Analysis

  • max time kernel
    329s
  • max time network
    333s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-06-2024 22:40

General

  • Target

    https://cdn.discordapp.com/attachments/1251843507954651236/1253077187012202616/Image_logger_betaV0.1.exe?ex=66772d92&is=6675dc12&hm=09da2746deffaf08ecd9577d001ea1cb0fddc1f2595f42eeed47afc12915aed8&

Malware Config

Extracted

Family

xworm

Version

5.0

C2

modern-educators.gl.at.ply.gg:23695

Mutex

3YnM81doTROvxOJ9

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 42 IoCs
  • Modifies system executable filetype association 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 6 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1251843507954651236/1253077187012202616/Image_logger_betaV0.1.exe?ex=66772d92&is=6675dc12&hm=09da2746deffaf08ecd9577d001ea1cb0fddc1f2595f42eeed47afc12915aed8&
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe473b46f8,0x7ffe473b4708,0x7ffe473b4718
      2⤵
        PID:4468
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
        2⤵
          PID:5048
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1352
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2156 /prefetch:8
          2⤵
            PID:1260
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
            2⤵
              PID:3840
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
              2⤵
                PID:4556
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8
                2⤵
                  PID:656
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1892
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5004 /prefetch:8
                  2⤵
                    PID:4344
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:1
                    2⤵
                      PID:4732
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5972 /prefetch:8
                      2⤵
                        PID:4416
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1
                        2⤵
                          PID:2172
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6216 /prefetch:1
                          2⤵
                            PID:4996
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:1
                            2⤵
                              PID:904
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6304 /prefetch:1
                              2⤵
                                PID:5096
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,3661891145970992172,12257982539728223783,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5280
                              • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                2⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                PID:5376
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\XImage logger beta.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX0\XImage logger beta.exe"
                                  3⤵
                                  • Drops startup file
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5532
                              • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                2⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                PID:5636
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5724
                              • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                2⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                PID:5888
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\XImage logger beta.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX2\XImage logger beta.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:6028
                              • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                2⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                PID:5912
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX3\XImage logger beta.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX3\XImage logger beta.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:6096
                              • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                2⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                PID:6140
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX4\XImage logger beta.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX4\XImage logger beta.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:820
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:3800
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:5056
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:5344
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    PID:5544
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5852
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    PID:3472
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3664
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    PID:5052
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:6088
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    PID:4576
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3344
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    PID:420
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4176
                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                    "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
                                    1⤵
                                    • Modifies system executable filetype association
                                    • Checks processor information in registry
                                    • Modifies Internet Explorer settings
                                    • Modifies registry class
                                    • Suspicious behavior: AddClipboardFormatListener
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2992
                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart
                                      2⤵
                                      • Executes dropped EXE
                                      • Checks system information in the registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5308
                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                        C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Modifies system executable filetype association
                                        • Adds Run key to start application
                                        • Checks system information in the registry
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5972
                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe
                                          "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:5916
                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                          /updateInstalled /background
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Modifies system executable filetype association
                                          • Checks system information in the registry
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:6088
                                  • C:\Program Files\7-Zip\7zG.exe
                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Image_logger_betaV0.1\" -spe -an -ai#7zMap19979:104:7zEvent3828
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:3416
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1\XImage logger beta.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1\XImage logger beta.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5924
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1\XImage logger beta.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1\XImage logger beta.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4860
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k SDRSVC
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2720
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    PID:4424
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5004
                                  • C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe
                                    "C:\Users\Admin\Downloads\Image_logger_betaV0.1.exe"
                                    1⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    PID:5256
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\XImage logger beta.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:996

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

                                    Filesize

                                    471B

                                    MD5

                                    b8066c237d09f8e5a5ea41a82ae596aa

                                    SHA1

                                    3fa50d95bf6419659ca4acfdb3b23a85a3a7c26d

                                    SHA256

                                    72cd04d6ecf3e3b2f157270c9dcb632d6214f56528248e21fc34197f2e40dba4

                                    SHA512

                                    4b858b42a7c99103450e059eb5ad63753bb887d0a446e3535590636d2bfb415e725cd21096775e1262e026013b6de581a497d6531098e9b5f2df13be41a6bab7

