Analysis Overview
SHA256
33a182216fc7373b3a6bd7f0072d2be15dda0be8d87ab7cdb5efd059814a0bf6
Threat Level: Known bad
The file XClient.exe was found to be: Known bad.
Malicious Activity Summary
Xworm family
Detect Xworm Payload
Xworm
Command and Scripting Interpreter: PowerShell
Drops startup file
Loads dropped DLL
Looks up external IP address via web service
Legitimate hosting services abused for malware hosting/C2
Adds Run key to start application
Detected phishing page
Enumerates physical storage devices
Unsigned PE
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious behavior: AddClipboardFormatListener
Delays execution with timeout.exe
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Enumerates system info in registry
Suspicious use of FindShellTrayWindow
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-11 15:01
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-11 15:01
Reported
2024-06-11 15:03
Platform
win11-20240426-en
Max time kernel
139s
Max time network
136s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Xworm
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | wtfismyip.com | N/A | N/A |
| N/A | wtfismyip.com | N/A | N/A |
Detected phishing page
Enumerates physical storage devices
Delays execution with timeout.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\timeout.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\VideoLAN\VLC\vlc.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\VideoLAN\VLC\vlc.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| Token: 33 | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\XClient.exe | N/A |
| N/A | N/A | C:\Program Files\VideoLAN\VLC\vlc.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\XClient.exe
"C:\Users\Admin\AppData\Local\Temp\XClient.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x00000000000004D0 0x00000000000004C8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://fbi.bet/
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdf0b53cb8,0x7ffdf0b53cc8,0x7ffdf0b53cd8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2504 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4996 /prefetch:8
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,2224885959050251256,16409776750258111226,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:1
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Program Files\VideoLAN\VLC\vlc.exe
"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RenameOpen.wav"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7C2C.tmp.bat""
C:\Windows\system32\timeout.exe
timeout 3
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 172.67.19.24:443 | pastebin.com | tcp |
| US | 8.8.8.8:53 | 24.19.67.172.in-addr.arpa | udp |
| US | 147.185.221.19:60312 | tcp | |
| US | 147.185.221.19:60312 | tcp | |
| US | 147.185.221.19:60312 | tcp | |
| US | 147.185.221.19:60312 | tcp | |
| US | 185.199.111.153:80 | fbi.bet | tcp |
| US | 185.199.111.153:80 | fbi.bet | tcp |
| US | 8.8.8.8:53 | 153.111.199.185.in-addr.arpa | udp |
| US | 185.199.111.153:443 | fbi.bet | tcp |
| US | 172.67.184.158:443 | fonts.cdnfonts.com | tcp |
| US | 172.67.184.158:443 | fonts.cdnfonts.com | tcp |
| CA | 198.27.70.99:443 | wtfismyip.com | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 172.67.172.237:443 | we-are-jammin.xyz | tcp |
| US | 147.185.221.19:60312 | tcp |
Files
memory/1088-0-0x00007FFDF5E13000-0x00007FFDF5E15000-memory.dmp
memory/1088-1-0x0000000000880000-0x00000000008B4000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ptafi4cd.p3t.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/3108-10-0x0000020E7D170000-0x0000020E7D192000-memory.dmp
