1204
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3520 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:1
                                                                                              3⤵
                                                                                                PID:1316
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4500 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:8
                                                                                                3⤵
                                                                                                  PID:856
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4652 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:8
                                                                                                  3⤵
                                                                                                    PID:4588
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:8
                                                                                                    3⤵
                                                                                                      PID:4888
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:8
                                                                                                      3⤵
                                                                                                        PID:2732
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4892 --field-trial-handle=1800,i,12098322678707905213,9535806093321679902,131072 /prefetch:8
                                                                                                        3⤵
                                                                                                          PID:2604
                                                                                                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level
                                                                                                          3⤵
                                                                                                            PID:3936
                                                                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff688487688,0x7ff688487698,0x7ff6884876a8
                                                                                                              4⤵
                                                                                                                PID:4472
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:3884
                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                            1⤵
                                                                                                              PID:3512
                                                                                                            • c:\windows\system32\svchost.exe
                                                                                                              c:\windows\system32\svchost.exe -k localservice -s CDPSvc
                                                                                                              1⤵
                                                                                                                PID:4648
                                                                                                              • c:\windows\system32\svchost.exe
                                                                                                                c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
                                                                                                                1⤵
                                                                                                                  PID:4792
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
                                                                                                                  1⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:2828
                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                  1⤵
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:2852
                                                                                                                • c:\windows\system32\svchost.exe
                                                                                                                  c:\windows\system32\svchost.exe -k netsvcs -s wlidsvc
                                                                                                                  1⤵
                                                                                                                    PID:2756
                                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                    1⤵
                                                                                                                      PID:2364
                                                                                                                    • C:\Windows\system32\ApplicationFrameHost.exe
                                                                                                                      C:\Windows\system32\ApplicationFrameHost.exe -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:1296
                                                                                                                      • C:\Windows\System32\InstallAgent.exe
                                                                                                                        C:\Windows\System32\InstallAgent.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:2528
                                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                          1⤵
                                                                                                                            PID:5080
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s PcaSvc
                                                                                                                            1⤵
                                                                                                                              PID:2668
                                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                              1⤵
                                                                                                                              • Checks processor information in registry
                                                                                                                              • Enumerates system info in registry
                                                                                                                              PID:5008
                                                                                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                                                                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                                                                                              1⤵
                                                                                                                                PID:3296

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                8d7d9c717d15ad377ee850519c22ecd9

                                                                                                                                SHA1

                                                                                                                                1a2809879c4118fce65f92aaa883b723b67971ed

                                                                                                                                SHA256

                                                                                                                                442b23a3f1834b9aadebacdca46538a1f9f4d83ced1fafb3c81f8b7bdd015a60

                                                                                                                                SHA512

                                                                                                                                304b8fc29863ad6407c60ffbdf8df5714f10440a7ea59cc13039b4658efdae944979be4da00f03b375c56f80990074106e4404ba7af12e1adc041c5a8bcfa0ba

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                                                Filesize

                                                                                                                                371B

                                                                                                                                MD5

                                                                                                                                7f5e826c03e937e73fca2ee27c902b6c

                                                                                                                                SHA1

                                                                                                                                65d03352c358d103dd0d24b8a45a51988cee6c6f

                                                                                                                                SHA256

                                                                                                                                b5f373608630cda062e51de4f8d02b337e29bc52434ec17756c0f1c0dac82964

                                                                                                                                SHA512

                                                                                                                                318f76a0858969aae7279f19fe7c1aaf4388374e67176532ce8fe3b41f487259e82e8d75c876943e0a9b2bb1fdea1d17917396dd4b6cefe53f655f8b7836684f

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                8058bbde41b5dbbbbe0068a6a0602ea1