                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

                                    Filesize

                                    412B

                                    MD5

                                    680ff05de010c89b793ae5b197004ab9

                                    SHA1

                                    988ae1a143529578734ebc5393e62b74bc3276dd

                                    SHA256

                                    07bb69d3a51c858194a103187f5670c544ef51423e63899b35f2d2470327caab

                                    SHA512

                                    345d91bec2765b4e1b71b02b31ad8cf43bb3cfb9048d19434bfd4304900468d7f47829dfd0a459b49c605955b72f4b186feb728452f74f4ec3c9b25fa61e5659

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\XImage logger beta.exe.log

                                    Filesize

                                    654B

                                    MD5

                                    2ff39f6c7249774be85fd60a8f9a245e

                                    SHA1

                                    684ff36b31aedc1e587c8496c02722c6698c1c4e

                                    SHA256

                                    e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                                    SHA512

                                    1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    dabfafd78687947a9de64dd5b776d25f

                                    SHA1

                                    16084c74980dbad713f9d332091985808b436dea

                                    SHA256

                                    c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201

                                    SHA512

                                    dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    c39b3aa574c0c938c80eb263bb450311

                                    SHA1

                                    f4d11275b63f4f906be7a55ec6ca050c62c18c88

                                    SHA256

                                    66f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c

                                    SHA512

                                    eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    186B

                                    MD5

                                    094ab275342c45551894b7940ae9ad0d

                                    SHA1

                                    2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                    SHA256

                                    ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                    SHA512

                                    19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    8874735b951e374d5810215b7ca1c1b2

                                    SHA1

                                    e1a20f7680a6bb254958d40edd36a668e616ac18

                                    SHA256

                                    b56ec5bb06ac088cfccaab85d2e61de153635cf482ba1bf9b50d8a5eb5c4b5ff

                                    SHA512

                                    7e1a5e75d26bd6b4f6104fc7f0ed6c48b380c5976d0d757477a5aa789db284fef4a16f050a8aa55c401ef1459113c108c2a517a91f9051c271b871ad8e19db84

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    f1c1bb17bb9187c18aecd288b0c50688

                                    SHA1

                                    6009ea3667069532f044238c0c6925c7ca8cfe70

                                    SHA256

                                    6128a39782ef90d80330f6d4f0ec71985a39752e696f4df38d5c918332ef90ce

                                    SHA512

                                    4c23e9544970539a102dfc2153f9a42baafc25555a1a20a8dfa72e42666b85ee19dc0489934d855362e5a65704b868ed74ad44adc5fb576f3218aee8ce832951

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    5f7b857914166a65bf9e524d56dc318c

                                    SHA1

                                    de3ed4ca2caaa1f293e4458d8dbb89bc97fe67fb

                                    SHA256

                                    1125ebbda8b644167e4255e21554343b1981f5bb4d28e383173454cd2831c7ec

                                    SHA512

                                    9eea2a6c2d4889961ba238b2b611b97492fa1f08d47fd7d1d6c38285ac27df9c5bbf0cb1d27399d13464c67fa912f31cee75e026e5d35dc9224806dabdf89bbd

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    644b181b504543790dd330263f80d575

                                    SHA1

                                    abf83c698293d427de1a9650417a1ac77893a6e0

                                    SHA256

                                    f338a1064c999b6c5ef918da182d65654ba955ec7ce8258a2276c46b4eac4b11

                                    SHA512

                                    c9624245ca1850cc572740b221ab1b2af5119bf72d915b9a96e709ab0ac33c75302a3094ef71ea8d5ea3e4104e77d29b9f481a2ff2908f53acce34a0f0e6963d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    6d7f1fc43a5791cf9e1b2cb4e02a5240

                                    SHA1

                                    205552c87875cf9d62f96bb797a2eea610d09d6a

                                    SHA256

                                    c1741c8ea2512a81124cf35e966379791e5cda7dcecbb5120a4e3229a2eca94c

                                    SHA512

                                    17d7dc22b4257e97cfb4dc5b39dce5343a0bfe7430bee8abc4bad5f2ca1ad6d37255699c58ae1aea28901be62af7f548c6de9a4e83e21eeb10efd28f5681e40f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    b5a5b1395ef1df3bd7f472b042e385f8

