Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-07-2024 17:37

General

  • Target

    https://mega.nz/file/reRiVaCS#odATc4JLLDgRNkMl1fdGkKcPa4dqZPcdV-dsje8zZp8

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

cool-yugoslavia.gl.at.ply.gg:42375

Attributes
  • delay

    1

  • install

    true

  • install_file

    roblox.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/reRiVaCS#odATc4JLLDgRNkMl1fdGkKcPa4dqZPcdV-dsje8zZp8
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3196
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff97a013cb8,0x7ff97a013cc8,0x7ff97a013cd8
      2⤵
        PID:2564
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1952 /prefetch:2
        2⤵
          PID:2816
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3704
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:8
          2⤵
            PID:1192
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:1
            2⤵
              PID:4792
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:1
              2⤵
                PID:3576
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3236
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5464 /prefetch:8
                2⤵
                  PID:3644
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:1
                  2⤵
                    PID:2724
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:1
                    2⤵
                      PID:2784
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:856
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                      2⤵
                        PID:4684
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:1
                        2⤵
                          PID:1172
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:1
                          2⤵
                            PID:4080
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6220 /prefetch:8
                            2⤵
                              PID:3056
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1232 /prefetch:8
                              2⤵
                              • Subvert Trust Controls: Mark-of-the-Web Bypass
                              • NTFS ADS
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4872
                            • C:\Users\Admin\Downloads\Infected.exe
                              "C:\Users\Admin\Downloads\Infected.exe"
                              2⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4496
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "roblox" /tr '"C:\Users\Admin\AppData\Roaming\roblox.exe"' & exit
                                3⤵
                                  PID:4992
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /create /f /sc onlogon /rl highest /tn "roblox" /tr '"C:\Users\Admin\AppData\Roaming\roblox.exe"'
                                    4⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3924
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9A47.tmp.bat""
                                  3⤵
                                    PID:2492
                                    • C:\Windows\system32\timeout.exe
                                      timeout 3
                                      4⤵
                                      • Delays execution with timeout.exe
                                      PID:4692
                                    • C:\Users\Admin\AppData\Roaming\roblox.exe
                                      "C:\Users\Admin\AppData\Roaming\roblox.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4704
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,1807184170894810891,2314038448938301409,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2616 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5556
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1668
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4160
                                  • C:\Windows\system32\AUDIODG.EXE
                                    C:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004D8
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3492

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    4656c526f71d2c1122865ef7c6af3ff5

                                    SHA1

                                    61684265064c225f323d304931ff7764f5700ac2

                                    SHA256

                                    7172417b8464d5c2f52edfc867f4d83e475b58fd316b1916cdde30ed5bdde80e

                                    SHA512

                                    c3e4fc0baa216ef561a448e42378af01a50e0ebd9b5fe554c9af0ea3362b9ca2f4a1b99cfab66c18df085250dd7a5ca1b01ab256e28156d657c579f5518aa56a

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    bc5eae38782879246edf98418132e890

                                    SHA1

                                    46aa7cc473f743c270ed2dc21841ddc6fc468c30

                                    SHA256

                                    b9dd7185c7678a25210a40f5a8cac3d048f7774042d93380bbbd1abb94d810d7

                                    SHA512

                                    73680b22df232f30faa64f485a4c2f340ba236b5918915866f84053f06532b0a722c4ee8038af3689ac04db41277c7852f7a11a0a15833ef66bcc046ee28afb7

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    72B

                                    MD5

                                    f9fc6ad1ddc8d098016fe4e329f09e5e

                                    SHA1

                                    b57d6119741da78ed7ac3349f235fe1cfa486d3c

                                    SHA256

                                    2c8585c21db3b7ef2c729034a03697391e257379fa9c9b83f53565944b3ee12c

                                    SHA512

                                    9cfda7b97013c25dbbdaf0b1e416b000424d1e444dd52420e434729b0ecd50a61bcc73529f38a2a94dee5882af71b569bbf16b2d952b475633414ab39b815fb1