memory/3108-11-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp
memory/3108-12-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp
memory/3108-13-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp
memory/3108-14-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp
memory/3108-17-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp
memory/3108-18-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | 71f4a66633cb3e35aaadcf82e339092a |
| SHA1 | 626fdf4c61cd42ef514d768e6a02d64cf4afa536 |
| SHA256 | 0b050421b8536cc98a1e5916845929b78623533d95167a1c5b24abfedfbb2bb9 |
| SHA512 | 89645044cec4d3afe5cea4e684fc0bf3ba2877c80b6d9b9ab52a491459a79d3a70d6b9c5a651eb2b503a439e534a3ff14f5a03542180cbf8b1d1f23a34e92964 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | aa67df2dc1e0c961f1985097177f7883 |
| SHA1 | 8f6cad194290da40de8383b23431480b25b4ee6d |
| SHA256 | 3d61e2863f4f687694f7e4b390579a76eba46b201214add5a39f1b6444939309 |
| SHA512 | f6e7e5c97c79df560d3a96ee9d9fec3ae285a565fd5021dde5b201ffc7987847819ac423e29150ddf81abaf7125cf14fb47b00f34ab6fc207bdb55b26e687e5d |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 051a74485331f9d9f5014e58ec71566c |
| SHA1 | 4ed0256a84f2e95609a0b4d5c249bca624db8fe4 |
| SHA256 | 3f67e4ba795fd89d33e9a1fe7547e297a82ae50b8f25eedc2b33a27866b28888 |
| SHA512 | 1f15fd8ca727b198495ef826002c1cbcc63e98eecb2e92abff48354ae668e6c3aaf9bd3005664967ae75637bacee7e730ce36142483d08ae6a068d9ae3e0e17d |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 21017c68eaf9461301de459f4f07e888 |
| SHA1 | 41ff30fc8446508d4c3407c79e798cf6eaa5bb73 |
| SHA256 | 03b321e48ff3328d9c230308914961fe110c4c7bc96c0a85a296745437bcb888 |
| SHA512 | 956990c11c6c1baa3665ef7ef23ef6073e0a7fcff77a93b5e605a83ff1e60b916d80d45dafb06977aed90868a273569a865cf2c623e295b5157bfff0fb2be35d |
memory/1088-54-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp
memory/1088-55-0x00007FFDF5E13000-0x00007FFDF5E15000-memory.dmp
memory/1088-56-0x000000001CBB0000-0x000000001CBBC000-memory.dmp
memory/1088-57-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp
memory/1088-58-0x000000001CFC0000-0x000000001CFFA000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmpF702.tmp
| MD5 | 1b942faa8e8b1008a8c3c1004ba57349 |
| SHA1 | cd99977f6c1819b12b33240b784ca816dfe2cb91 |
| SHA256 | 555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc |
| SHA512 | 5aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43 |
memory/1088-63-0x000000001BAA0000-0x000000001BB2E000-memory.dmp
memory/1088-65-0x000000001BFD0000-0x000000001BFDD000-memory.dmp
memory/1088-66-0x000000001CB40000-0x000000001CB5E000-memory.dmp
memory/1088-67-0x000000001CB70000-0x000000001CB7B000-memory.dmp
memory/1088-64-0x000000001D000000-0x000000001D046000-memory.dmp
memory/1088-68-0x000000001D000000-0x000000001D046000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 34d22039bc7833a3a27231b8eb834f70 |
| SHA1 | 79c4290a2894b0e973d3c4b297fad74ef45607bb |
| SHA256 | 402defe561006133623c2a4791b2baf90b92d5708151c2bcac6d02d2771cd3d6 |
| SHA512 | c69ee22d8c52a61e59969aa757d58ab4f32492854fc7116975efc7c6174f5d998cc236bbf15bce330d81e39a026b18e29683b6d69c93d21fea6d14e21460a0a7 |
\??\pipe\LOCAL\crashpad_4092_FHMRNISURWERHCYW
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 046d49efac191159051a8b2dea884f79 |
| SHA1 | d0cf8dc3bc6a23bf2395940cefcaad1565234a3a |
| SHA256 | 00dfb1705076450a45319666801a3a7032fc672675343434cb3d68baccb8e1f7 |
| SHA512 | 46961e0f0e4d7f82b4417e4aac4434e86f2130e92b492b53a194255bd3bba0855069524cd645f910754d4d2dbf3f1dc467bcc997f01dc6b1d8d6028e2d957236 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 6dc6f02ca1b73ea0f23c8b06da61338d |