                                    SHA1

                                    6b95e097ced21276dfca5c5da91b248c9236ab46

                                    SHA256

                                    e89edbe89fc99bc17f9053398765ad97241c72e845c918bc368e9cef6198c9ed

                                    SHA512

                                    5cbe5667cdeddeb9c048cf412b198f8d22881adddeb7c481134a9711a9d08aa4955e1803738d64253acaf5c5902595d9c5d039fa6066504f4399d63d8ae0c84c

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe

                                    Filesize

                                    553KB

                                    MD5

                                    57bd9bd545af2b0f2ce14a33ca57ece9

                                    SHA1

                                    15b4b5afff9abba2de64cbd4f0989f1b2fbc4bf1

                                    SHA256

                                    a3a4b648e4dcf3a4e5f7d13cc3d21b0353e496da75f83246cc8a15fada463bdf

                                    SHA512

                                    d134f9881312ddbd0d61f39fd62af5443a4947d3de010fef3b0f6ebf17829bd4c2f13f6299d2a7aad35c868bb451ef6991c5093c2809e6be791f05f137324b39

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LoggingPlatform.DLL

                                    Filesize

                                    504KB

                                    MD5

                                    4ffef06099812f4f86d1280d69151a3f

                                    SHA1

                                    e5da93b4e0cf14300701a0efbd7caf80b86621c3

                                    SHA256

                                    d5a538a0a036c602492f9b2b6f85de59924da9ec3ed7a7bbf6ecd0979bee54d3

                                    SHA512

                                    d667fd0ae46039914f988eb7e407344114944a040468e4ec5a53d562db2c3241737566308d8420bb4f7c89c6ef446a7881b83eaac7daba3271b81754c5c0f34a

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-100.png

                                    Filesize

                                    1KB

                                    MD5

                                    72747c27b2f2a08700ece584c576af89

                                    SHA1

                                    5301ca4813cd5ff2f8457635bc3c8944c1fb9f33

                                    SHA256

                                    6f028542f6faeaaf1f564eab2605bedb20a2ee72cdd9930bde1a3539344d721b

                                    SHA512

                                    3e7f84d3483a25a52a036bf7fd87aac74ac5af327bb8e4695e39dada60c4d6607d1c04e7769a808be260db2af6e91b789008d276ccc6b7e13c80eb97e2818aba

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-125.png

                                    Filesize

                                    1KB

                                    MD5

                                    b83ac69831fd735d5f3811cc214c7c43

                                    SHA1

                                    5b549067fdd64dcb425b88fabe1b1ca46a9a8124

                                    SHA256

                                    cbdcf248f8a0fcd583b475562a7cdcb58f8d01236c7d06e4cdbfe28e08b2a185

                                    SHA512

                                    4b2ee6b3987c048ab7cc827879b38fb3c216dab8e794239d189d1ba71122a74fdaa90336e2ea33abd06ba04f37ded967eb98fd742a02463b6eb68ab917155600

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-150.png

                                    Filesize

                                    2KB

                                    MD5

                                    771bc7583fe704745a763cd3f46d75d2

                                    SHA1

                                    e38f9d7466eefc6d3d2aaa327f1bd42c5a5c7752

                                    SHA256

                                    36a6aad9a9947ab3f6ac6af900192f5a55870d798bca70c46770ccf2108fd62d

                                    SHA512

                                    959ea603abec708895b7f4ef0639c3f2d270cfdd38d77ac9bab8289918cbd4dbac3c36c11bb52c6f01b0adae597b647bb784bba513d77875979270f4962b7884

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-200.png

                                    Filesize

                                    2KB

                                    MD5

                                    09773d7bb374aeec469367708fcfe442

                                    SHA1

                                    2bfb6905321c0c1fd35e1b1161d2a7663e5203d6

                                    SHA256

                                    67d1bb54fcb19c174de1936d08b5dbdb31b98cfdd280bcc5122fb0693675e4f2

                                    SHA512

                                    f500ea4a87a24437b60b0dc3ec69fcc5edbc39c2967743ddb41093b824d0845ffddd2df420a12e17e4594df39f63adad5abb69a29f8456fed03045a6b42388bc

