Malware Analysis Report

2024-09-11 13:45

Sample ID 240614-qvenhawfnr
Target XClient.exe
SHA256 27f0f3826330f7792ca5c49b2a34713cae074fc99e6441f8902281cd39bc313c
Tags
xworm execution persistence ransomware rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

27f0f3826330f7792ca5c49b2a34713cae074fc99e6441f8902281cd39bc313c

Threat Level: Known bad

The file XClient.exe was found to be: Known bad.

Malicious Activity Summary

xworm execution persistence ransomware rat trojan

Xworm family

Detect Xworm Payload

Xworm

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Checks computer location settings

Drops startup file

Adds Run key to start application

Drops desktop.ini file(s)

Looks up external IP address via web service

Sets desktop wallpaper using registry

Unsigned PE

Enumerates physical storage devices

Suspicious use of FindShellTrayWindow

Uses Task Scheduler COM API

Modifies Internet Explorer settings

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 13:34

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Xworm family

xworm

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 13:34

Reported

2024-06-14 13:37

Platform

win7-20240221-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XClient.exe"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A

Xworm

trojan rat xworm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Edge = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft Edge" C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\XBackground.bmp" C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424534032" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C1AECB1-2A53-11EF-878B-CAFA5A0A62FD} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb748847b223f147868adf47a64cc1b1000000000200000000001066000000010000200000005f480b53ec760c6b138b35fac72324594e9137df19866a1ea842becf6b8fb0ca000000000e800000000200002000000070dace66180323de953e8b4455b6052b7ace06a66d74064909d90bf0cd8651e820000000e558715d202b46e167e728aa61c3d92f24696f6f479a7f6ee14ae5eff07265c640000000e9f4cee13bc2fc6c5d557f81ba47ab6ef092945890c902b22b742487e33d71e8838457d5d4b860be94d31e9a6376d41a78c96740b0ca3940e7afbfec6613e62d C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c7b3e05fbeda01 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1948 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2456 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2456 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2456 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2984 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1948 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\schtasks.exe
PID 1948 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\schtasks.exe
PID 1948 wrote to memory of 2796 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Windows\System32\schtasks.exe
PID 1948 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 1948 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 1948 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2580 wrote to memory of 2256 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2580 wrote to memory of 2256 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2580 wrote to memory of 2256 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2580 wrote to memory of 2256 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\XClient.exe

"C:\Users\Admin\AppData\Local\Temp\XClient.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft Edge'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft Edge'

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft Edge" /tr "C:\Users\Admin\AppData\Roaming\Microsoft Edge"

C:\Windows\system32\taskeng.exe

taskeng.exe {BB4B14FD-6947-474A-B4AA-D40CB27288A6} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\How To Decrypt My Files.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:2

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 loans-clip.gl.at.ply.gg udp
US 147.185.221.20:6807 loans-clip.gl.at.ply.gg tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

memory/1948-0-0x000007FEF5433000-0x000007FEF5434000-memory.dmp

memory/1948-1-0x0000000000C80000-0x0000000000CB6000-memory.dmp

memory/1948-2-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

memory/2752-7-0x0000000002A10000-0x0000000002A90000-memory.dmp

memory/2752-8-0x000000001B680000-0x000000001B962000-memory.dmp

memory/2752-9-0x0000000001ED0000-0x0000000001ED8000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 563af186a2f72f27fe9ee83c24f385ac
SHA1 c30706719917876ac4ddccda049ee3fa10a3f369
SHA256 70c70ff11340edd7844b8972bd6c6f200f2202c60fe794c4874dff13ab750994
SHA512 965aaad9d063f9f1de4223f7f03837e1064cf662894f7a3d84eca3eb1e993de18146794540be677f4e5b4c5c8f1b9ce86da431bdf0adc3cd12dd397d89a23248

memory/2744-15-0x000000001B7D0000-0x000000001BAB2000-memory.dmp

memory/2744-16-0x0000000002250000-0x0000000002258000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/1948-31-0x000007FEF5433000-0x000007FEF5434000-memory.dmp

memory/1948-32-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

memory/1948-34-0x000000001B000000-0x000000001B00C000-memory.dmp

C:\Users\Admin\NTUSER.DAT{016888bd-6c6f-11de-8d1d-001e0bcde3ec}.TMContainer00000000000000000001.regtrans-ms.ENC