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    188B

                                    MD5

                                    008114e1a1a614b35e8a7515da0f3783

                                    SHA1

                                    3c390d38126c7328a8d7e4a72d5848ac9f96549b

                                    SHA256

                                    7301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18

                                    SHA512

                                    a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    386e606c6aba22d8cc365d7bf7be47af

                                    SHA1

                                    c91f2d4eac63230ef568247f27cc0e07e933e2e1

                                    SHA256

                                    7246e60c487ea0b3d27f5ea91736179c08926057e845fdd26cae12d6c0d028ad

                                    SHA512

                                    e6444510f145ac942c63080d460d21b3893d1c3771a67842832324525acc377650f370676b2da0dabc8803f03e250ae3b7b12a9aa7656be80bb0a3a3b0fa279a

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    912a689f6c769e4e7fc8d81ca3cb9bdf

                                    SHA1

                                    db3c99f30df2a97e024b4848011391d8000bf05a

                                    SHA256

                                    f670cf694764fe724a4faddd08726d885b4f04b9378d152a75dc2fdd5bbc38d0

                                    SHA512

                                    0c677313089647cdbe3eb8ee6abca9b2854677fb672e26af7cdbde1a71120807f3ab1cae8627f7bc4997a8649403759000deee18fc802ac49f6e65e6a5784ae7

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    e4966fc4c57607c5a719f7976cbb25e1

                                    SHA1

                                    5c25c9fd245fb1106441adcb5292635da13078df

                                    SHA256

                                    636ec954bc03aedffff4a837a315a798ccdbe70b578acf3cb67248cf33ea3dce

                                    SHA512

                                    9c05bd2b1b5ebe96a74ccb14ea0890979930e412f569e55d19d309a1f40ec51587a7e8b23a6f72cf4663c39e9ce4209e3ba8b37c9542eede69fd8092af545f66

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    3051d4de44090eaa7cc1795255644770

                                    SHA1

                                    8f9ca2ba3568eddeed40ef277e2a367e007b255b

                                    SHA256

                                    25ea16fa3b4cbaf537cf237027607a74075a03f922effe91e941221db9874799

                                    SHA512

                                    c32257d227f7c0fca5ef60173435891499035e60d78dd2ad02da10e61fce7706e7a92a553e9de738f91323d3f7a0ef534ce25316349b3bdbcf6ac70db2c10990

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                    Filesize

                                    41B

                                    MD5

                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                    SHA1

                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                    SHA256

                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                    SHA512

                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                    Filesize

                                    72B

                                    MD5

                                    921dcf02f111f30fd7fd221c773ac46f

                                    SHA1

                                    5d02db58b5b95e64f400eb5217cce0495211dea4

                                    SHA256

                                    bf2daeb30dc92cc740ec0f939d7efe0063053f30083c80d5828464be1929943c

                                    SHA512

                                    7b9fe5b8b96b2963c3559ff1c6d7e8308072fe38f9b57898e8d3eb55723e19d8b16bf203f86a99dd4c902fd2b50524ffa32f01ea18e2f9e524a30eb0bf32163c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5812d7.TMP

                                    Filesize

                                    48B

                                    MD5

                                    edcfd4074859a26df2f8a58b694ca122

                                    SHA1

                                    49dfd061e96762118b27888a25cbfa05e146e300

                                    SHA256

                                    fce22bca3f20fa029c0b8da15f5de4638b1e64d13f3258d9bf7f42dfd3df5eff

                                    SHA512

                                    f1abcc6ff1073956f337b55232324be65dd26840360e7b6401ad58235e506fa4c1615642523749d8b48f1de82eb3bc590b8eab9ecd99b46eac7cba5ba74bb46b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    206702161f94c5cd39fadd03f4014d98

                                    SHA1

                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                    SHA256

                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                    SHA512

                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    9815e5722dded4920bd9306d8668474b

                                    SHA1

                                    296124ad04d46d1deaf01e1b12bd54a5cdff69cd

                                    SHA256

                                    56597ae34fd1b37c245c9dbf4eb75197f4e58626ef2fc1d4b1a0b6aa43b0d43d

                                    SHA512

                                    1ef66a20dd1aed6a1728d7f8ff06803ab607f5f2e1ca97109df96da19c2b1c8d0703d300c6382c23f4b18aafa7ce54b697ea1b1962318a5a3060a8ec31a43397