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-400.png

                                    Filesize

                                    6KB

                                    MD5

                                    e01cdbbd97eebc41c63a280f65db28e9

                                    SHA1

                                    1c2657880dd1ea10caf86bd08312cd832a967be1

                                    SHA256

                                    5cb8fd670585de8a7fc0ceede164847522d287ef17cd48806831ea18a0ceac1f

                                    SHA512

                                    ffd928e289dc0e36fa406f0416fb07c2eb0f3725a9cdbb27225439d75b8582d68705ec508e3c4af1fc4982d06d70ef868cafbfc73a637724dee7f34828d14850

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-100.png

                                    Filesize

                                    2KB

                                    MD5

                                    19876b66df75a2c358c37be528f76991

                                    SHA1

                                    181cab3db89f416f343bae9699bf868920240c8b

                                    SHA256

                                    a024fc5dbe0973fd9267229da4ebfd8fc41d73ca27a2055715aafe0efb4f3425

                                    SHA512

                                    78610a040bbbb026a165a5a50dfbaf4208ebef7407660eea1a20e95c30d0d42ef1d13f647802a2f0638443ae2253c49945ebe018c3499ddbf00cfdb1db42ced1

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-125.png

                                    Filesize

                                    3KB

                                    MD5

                                    8347d6f79f819fcf91e0c9d3791d6861

                                    SHA1

                                    5591cf408f0adaa3b86a5a30b0112863ec3d6d28

                                    SHA256

                                    e8b30bfcee8041f1a70e61ca46764416fd1df2e6086ba4c280bfa2220c226750

                                    SHA512

                                    9f658bc77131f4ac4f730ed56a44a406e09a3ceec215b7a0b2ed42d019d8b13d89ab117affb547a5107b5a84feb330329dc15e14644f2b52122acb063f2ba550

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-150.png

                                    Filesize

                                    3KB

                                    MD5

                                    de5ba8348a73164c66750f70f4b59663

                                    SHA1

                                    1d7a04b74bd36ecac2f5dae6921465fc27812fec

                                    SHA256

                                    a0bbe33b798c3adac36396e877908874cffaadb240244095c68dff840dcbbf73

                                    SHA512

                                    85197e0b13a1ae48f51660525557cceaeed7d893dd081939f62e6e8921bb036c6501d3bb41250649048a286ff6bac6c9c1a426d2f58f3e3b41521db26ef6a17c

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-200.png

                                    Filesize

                                    4KB

                                    MD5

                                    f1c75409c9a1b823e846cc746903e12c

                                    SHA1

                                    f0e1f0cf35369544d88d8a2785570f55f6024779

                                    SHA256

                                    fba9104432cbb8ebbd45c18ef1ba46a45dd374773e5aa37d411bb023ded8efd6

                                    SHA512

                                    ed72eb547e0c03776f32e07191ce7022d08d4bcc66e7abca4772cdd8c22d8e7a423577805a4925c5e804ed6c15395f3df8aac7af62f1129e4982685d7e46bd85

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-400.png

                                    Filesize

                                    8KB

                                    MD5

                                    adbbeb01272c8d8b14977481108400d6

                                    SHA1

                                    1cc6868eec36764b249de193f0ce44787ba9dd45

                                    SHA256

                                    9250ef25efc2a9765cf1126524256fdfc963c8687edfdc4a2ecde50d748ada85

                                    SHA512

                                    c15951cf2dc076ed508665cd7dac2251c8966c1550b78549b926e98c01899ad825535001bd65eeb2f8680cd6753cd47e95606ecf453919f5827ed12bca062887

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-100.png

                                    Filesize

                                    2KB

                                    MD5

                                    57a6876000151c4303f99e9a05ab4265

                                    SHA1

                                    1a63d3dd2b8bdc0061660d4add5a5b9af0ff0794

                                    SHA256

                                    8acbdd41252595b7410ca2ed438d6d8ede10bd17fe3a18705eedc65f46e4c1c4

                                    SHA512

                                    c6a2a9124bc6bcf70d2977aaca7e3060380a4d9428a624cc6e5624c75ebb6d6993c6186651d4e54edf32f3491d413714ef97a4cdc42bae94045cd804f0ad7cba