| SHA1 | 0c84f2d9261d7233a8a80ea46e9d447a4e9048eb |
| SHA256 | 82cf72c3dd2655a60e1acd8fb75b7f118047c99eba9a584e829b99e0d55fbe64 |
| SHA512 | 7993901a0a1f435beaa4bca2bc2b100841b5f20c1538f29b9dcf37d7136d8b12f08b199c9a296c20d2713c340b88507066b9165b1c85edd29997489f98e7da6c |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008
| MD5 | 214b2fa780663e5b1778c56a8c0c63fd |
| SHA1 | 2a82b012c67b9f595eb9d236514bdc5fd69f99e1 |
| SHA256 | 916ba93a76b04c7ba7dd845ba5df93b495016834581ea315af3b99207251cf47 |
| SHA512 | 6d1b74be3c6db291094fd464f4a6e9495e5d88eae0ab98cd94c27c2d201cc002c5dbac312157693ffb97504b14b1137f6faece68e5bce762a215d58466555ec7 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 52b3638efa48c3c84265c9dee7791ef0 |
| SHA1 | 73aa9d817a65ba1b427083c8cc881603f476c4c0 |
| SHA256 | f613e38722414a70d30f63a3a8767d382f8650817c6f786b2472486b85969215 |
| SHA512 | 683cf679ffbbcdeb00f9e823904fed63629472d9ba498cb3d9ea32f30cf5df643d191aaa80166b100b0330ef33edfa72ef79961afb968ca43478b5d0e1527d04 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 32a566f0c0ffb27d836e157933f7dd46 |
| SHA1 | b3f8a6cdf1fce4268a79f69eafde2313b5eef5cc |
| SHA256 | 53b60c1f8b0159d741606bfe9dbc801f202c596f37783a22a719099c1be682b7 |
| SHA512 | 8db29cd734b09b1ec781ceba4cc771b35c56559ad74b6e2d8aa80ac618e6bad98a21615d1a30d6a7e7983d68e3173a250e1fc8cb6735e37361dfae39a057ce28 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 206702161f94c5cd39fadd03f4014d98 |
| SHA1 | bd8bfc144fb5326d21bd1531523d9fb50e1b600a |
| SHA256 | 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167 |
| SHA512 | 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | c8f34c9810fff9bc311d861b4890da57 |
| SHA1 | 325e42368756f242724551a816f7cb5f81baff8b |
| SHA256 | 631f043dbf6765d911639f808fc57047728fbee32a1868ce2269693277b992e9 |
| SHA512 | 2f4aba19bdbba71cfc69d7dd6d7a38ac990e3f1166b27f0423538e4721df47466c1afba97748e79566f8ca8ddd218efd8be13c2849f11e79e3787ea916c568d2 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 062288c08c8ce39f3c61f7f641459b6e |
| SHA1 | 242ea6734b51420c436f4aa1b3692328a1b85e70 |
| SHA256 | 3776cb9b84b755ff42696df654d243a3aeda34cd01091aec9c7031ad6a4b5e74 |
| SHA512 | a532df9757959a292049fb2b2464a213610a6115e82da3b91c34da560b3c2cec75a3f170bc26acfb4fc1fe3ac3eba64d025b4b1272277932e700cbbfd80d5049 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | ebaa439a8814190d8abafecbebba87f5 |
| SHA1 | 2a890c8c3f32170f8cf62f54651cedf04b0972cb |
| SHA256 | be60e5b8a31896036a56d36d5a74c0aba23b2a732633e3030e680ac3d92e3150 |
| SHA512 | 5b3a4e0fe3713c5b14bcf3d900459a745437a1e8b82ff4806cd7c1f01dbd5c4c86d5359b0c402d656c2532d47524916a5bb3f729e975fc3febc6c8e8342e2a10 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | d9e666be39b1019a9b1b1983a8ccc53a |
| SHA1 | 5c129a5b0d7d6e01817f895d8a45f7184eb53708 |
| SHA256 | 92504a0034f144db378068f3aef2455cd47bec51ceb009ba46f5345e1d497c6f |
| SHA512 | 22301b5a654735e39b2afc89912d8a38b71435f76ce3504ff68fc76fb026b40b603d506d770a792055d0dd7f125d93f3265023315ffeb184f60871c2bd7bb731 |
memory/1380-294-0x00007FFE069B0000-0x00007FFE069E4000-memory.dmp
memory/1380-293-0x00007FF70D260000-0x00007FF70D358000-memory.dmp
memory/1380-298-0x00007FFE07230000-0x00007FFE07241000-memory.dmp
memory/1380-297-0x00007FFE07380000-0x00007FFE07397000-memory.dmp
memory/1380-295-0x00007FFDF0160000-0x00007FFDF0416000-memory.dmp
memory/1380-296-0x00007FFE07E80000-0x00007FFE07E98000-memory.dmp
memory/4816-299-0x00007FF70D260000-0x00007FF70D358000-memory.dmp