MD5 6ddd2622f2797f819be03a663299cc98
SHA1 fb8a8b0279ce34f6b77dd1d4efa5de92f1e75b14
SHA256 757f76766cd89e141394ef188c786c7c6ae6d6a4aac53ad0b63de63d716d9374
SHA512 3f0b643f87a669257a823010b2b20dab0078ec54dc4f0b92458055e05d7e62e6ebe3af5b2778f0dc9e9739ab2e84681d06b58037118c5e6c981f518367309fb0

C:\Users\Admin\Desktop\How To Decrypt My Files.html

MD5 ed3cb8b1037e7f6d5644e65200bce516
SHA1 cbb00c3af3cb0d7c23cc4641b261c448cae21a10
SHA256 667f1ab0e532a5deabbb68f6e993dd787209fabc62cdabe75a57cabb4cee9051
SHA512 9bff40c87a0b21ce0c661edcb0e73afda5b731d841be926b401ba4a21d942dd54e6c79c7c742212ede2947a9f95056a30c24644ff265a498b92b3f8f4e81c43d

C:\Users\Admin\AppData\Local\Temp\Cab802B.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar812B.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 60e875cbc91746343449aa4639983b5f
SHA1 fd55d01b80db79c0e82b4030f9b6d35d9e848b64
SHA256 6b14f34f00fa66fa21fb50c6b55083ee33e209dea9506479652a22b3afe1e338
SHA512 754ba4622297b0bf961586f608a943e2e761fcfc7bab9e182b46ec8bf4f596d3f9b682482806a89052e73b29fe5649c672e43567b5180f40702f4e662c77499c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f02b5b283c6fec81fe4ecf6a1e7d3bed
SHA1 0b5ad4f2443196da85e3de4422911d7f3fa14343
SHA256 69fd9d425cba718b4db9718f747db51aa73a89ab9639bf27c3fc9ce5f3bf007b
SHA512 ded2b713d705b28df45aa152361beab5416202ef9e9f6df7a0109f611b0cc551f02f2b7aef95cfa72ce003596fa38e0e7008d3e62d59988207aaf59f4b8e2cef

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b76808bfad046b26245b52c5b33782b9
SHA1 c2304685730e9406fb99f2fdb3e4ebacb0384f9d
SHA256 275d5db474bd6cddae7c93b53819926c589c58baaaa6fc06a3f4800229967873
SHA512 aa36c33e84dfaa3d7c93bf2b14d5fb94a94d1d6e64fb99a3f1e73ac672d4dd7e5d6aae3f8f49eabb11991867efe987fe47da1aa10ce6b6160e3538e24cf48131

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 715ac331d00a1f5d7179521044546338
SHA1 2d8481b3ab3087ca00da3e717522c0fe358bcc59
SHA256 04267f76dfbba7793432ea992f1c9e768ad69705fe5f33ad0983ed763aa83bed
SHA512 0410f69936579681e06d1c6cc224430992801e3ebe0b90367a031a35643ff69eaa6863b2b65dce8a9f51bc0593a498ce75aa63186ab98ef47a4762187e581c1c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 86eb1c65402d235bfe88f85c8d38b0b4
SHA1 2f8d0eddbcd83c6bfb38e0bf03ca0c3dc1147fb5
SHA256 5414cba0055744025fcb2d839c83d25662439bcd65e7aab66346315f00ba55e4
SHA512 f65a991793fa7812fac25d0510d63d83edd037d174c133243d3b929d3823954ac3b0cc642a3a9c2bc1bd68067d98f9bda2744b3375e2b7eb13f2cf6ff64d932e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 62a214a292cfc7fcf43b617f042633e5
SHA1 401c063eafb2a0afcc29a6737587091038ce598b
SHA256 abe578dcc9ecf3b728f21a663e7d06d649312a9e27dacc027382d366e1781b6a
SHA512 e9661e1d9050424e92e74521245c394f9be8b677faff0a8ee53a961c99d65042f6eab9ac8ee5750aa04e59d9bf9c073f957ed0dd0256023f260c67e3f116bc99

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b30e4d15e3bc79405dd3c59330e0fa5a
SHA1 74e2e610e3d8201ed9126a35f5fc11b67b6b0f4a
SHA256 71f5ed399003d6e3f06dadadb03372c7edc30db210ec76002fb5beabddc243c7
SHA512 3328a5f171bb84a24f7e7336b367e5607a6cca816214e44f90fccf6f57e9fdfcc8f002129c32fb630b98765e86b061867bab776a90620876f6539deb4ba85816