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-125.png

                                    Filesize

                                    4KB

                                    MD5

                                    d03b7edafe4cb7889418f28af439c9c1

                                    SHA1

                                    16822a2ab6a15dda520f28472f6eeddb27f81178

                                    SHA256

                                    a5294e3c7cd855815f8d916849d87bd2357f5165eb4372f248fdf8b988601665

                                    SHA512

                                    59d99f0b9a7813b28bae3ea1ae5bdbbf0d87d32ff621ff20cbe1b900c52bb480c722dd428578dea5d5351cc36f1fa56b2c1712f2724344f026fe534232812962

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-150.png

                                    Filesize

                                    5KB

                                    MD5

                                    a23c55ae34e1b8d81aa34514ea792540

                                    SHA1

                                    3b539dfb299d00b93525144fd2afd7dd9ba4ccbf

                                    SHA256

                                    3df4590386671e0d6fee7108e457eb805370a189f5fdfeaf2f2c32d5adc76abd

                                    SHA512

                                    1423a2534ae71174f34ee527fe3a0db38480a869cac50b08b60a2140b5587b3944967a95016f0b00e3ca9ced1f1452c613bb76c34d7ebd386290667084bce77d

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-200.png

                                    Filesize

                                    6KB

                                    MD5

                                    13e6baac125114e87f50c21017b9e010

                                    SHA1

                                    561c84f767537d71c901a23a061213cf03b27a58

                                    SHA256

                                    3384357b6110f418b175e2f0910cffe588c847c8e55f2fe3572d82999a62c18e

                                    SHA512

                                    673c3bec7c2cd99c07ebfca0f4ab14cd6341086c8702fe9e8b5028aed0174398d7c8a94583da40c32cd0934d784062ad6db71f49391f64122459f8bb00222e08

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-400.png

                                    Filesize

                                    15KB

                                    MD5

                                    e593676ee86a6183082112df974a4706

                                    SHA1

                                    c4e91440312dea1f89777c2856cb11e45d95fe55

                                    SHA256

                                    deb0ec0ee8f1c4f7ea4de2c28ff85087ee5ff8c7e3036c3b0a66d84bae32b6bb

                                    SHA512

                                    11d7ed45f461f44fa566449bb50bcfce35f73fc775744c2d45ea80aeb364fe40a68a731a2152f10edc059dea16b8bab9c9a47da0c9ffe3d954f57da0ff714681

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png

                                    Filesize

                                    783B

                                    MD5

                                    f4e9f958ed6436aef6d16ee6868fa657

                                    SHA1

                                    b14bc7aaca388f29570825010ebc17ca577b292f

                                    SHA256

                                    292cac291af7b45f12404f968759afc7145b2189e778b14d681449132b14f06b

                                    SHA512

                                    cd5d78317e82127e9a62366fd33d5420a6f25d0a6e55552335e64dc39932238abd707fe75d4f62472bc28a388d32b70ff08b6aa366c092a7ace3367896a2bd98

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png

                                    Filesize

                                    1018B

                                    MD5

                                    2c7a9e323a69409f4b13b1c3244074c4

                                    SHA1

                                    3c77c1b013691fa3bdff5677c3a31b355d3e2205

                                    SHA256

                                    8efeacefb92d64dfb1c4df2568165df6436777f176accfd24f4f7970605d16c2

                                    SHA512

                                    087c12e225c1d791d7ad0bf7d3544b4bed8c4fb0daaa02aee0e379badae8954fe6120d61fdf1a11007cbcdb238b5a02c54f429b6cc692a145aa8fbd220c0cb2d

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png

                                    Filesize

                                    1KB

                                    MD5

                                    552b0304f2e25a1283709ad56c4b1a85

                                    SHA1

                                    92a9d0d795852ec45beae1d08f8327d02de8994e

                                    SHA256

                                    262b9a30bb8db4fc59b5bc348aa3813c75e113066a087135d0946ad916f72535

                                    SHA512

                                    9559895b66ef533486f43274f7346ad3059c15f735c9ce5351adf1403c95c2b787372153d4827b03b6eb530f75efcf9ae89db1e9c69189e86d6383138ab9c839