                                                                                                                                SHA1

                                                                                                                                19229bcde400bd4ee87d1bc20b43bf72cc3fc321

                                                                                                                                SHA256

                                                                                                                                bf44d018249ff874ed43514e07c1fd287b6a4b82a469ca94bc82879f30b032bd

                                                                                                                                SHA512

                                                                                                                                c4c897bb67d66128c9adf1c82d81f5960dca48be7b9fb5c9832b3e4d8c407e2875848794b5798feed0e0d90f0048949a3a01d14b276efeb8f413fed0f8023016

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                70d56cee228c995d01fe785c47315dd6

                                                                                                                                SHA1

                                                                                                                                27f179e2bf046197e226c5702cdf6f0b5d1e6056

                                                                                                                                SHA256

                                                                                                                                7153308ce120137eaffbdaedce1e1754f3fa65734554f5b2b579a2313b6b9f92

                                                                                                                                SHA512

                                                                                                                                b4f9949756671cfb4b1efb5f748d769e950375c406ce9add2d58834c277e0aa918dcca5bc9a0af0a32e66b31e7da07bbd65743c9d0edf7000ec01299b643bb7a

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                c354cf03900ed9db34a0e96a4797dedb

                                                                                                                                SHA1

                                                                                                                                1cf692cbd65a5dabd21c83381b48aa81576a75a2

                                                                                                                                SHA256

                                                                                                                                5f09e19a3e8932cdd4d2d14b7687c1a531a7eefb0a770827a582149a9efc5ae9

                                                                                                                                SHA512

                                                                                                                                b968f3e88510a054d7b397d5d60427851276cb13ceaa1c22ee0157f14218ff566589c2b7d1f169d51194e7b6f4b990afe795539839beaeeb1e799c4843ebceff

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                Filesize

                                                                                                                                12KB

                                                                                                                                MD5

                                                                                                                                601b562d19f348370545609656e8b7ee

                                                                                                                                SHA1

                                                                                                                                f989937560b99282e06ec0cbea7ce17594b8516a

                                                                                                                                SHA256

                                                                                                                                d44e53c270bde656768aa93839aeeab7e9d19d65c6173cc554054b85ee22c6db

                                                                                                                                SHA512

                                                                                                                                0fd6de857d667d7b7067c3c1414dd355645193fb874e2ae6ac0229d8b5a7dfe9174a02d2a4ac6b37b6cb91cce18fa17d7254dafa17ec6c92544d25e051094cd4

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                272KB

                                                                                                                                MD5

                                                                                                                                2a7c46b84058fbebaaeeacf3cbfdb5db

                                                                                                                                SHA1

                                                                                                                                763d6e330b76ef874f7ff5c16f629bb31a4f8c9e

                                                                                                                                SHA256

                                                                                                                                e0d3123f08c1ac9b7ae015431ec498e1ecfd2022ed9007292e2902b715b95f93

                                                                                                                                SHA512

                                                                                                                                eb62c69a80849d5901b304f2d328e673cd4c3d8f9c799543d13f7867146e5eec8283612ba593057a87100edd49a69d615be5815fc74533785c651e3e55a1f595

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                                                                                                Filesize

                                                                                                                                2B

                                                                                                                                MD5

                                                                                                                                99914b932bd37a50b983c5e7c90ae93b

                                                                                                                                SHA1

                                                                                                                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                                                SHA256

                                                                                                                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                                                SHA512

                                                                                                                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                                              • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                                                Filesize

                                                                                                                                302B

                                                                                                                                MD5

                                                                                                                                eb907a1e5edcc3a85fb8980ba2c94820

                                                                                                                                SHA1

                                                                                                                                d66a74e20e2fc82cf5cde4aaa2be8f0a456d60dd

                                                                                                                                SHA256

                                                                                                                                89342ee106762e9d2dba60c4d089db63347768e4118670b35286f519de35c52a

                                                                                                                                SHA512

                                                                                                                                3378949fdd7b861bc27634fbbbd0166575ddda4ff566bad5aefbc3d2ddb5684fd9d15c2d9dae2fe394820e2a2c14e07476b46ce47390ecfd68d26eb639c416f8