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 51a4667fe7115dca6f6f23403ac25423
SHA1 30b218a58dc3869acacb0d1993c355495c4f307e
SHA256 7ce0b0e4d453bea3208c2454c0d3258392cbcad4fba7beb70fafbd4acd56a8a4
SHA512 f8b5d9e9e00abc4f87971f9cbb2bfc3f756dc99f60fb5d5a90433f1d0c7ff2d562a669e1415b43eb8ca59b02ed013d3901be0faae24d05a184e49b6329bbf57a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7b4b9d59ae4017df548035446d79e11c
SHA1 0aa559a9d72d98841cc51097d662a4f20166ad6c
SHA256 0678b9d9d055e51690e5add09b1780eccd907e528bb97b2d320f4aef5cb8079b
SHA512 82001c5eae3bad9217a444cd71b0ac7a26a22692995eecd4d0e57bbba88e692ad80cdcff3089854c2e6c1a27e100e57304b1fbdba6257458d8890818f31f6880

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4ca5b786913ab6ea269cbad03da2b6b7
SHA1 5cbb21c8c7dd7a84dd3950e6d8a93a614b52087e
SHA256 e617d1f6af94bf76c9d7cbebce272d9998f37cfc004ebd58058a664c036854f1
SHA512 2e680f179b04c426efbbb2fcae177c4d996c2f76d70a8707a630be30df3e7d9baa443cfb6bb9a1518ff1153761d435f9a78b1232654f229ce7980354566d5bf5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7c6f39c1f4d67a88ba2070651a52de83
SHA1 efc842f437b3c1747b73b760b09f84344299e66a
SHA256 e8842177afbc44efd9942e662ea8429b0c81c027fd5c5a85580771df81705212
SHA512 c4bca22a8071c24c1b78c390fc0b8488c3b76509045b1954f0db2b30cd24bda33622a878768741bc5562619be6606c1903a021166a52e85820a5f3115df8a698

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 12e914fd20d227f72a7121f3a42add89
SHA1 ccba016d67e1391c010344431827e507b32c832a
SHA256 ff23e20df29937e9606056211da834c7af6c0ad5159b2399a6e0baf167f31936
SHA512 507519eeb160deda06887933cf485b618f5546079f05635ebbc0b9d077e38c130bcdb6c51723c3e88e8abbb857bb4fd415679ad63e101d6b950086ee007912ce

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 806d718b6bbcc51245658da55fa0bb4c
SHA1 1ba583fa99a4f227dc92db3f998a1d2e98fdd3e5
SHA256 b01219e3160131bee8dfd6eb8575d66d04f618e94ada7a6aa5677644574e85ec
SHA512 08cbf85864ab0bfbf50f868435c7979bac060826109148e653990d94e09fcb2fb5e8d6690f1df5d53bd46e9971b35e7159a9cbf7e893fafe8f139c35ebdb185f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 df33fe08794c322ac6413b4fa02a12ef
SHA1 3e2a6b2808c5797c95d9786e6f4575835493e976
SHA256 8f75b733e0a13c455e945e6487cd0f26716107ed3683ab767f3c9850720ae094
SHA512 435f9305656610606e5c5bf5199e120fb7cfaf934dd44405c77b3e53bdadc72071af69b7ac8e5743292f02c9415f9bbec18d102a97ad312e72e4c36694acb8a8

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8be5adcf20574546082d542b24a283ea
SHA1 8bb339b51624ed647936b3b1e158dff775153e4e
SHA256 e73d75c29d10c1ff7460c399ca13a2d99729b7beab9e0af7d785f744bad70100
SHA512 4962f8df75c49eea252cfe401ec1cfb2a08bbed703f35fcfa50045feb1ad86361f565625b58881e70354d581e0b159ff9c40428aed9145e1adf72ada1e2182b4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 70bb26cc8aa6b53bb3ac352a14d68dea
SHA1 5fc848d9957fbd3f50dc218af8a59c17fe768d66
SHA256 9c9953fd0edd2f254f4ce2b055b2f818e38aad61f2b3dda60b7478bbf1656d18
SHA512 e663f4cfb3bcae86f58b31348313f26dbda5bc93a3b3f957c7577d34c37cb0f5cfc4b0bbae79f38cfe252f72d776c4cec6f5c9d0ad9df024925e379fc5ec9c27

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3cbdcc3626c5fb6983b8faf650a56048
SHA1 9f9bc756b48222bf2842564761ce1657fdd625ef
SHA256 98eb3816c4f1115b5ef8d9b5fb4bcc1ddfe6c57c9d49dc1fbe62fd710264f5f8
SHA512 07156632742cdb07c19d891efa84cff9d4d7440db38e385e2bcd642d6fc800a3d380bc7c7018fa153150c0d5a95aeca2b0185b17fbc66a818ca2b9d59ee40183