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png

                                    Filesize

                                    1KB

                                    MD5

                                    22e17842b11cd1cb17b24aa743a74e67

                                    SHA1

                                    f230cb9e5a6cb027e6561fabf11a909aa3ba0207

                                    SHA256

                                    9833b80def72b73fca150af17d4b98c8cd484401f0e2d44320ecd75b5bb57c42

                                    SHA512

                                    8332fc72cd411f9d9fd65950d58bf6440563dc4bd5ce3622775306575802e20c967f0ee6bab2092769a11e2a4ea228dab91a02534beeb8afde8239dd2b90f23a

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png

                                    Filesize

                                    3KB

                                    MD5

                                    3c29933ab3beda6803c4b704fba48c53

                                    SHA1

                                    056fe7770a2ba171a54bd60b3c29c4fbb6d42f0c

                                    SHA256

                                    3a7ef7c0bda402fdaff19a479d6c18577c436a5f4e188da4c058a42ef09a7633

                                    SHA512

                                    09408a000a6fa8046649c61ccef36afa1046869506f019f739f67f5c1c05d2e313b95a60bd43d9be882688df1610ad7979dd9d1f16a2170959b526ebd89b8ef7

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-100.png

                                    Filesize

                                    1KB

                                    MD5

                                    1f156044d43913efd88cad6aa6474d73

                                    SHA1

                                    1f6bd3e15a4bdb052746cf9840bdc13e7e8eda26

                                    SHA256

                                    4e11167708801727891e8dd9257152b7391fc483d46688d61f44b96360f76816

                                    SHA512

                                    df791d7c1e7a580e589613b5a56ba529005162d3564fffd4c8514e6afaa5eccea9cea9e1ac43bd9d74ee3971b2e94d985b103176db592e3c775d5feec7aac6d1

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-125.png

                                    Filesize

                                    2KB

                                    MD5

                                    09f3f8485e79f57f0a34abd5a67898ca

                                    SHA1

                                    e68ae5685d5442c1b7acc567dc0b1939cad5f41a

                                    SHA256

                                    69e432d1eec44bed4aad35f72a912e1f0036a4b501a50aec401c9fa260a523e3

                                    SHA512

                                    0eafeaf735cedc322719049db6325ccbf5e92de229cace927b78a08317e842261b7adbda03ec192f71ee36e35eb9bf9624589de01beaec2c5597a605fc224130

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-150.png

                                    Filesize

                                    3KB

                                    MD5

                                    ed306d8b1c42995188866a80d6b761de

                                    SHA1

                                    eadc119bec9fad65019909e8229584cd6b7e0a2b

                                    SHA256

                                    7e3f35d5eb05435be8d104a2eacf5bace8301853104a4ea4768601c607ddf301

                                    SHA512

                                    972a42f7677d57fcb8c8cb0720b21a6ffe9303ea58dde276cfe2f26ee68fe4cc8ae6d29f3a21a400253de7c0a212edf29981e9e2bca49750b79dd439461c8335

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-200.png

                                    Filesize

                                    4KB

                                    MD5

                                    d9d00ecb4bb933cdbb0cd1b5d511dcf5

                                    SHA1

                                    4e41b1eda56c4ebe5534eb49e826289ebff99dd9

                                    SHA256

                                    85823f7a5a4ebf8274f790a88b981e92ede57bde0ba804f00b03416ee4feda89

                                    SHA512

                                    8b53dec59bba8b4033e5c6b2ff77f9ba6b929c412000184928978f13b475cd691a854fee7d55026e48eab8ac84cf34fc7cb38e3766bbf743cf07c4d59afb98f4

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-400.png

                                    Filesize

                                    11KB

                                    MD5

                                    096d0e769212718b8de5237b3427aacc

                                    SHA1

                                    4b912a0f2192f44824057832d9bb08c1a2c76e72

                                    SHA256

                                    9a0b901e97abe02036c782eb6a2471e18160b89fd5141a5a9909f0baab67b1ef

                                    SHA512

                                    99eb3d67e1a05ffa440e70b7e053b7d32e84326671b0b9d2fcfcea2633b8566155477b2a226521bf860b471c5926f8e1f8e3a52676cacb41b40e2b97cb3c1173