memory/4816-304-0x00007FFE07230000-0x00007FFE07241000-memory.dmp
memory/4816-303-0x00007FFE07380000-0x00007FFE07397000-memory.dmp
memory/4816-301-0x00007FFDF0160000-0x00007FFDF0416000-memory.dmp
memory/4816-300-0x00007FFE069B0000-0x00007FFE069E4000-memory.dmp
memory/4816-302-0x00007FFE07E80000-0x00007FFE07E98000-memory.dmp
memory/2852-315-0x00007FFE07230000-0x00007FFE07241000-memory.dmp
memory/2852-314-0x00007FFE07380000-0x00007FFE07397000-memory.dmp
memory/2852-313-0x00007FFE07E80000-0x00007FFE07E98000-memory.dmp
memory/2852-312-0x00007FFDF0160000-0x00007FFDF0416000-memory.dmp
memory/2852-311-0x00007FFE069B0000-0x00007FFE069E4000-memory.dmp
C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.Uh3064
| MD5 | f62221a211c7b0aef82e73461ab131d0 |
| SHA1 | 5a0f20dbcf65fa1222bfde061c1737926e427a18 |
| SHA256 | c817459f006991f92f46f73e97be3970408a3c3e1e0703099301b0a8be0769aa |
| SHA512 | 2ff01cf1ef6eded32b63b3d1317a1055cee092311e2712fdc3bb201af62a6039315455003adf810d495288025eeef017931de3c0ce43935814c893c3e6d6c609 |
memory/2852-310-0x00007FF70D260000-0x00007FF70D358000-memory.dmp
memory/2140-323-0x00007FFDF0160000-0x00007FFDF0416000-memory.dmp
memory/2140-326-0x00007FFE07230000-0x00007FFE07241000-memory.dmp
memory/2140-325-0x00007FFE07380000-0x00007FFE07397000-memory.dmp
memory/2140-324-0x00007FFE07E80000-0x00007FFE07E98000-memory.dmp
memory/2140-322-0x00007FFE069B0000-0x00007FFE069E4000-memory.dmp
memory/2140-321-0x00007FF70D260000-0x00007FF70D358000-memory.dmp
memory/1524-335-0x00007FFDF0160000-0x00007FFDF0416000-memory.dmp
memory/1524-338-0x00007FFE07230000-0x00007FFE07241000-memory.dmp
memory/1524-337-0x00007FFE07380000-0x00007FFE07397000-memory.dmp
memory/1524-336-0x00007FFE07E80000-0x00007FFE07E98000-memory.dmp
memory/1524-334-0x00007FFE069B0000-0x00007FFE069E4000-memory.dmp
memory/1524-333-0x00007FF70D260000-0x00007FF70D358000-memory.dmp
C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.lock
| MD5 | f16d8e2012077cf446416f7f7214e3bf |
| SHA1 | d395f2858ba941901be1abd6c5d00bf27d4f0e4d |
| SHA256 | 1a7e44cc8fdc276620d669f6cafe164a6cae157f7fcea614733e06acbf4dd927 |
| SHA512 | aa43e5dabbbdb9d80488b8494e8419c233b9dbcf3d8ed5dc69824d0419d8cf5d3959fb39e167b61245ff6b99e7e4c4dec379cb6b330ca9ace38548fec369e148 |
memory/4504-350-0x00007FFE07230000-0x00007FFE07241000-memory.dmp
memory/4504-349-0x00007FFE07380000-0x00007FFE07397000-memory.dmp
memory/4504-348-0x00007FFE07E80000-0x00007FFE07E98000-memory.dmp
memory/4504-347-0x00007FFDF0160000-0x00007FFDF0416000-memory.dmp
memory/4504-346-0x00007FFE069B0000-0x00007FFE069E4000-memory.dmp
memory/4504-345-0x00007FF70D260000-0x00007FF70D358000-memory.dmp
memory/1448-358-0x00007FFE069B0000-0x00007FFE069E4000-memory.dmp
memory/1448-362-0x00007FFE07230000-0x00007FFE07241000-memory.dmp
memory/1448-361-0x00007FFE07380000-0x00007FFE07397000-memory.dmp
memory/1448-360-0x00007FFE07E80000-0x00007FFE07E98000-memory.dmp
memory/1448-357-0x00007FF70D260000-0x00007FF70D358000-memory.dmp
memory/1448-359-0x00007FFDF0160000-0x00007FFDF0416000-memory.dmp
memory/2520-374-0x00007FFE069B0000-0x00007FFE069E4000-memory.dmp
memory/2520-373-0x00007FF70D260000-0x00007FF70D358000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\tmp7C2C.tmp.bat
| MD5 | 300c9a62a6e30b06be0af055eb2ed214 |
| SHA1 | bd5a0edeab4f00d9f53917d249df39a6fe934e3d |
| SHA256 | 68a57e404b3b0acb577956a53f479bb19df5e82a608b1ceb09b9bc2422913574 |
| SHA512 | ff4d8f40777307a9be4ec4a83242fee1c8f4e516817d98fdc835cdf39dbdde0103fa297d9458fc1bd003df850eb2ea2e26de7ad2b4371bd46d89e499ae1d6a22 |
memory/1088-563-0x00007FFDF5E10000-0x00007FFDF68D2000-memory.dmp