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 47c377c265eae479eb93d27bfb53856c
SHA1 b36a18fc9046ee905cb63381283e3e1af5fbd675
SHA256 363f5932b983ddb30ee1caeb06e0ec2444fc8c16607123e9f69029256164976a
SHA512 e50713c9e43e56b6522d56daa2818f285fd3020982e8fb45e8ceb75dcba734dbd3e744e24632d0bca1e433747203a09ac7428ff0c4aecce8ac495881bcb7ef58

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fbd94b6ddb522f667017123df6d04af8
SHA1 f00ce782d87b7e9d2d36d3fdb70faca49372620c
SHA256 b0407aacb801c51f6ee35d8a061435e5930d19244c7de73c55bf392e1a658635
SHA512 bdee627345b7b508cff0ea8c17884a2ce77b60db8efb319a511222720932d017c3116157aa2a8e0b10cb506df593e42efed0fe2b3f93a0adfe88fd3acce47a49

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 57381ee28b0cdceb33d837264dfc1ee4
SHA1 787aada9f4d2b4f897aa1cb5d77ade13163ef8cc
SHA256 069642f6c2a9d0db4bc80a44cdc76b5cd4dca1f1d1b0668a97a44fe06368a8c0
SHA512 210e544259e52c347ee70a9c6ae7111b2309414927949150dba4d7e123646f63bb41b6f84ee9dca6a007b503372f1c5e1db68ce611aead95cae1289d6090cfce

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 13:34

Reported

2024-06-14 13:37

Platform

win10v2004-20240508-en

Max time kernel

139s

Max time network

56s

Command Line

"C:\Users\Admin\AppData\Local\Temp\XClient.exe"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Xworm

trojan rat xworm

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Drops startup file

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Edge.lnk C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft Edge N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft Edge N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Edge = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft Edge" C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft Edge N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft Edge N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\XClient.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\XClient.exe

"C:\Users\Admin\AppData\Local\Temp\XClient.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft Edge'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Microsoft Edge'

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Microsoft Edge" /tr "C:\Users\Admin\AppData\Roaming\Microsoft Edge"

C:\Users\Admin\AppData\Roaming\Microsoft Edge

"C:\Users\Admin\AppData\Roaming\Microsoft Edge"

C:\Users\Admin\AppData\Roaming\Microsoft Edge

"C:\Users\Admin\AppData\Roaming\Microsoft Edge"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 8.8.8.8:53 loans-clip.gl.at.ply.gg udp

Files

memory/2300-0-0x00007FFD5BCF3000-0x00007FFD5BCF5000-memory.dmp

memory/2300-1-0x00000000004D0000-0x0000000000506000-memory.dmp

memory/2300-2-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp

memory/4388-4-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp

memory/4388-3-0x000001AD8DF80000-0x000001AD8DFA2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_iera1b5l.rwb.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4388-14-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp

memory/4388-15-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp

memory/4388-16-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp

memory/4388-19-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 2e907f77659a6601fcc408274894da2e
SHA1 9f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256 385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA512 34fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 60945d1a2e48da37d4ce8d9c56b6845a
SHA1 83e80a6acbeb44b68b0da00b139471f428a9d6c1
SHA256 314b91c00997034d6e015f40230d90ebbf57de5dc938b62c1a214d591793dbe3
SHA512 5d068f1d6443e26ae3cad1c80f969e50e5860967b314153c4d3b6efd1cfa39f0907c6427bec7fa43db079f258b6357e4e9a1b0b1a36b1481d2049ea0e67909ed

memory/4280-43-0x000001E97F950000-0x000001E97FB6C000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5cfe303e798d1cc6c1dab341e7265c15
SHA1 cd2834e05191a24e28a100f3f8114d5a7708dc7c
SHA256 c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab
SHA512 ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e

memory/2300-55-0x00007FFD5BCF3000-0x00007FFD5BCF5000-memory.dmp

memory/2300-59-0x00007FFD5BCF0000-0x00007FFD5C7B1000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft Edge

MD5 736b616f619ddca45592fe8ca46fd3ee
SHA1 db5f95398874e023a62025bad772dffdc950c44f
SHA256 27f0f3826330f7792ca5c49b2a34713cae074fc99e6441f8902281cd39bc313c
SHA512 5f31ca006d95cfa441d16014ef0adc66d2a06fa1bc92dd5e96653df09ac3326a793c86cbe4a9123571bb1b5e47f5094cc982860e956b72a61a34fe0c3a475c5d

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Microsoft Edge.log

MD5 2ff39f6c7249774be85fd60a8f9a245e
SHA1 684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256 e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA512 1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1