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.VisualElementsManifest.xml

                                    Filesize

                                    344B

                                    MD5

                                    5ae2d05d894d1a55d9a1e4f593c68969

                                    SHA1

                                    a983584f58d68552e639601538af960a34fa1da7

                                    SHA256

                                    d21077ad0c29a4c939b8c25f1186e2b542d054bb787b1d3210e9cab48ec3080c

                                    SHA512

                                    152949f5b661980f33608a0804dd8c43d70e056ae0336e409006e764664496fef6e60daa09fecb8d74523d3e7928c0dbd5d8272d8be1cf276852d88370954adc

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.exe

                                    Filesize

                                    2.3MB

                                    MD5

                                    c2938eb5ff932c2540a1514cc82c197c

                                    SHA1

                                    2d7da1c3bfa4755ba0efec5317260d239cbb51c3

                                    SHA256

                                    5d8273bf98397e4c5053f8f154e5f838c7e8a798b125fcad33cab16e2515b665

                                    SHA512

                                    5deb54462615e39cf7871418871856094031a383e9ad82d5a5993f1e67b7ade7c2217055b657c0d127189792c3bcf6c1fcfbd3c5606f6134adfafcccfa176441

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDriveStandaloneUpdater.exe

                                    Filesize

                                    2.9MB

                                    MD5

                                    9cdabfbf75fd35e615c9f85fedafce8a

                                    SHA1

                                    57b7fc9bf59cf09a9c19ad0ce0a159746554d682

                                    SHA256

                                    969fbb03015dd9f33baf45f2750e36b77003a7e18c3954fab890cddc94046673

                                    SHA512

                                    348923f497e615a5cd0ed428eb1e30a792dea310585645b721235d48f3f890398ad51d8955c1e483df0a712ba2c0a18ad99b977be64f5ee6768f955b12a4a236

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Resources.pri

                                    Filesize

                                    4KB

                                    MD5

                                    7473be9c7899f2a2da99d09c596b2d6d

                                    SHA1

                                    0f76063651fe45bbc0b5c0532ad87d7dc7dc53ac

                                    SHA256

                                    e1252527bc066da6838344d49660e4c6ff2d1ddfda036c5ec19b07fdfb90c8c3

                                    SHA512

                                    a4a5c97856e314eedbad38411f250d139a668c2256d917788697c8a009d5408d559772e0836713853704e6a3755601ae7ee433e07a34bd0e7f130a3e28729c45

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\UpdateRingSettings.dll

                                    Filesize

                                    432KB

                                    MD5

                                    037df27be847ef8ab259be13e98cdd59

                                    SHA1

                                    d5541dfa2454a5d05c835ec5303c84628f48e7b2

                                    SHA256

                                    9fb3abcafd8e8b1deb13ec0f46c87b759a1cb610b2488052ba70e3363f1935ec

                                    SHA512

                                    7e1a04368ec469e4059172c5b44fd08d4ea3d01df98bfd6d4cc91ac45f381862ecf89fe9c6bedce985a12158d840cd6cfa06ce9d22466fbf6110140465002205

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

                                    Filesize

                                    40.2MB

                                    MD5

                                    fb4aa59c92c9b3263eb07e07b91568b5

                                    SHA1

                                    6071a3e3c4338b90d892a8416b6a92fbfe25bb67

                                    SHA256

                                    e70e80dbbc9baba7ddcee70eda1bb8d0e6612dfb1d93827fe7b594a59f3b48b9

                                    SHA512

                                    60aabbe2fd24c04c33e7892eab64f24f8c335a0dd9822eb01adc5459e850769fc200078c5ccee96c1f2013173bc41f5a2023def3f5fe36e380963db034924ace

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                    Filesize

                                    38B

                                    MD5

                                    cc04d6015cd4395c9b980b280254156e

                                    SHA1

                                    87b176f1330dc08d4ffabe3f7e77da4121c8e749

                                    SHA256

                                    884d272d16605590e511ae50c88842a8ce203a864f56061a3c554f8f8265866e

                                    SHA512

                                    d3cb7853b69649c673814d5738247b5fbaaae5bb7b84e4c7b3ff5c4f1b1a85fc7261a35f0282d79076a9c862e5e1021d31a318d8b2e5a74b80500cb222642940