                                                                                                                              • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                                                                                                                                Filesize

                                                                                                                                412B

                                                                                                                                MD5

                                                                                                                                f49dd35975769b030fde5f1155ceb289

                                                                                                                                SHA1

                                                                                                                                947a201517be5092bbc8dcb22b5e12d2bed723a6

                                                                                                                                SHA256

                                                                                                                                a316ccbc4f3c4a015fd93be247494c145bb51b412ceac1612afda4e6819c64a6

                                                                                                                                SHA512

                                                                                                                                cff79ba25990cb9bc43568f08d0d42ade76dfde663cbac38d814e225745a657da8abaa4b2773c747dbf24046f9603a2338978d15779bcb9a7f3a9790b95e73dc

                                                                                                                              • memory/556-22-0x000001C01C510000-0x000001C01C533000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                140KB

                                                                                                                              • memory/556-34-0x00007FF8A6600000-0x00007FF8A6610000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/556-33-0x000001C01C540000-0x000001C01C56A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                168KB

                                                                                                                              • memory/556-215-0x000001C01C540000-0x000001C01C56A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                168KB

                                                                                                                              • memory/636-210-0x0000012FDDCF0000-0x0000012FDDD1A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                168KB

                                                                                                                              • memory/636-24-0x0000012FDDCF0000-0x0000012FDDD1A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                168KB

                                                                                                                              • memory/636-213-0x00007FF8E6615000-0x00007FF8E6616000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/636-25-0x00007FF8A6600000-0x00007FF8A6610000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/992-214-0x0000026CE80A0000-0x0000026CE80CA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                168KB

                                                                                                                              • memory/992-31-0x00007FF8A6600000-0x00007FF8A6610000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/992-30-0x0000026CE80A0000-0x0000026CE80CA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                168KB

                                                                                                                              • memory/1332-17-0x00007FF8E6570000-0x00007FF8E674B000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.9MB

                                                                                                                              • memory/1332-20-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                256KB

                                                                                                                              • memory/1332-16-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                256KB

                                                                                                                              • memory/1332-15-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                256KB

                                                                                                                              • memory/1332-14-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                256KB

                                                                                                                              • memory/1332-208-0x00007FF8E6570000-0x00007FF8E674B000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.9MB

                                                                                                                              • memory/1332-207-0x00007FF8E6571000-0x00007FF8E667F000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.1MB

                                                                                                                              • memory/1332-18-0x00007FF8E4490000-0x00007FF8E453E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                696KB

                                                                                                                              • memory/1424-12-0x00007FF8E4490000-0x00007FF8E453E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                696KB

                                                                                                                              • memory/1424-9-0x000001B18A810000-0x000001B18A82E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                120KB

                                                                                                                              • memory/1424-19-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/1424-0-0x00007FF8C9B73000-0x00007FF8C9B74000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1424-13-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/1424-252-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/1424-253-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/1424-11-0x00007FF8E6570000-0x00007FF8E674B000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.9MB

                                                                                                                              • memory/1424-10-0x000001B1A3140000-0x000001B1A317E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                248KB

                                                                                                                              • memory/1424-1-0x000001B188AB0000-0x000001B188AC8000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                96KB

                                                                                                                              • memory/1424-8-0x000001B188FD0000-0x000001B188FE2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                72KB

                                                                                                                              • memory/1424-7-0x000001B18A8C0000-0x000001B18A936000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                472KB

                                                                                                                              • memory/1424-6-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/1424-5-0x00007FF8C9B73000-0x00007FF8C9B74000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1424-4-0x000001B1A39E0000-0x000001B1A3F06000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                5.1MB

                                                                                                                              • memory/1424-3-0x00007FF8C9B70000-0x00007FF8CA55C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                9.9MB

                                                                                                                              • memory/1424-2-0x000001B1A31E0000-0x000001B1A33A2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                              • memory/3372-76-0x0000000000630000-0x000000000065A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                168KB