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    8a2a6c76594c3e263a299c8f7cf30e0a

                                    SHA1

                                    41a243b1a7eda5ce6a212482633ed803458b690f

                                    SHA256

                                    1d780cff753e69d5d778e409e7d129178fbd0e7ca18277f640d7b4bea84cbc58

                                    SHA512

                                    0f58c9f8592d101c9c747a88d4f6562230bdf2e2c40fe334c633969805e727d36889a379b961399d0898ee75c77904e5e7fd463234d91d3e849cb082c0f969bf

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    a4a44baffc90d011d9293221aa1fff4e

                                    SHA1

                                    f4efe299fb54664c269177da0b39101321b851af

                                    SHA256

                                    40ab718befafd5a6ecb005868f7d47f6a93df3b2a3747adc07ac3518ec0754d7

                                    SHA512

                                    bb4fff42ce25b1af0e6aafae06f388fc9cad779832308becfe039607a538c321a7bef1b71cc4dede6c5c1cdeaad2cacebd7ed8e26f8b730f4f66347e6dc8fe40

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    fcf609959af22acd750dc1aca20eaf04

                                    SHA1

                                    a67ec8b5c8c56a0197295792f946b8b96a230367

                                    SHA256

                                    c1ce7a6cd5378e478e66fea7344719a1bb27761219b9e8abb36bcb53463e74fb

                                    SHA512

                                    aa82bdc7b46b617874a5b136960c821cda7f4fdb24fb8573aee288b349863cdf5bb6fb6a80910ed9631eb2ee81ca09fe25f4dbe8eebc9be34e60fd13e6072574

                                  • C:\Users\Admin\AppData\Local\Temp\tmp9A47.tmp.bat

                                    Filesize

                                    150B

                                    MD5

                                    0b0a02951800925f7664abbbed7b8c18

                                    SHA1

                                    ac77e104e784104efca414ca8417c2f83c118266

                                    SHA256

                                    e2c7e77b10bcb2ff0c91199afbc92f4f17bbd051b16eac95a74bfeeab8a557b9

                                    SHA512

                                    e7cd9c320b2c7d6a76fbf9719ab394f343cb7b219e1eb3fd17c23c6dafcfab4a92712cfd6900ace0f0cdbd2ceb206977285148003c7d74375b59ab2fa3aef832

                                  • C:\Users\Admin\Downloads\Infected.exe

                                    Filesize

                                    63KB

                                    MD5

                                    7ae82558a7c2c4e824f58ac4e761b1c3

                                    SHA1

                                    d298409fa638396709e8a29d44fef162ebfc8dbd

                                    SHA256

                                    4b4136939eb8003f67840a2c75c82a856f6ec1a081735a0533709404063828a8

                                    SHA512

                                    d38655f6ed931aa81025c39248e0744e03044706e6b483fc2062785bee3bd619eb371323f471278467727a40ba5ea8fb625e3d078551dfd2cc825ce448e73d57

                                  • C:\Users\Admin\Downloads\Infected.exe:Zone.Identifier

                                    Filesize

                                    52B

                                    MD5

                                    dfcb8dc1e74a5f6f8845bcdf1e3dee6c

                                    SHA1

                                    ba515dc430c8634db4900a72e99d76135145d154

                                    SHA256

                                    161510bd3ea26ff17303de536054637ef1de87a9bd6966134e85d47fc4448b67

                                    SHA512

                                    c0eff5861c2df0828f1c1526536ec6a5a2e625a60ab75e7051a54e6575460c3af93d1452e75ca9a2110f38a84696c7e0e1e44fb13daa630ffcdda83db08ff78d

                                  • memory/4496-258-0x0000000000C40000-0x0000000000C56000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/4704-299-0x000000001CF80000-0x000000001CFF6000-memory.dmp

                                    Filesize

                                    472KB

                                  • memory/4704-300-0x0000000000CD0000-0x0000000000D04000-memory.dmp

                                    Filesize

                                    208KB

                                  • memory/4704-301-0x0000000002650000-0x000000000266E000-memory.dmp

                                    Filesize

                                    120KB