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                    Filesize

                                    108B

                                    MD5

                                    b93f7bf4190867edefe142abb7aa642e

                                    SHA1

                                    bca56c6ce86aed1c2b84c75789607430d636dbf6

                                    SHA256

                                    2b21729e7325c13ced9c2328e498c4d20122f44ba842ce9a54b3b57fd9fd8b65

                                    SHA512

                                    3407c4a916c777ad2537945920c4d590e83b51b124418df326bf4a4605b272f352328de6b37767bec2b0333e85257bb4d9e77b91a848da83e947b42d99d8babd

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.json

                                    Filesize

                                    63KB

                                    MD5

                                    e516a60bc980095e8d156b1a99ab5eee

                                    SHA1

                                    238e243ffc12d4e012fd020c9822703109b987f6

                                    SHA256

                                    543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

                                    SHA512

                                    9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

                                  • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini

                                    Filesize

                                    77B

                                    MD5

                                    41722381c904de5392ae0727b2d87c65

                                    SHA1

                                    c551d618a460017ea59a324635349bb80f288de8

                                    SHA256

                                    72fc24f4f48154f34b66b35f6cab7d549a3e42cdb9cebe91d0c5c2c12de71858

                                    SHA512

                                    cb1585804ed95db64b4158ced9d05e031beaf2386a51bb98a14a7169b979eb002b2133bebc3221f21b2ca26007801f3e7e3b6bc5ea5a13ca999e541841f5a379

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3NQFXGDW\update100[1].xml

                                    Filesize

                                    726B

                                    MD5

                                    53244e542ddf6d280a2b03e28f0646b7

                                    SHA1

                                    d9925f810a95880c92974549deead18d56f19c37

                                    SHA256

                                    36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

                                    SHA512

                                    4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

                                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\XImage logger beta.exe

                                    Filesize

                                    279KB

                                    MD5

                                    673ab7f6850b991878f1a7aafa7494bd

                                    SHA1

                                    8cc01935b97cc573511ebfec87a086cdd5f64f7b

                                    SHA256

                                    6cf09e890c04e4f3694906366436485b85d01106809cc12fa26107832d1dd8d7

                                    SHA512

                                    72709b065adbd257c9fa39ed614fe791c929cc4db1b73efd385ee037540c355c3ea4617595af131693941f49510b9acb0fe8ae460d5c345a7451f7e8484b6aa0

                                  • C:\Users\Admin\AppData\Local\Temp\tmp6FC7.tmp

                                    Filesize

                                    35.9MB

                                    MD5

                                    5b16ef80abd2b4ace517c4e98f4ff551

                                    SHA1

                                    438806a0256e075239aa8bbec9ba3d3fb634af55

                                    SHA256

                                    bbc70091b3834af5413b9658b07269badd4cae8d96724bf1f7919f6aab595009

                                    SHA512

                                    69a22b063ab92ca7e941b826400c62be41ae0317143387c8aa8c727b5c9ee3528ddd4014de22a2a2e2cbae801cb041fe477d68d2684353cdf6c83d7ee97c43d4

                                  • C:\Users\Admin\Downloads\Unconfirmed 888136.crdownload

                                    Filesize

                                    595KB

                                    MD5

                                    c6764bd94862ab345c860ea174bf638c

                                    SHA1

                                    62d799fc80275faa9084ea4b1d2dc981d7cf56c1

                                    SHA256

                                    83cd09db1595a65a665e5b60a0d8bd718bbefb8a3139bf81f24589fc6028daea

                                    SHA512

                                    98b4b4e5eb30209a50ea03db97aba3e70ab7f1f05082d699bc171db1ff79feb9e804f453409185d34f2d17171040749b0551c32f862872cfe40839e4df6ceb32

                                  • \??\pipe\LOCAL\crashpad_4456_DKAAIQYWNYMPPBZW

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/5532-89-0x00000000002D0000-0x000000000031C000-memory.dmp

                                    Filesize

                                    304KB